Electronic Discovery

Your computer forensics and technology investigations team.

We offer a complete range of services for finding and analyzing electronic documents, databases, and computers within a litigation or investigative context. Combining technology expertise with diverse dispute experience, we apply a project and risk management focus to our Electronic Discovery process. And we’re backed by our leading-edge software, INDICO, which is not only a forensic analysis tool but a complex data analytics tool as wellthat can perform simultaneously operations on terabytes of data at a time. Combined with our full team of forensic and consulting services, Forensic Security Solutions can save significant amounts of money and time in handling your evidentiary ESI (electronically stored information).

Services We Provide

Expert Document Review Services

Xtreme Discovery Services

Traditional Discovery Services

Expert Document Review Services

When you have cases involving fraud, complex financial transactions or highly technical matters, let Forensic Security Solutions aid in your document review by using our experts to perform portions of the review. We assemble teams of certified professionals such as CPAs, CFEs, fraud investigators, computer programmers, computer forensic examiners or security experts to perform document review services to those areas where the more technical documents may reside.By using subject matter experts we can quickly differentiate between spreadsheets, source code, application configurations or portions of fraud schemes that may or may not be relevant to your matter at hand. This can save your clients significantly in time and cost as well as increase the accuracy of discovery.

Through our document review services, our team can take you through the final and often most costly stages of the e-discovery life cycle in an effective and organized manner. We will set up your case, fully brief those who will perform the review, audit the processes, refine the process as new information is discovered and produce relevant documents and reports concerning the review. We can provide online review platforms for distributed reviews or if your matter needs a higher level of security we can set up platforms that are offline.

Xtreme Discovery Services

When it comes to Electronic Discovery services, Forensic Security Solutions really excels at providing services outside of the norm. Services that your normal off the shelf software can’t accomplish. Services that require that out of the box thinking that occurs when you bring together data scientists, information analysts, e-discovery experts and computer programmers together. We have aided no less than five ediscovery firms to process electronic documents for matters beyond their capability. We have also provided these services to law firms and corporations to help them with unique solutions for their :

Unsupported File Formats

Processing file types that are not supported by standard software such as seldom used email formats or file types. To date we have identified over 30 different email formats we have processed.

Automated Document Categorization

Using various methods and programs, some of which are patent pending, we categorize documents into buckets such as responsive, unresponsive, privileged, technical and others.  This allows for documents to be reviewed by more appropriate skilled individuals.

Secure Processing & Review

Systems can be hacked or your clients data may be compromised if accessed through the Internet.  For those needing added securityno Internet, Intranets or Extranets.  We can both process and review your electronic documents in a closed network or for those who need the ultimate in security even on computers that have no connectivity to other computers.

Mobile on Site Processing

Using powerful mobile servers and our custom built software INDICO, Forensic Security Solutions is able to rapidly deploy equipment to our clients’ locations and begin processing data and preparing for analysis minutes after our arrival.

Unique Processing of Data

Changing the workflow or methods for processing data to optimize the project to the needs of the matter rather than designing your process based upon your software’s capability.

Customized Software Programs

When there absolutely is no other way to get the job done we can build customized programs specifically designed for your needs.

Traditional Discovery Services

Law firms, forensics consultants, accounting firms Fortune 500 corporations and e-discovery firms haverelied on Forensic Security Solutions to aid them throughout the entire e-discovery lifecycle to include but not limited to; strategy and planning, risk mitigation models, collecting and processing data, software selection, training of attorneys for document reviews and management of complex matters. We combine our custom built e-discovery application, INDICO which incorporates best-in-class practices and first-at-bat technology to offer a higher-quality e-discovery output with other off the shelf software.  This allows us to still incorporate our flexible high-volume processing software with those applications being used by other firms.

Electronic Discovery - Process

Identification

Assessment of information needs

Identify critical information needs.
Identify support information needs.

Assessment of information sources

Identify organizations and individuals.
Identify potential systems.

Preservation

Send out preservation order ASAP.

Exploration

Interrogatories.
Depositions.

Discovery Request

Collection

Imaging and Copying

Forensic bit-by-bit copy of computers
Network data and back-up tapes.
Floppies, CDs, DVDs, Thumb drives

Restoring

Active Files.
Deleted Files.
lack and Free Space.

Preserving Authenticity

MD5 or SHA Hash.
Articulate documentation.
Standardized methodology.
Backups and control copies.
Verifying image integrity.

Processing

Integration

Combines files from multiple sources into an integrated platform.
Leverages information technologies.

Exclusion

Removal of known operating system and application files.

De-duping

Removing duplicate files.

Indexing

Near instantaneous searching.

Sorting

Date/Time.
User.
Files Types.

Analysis

Managing Process

Platform to facilitate analysis.
Extranet site – desktops and laptops.
Developing analysis methodology.

Searching

Developing keyword lists.
Paper based or electronic.

Selection

Highlighted significant files.
Marking privileged and confidential files.
Marking irrelevant files.

Production

Redacting Documents

Automated redaction tools.
Documents and databases

Creating Documents

Conversion to pdf or tiff format.
MD5 hashing of all files to maintain authenticity.

Writing to Media

Creation to CDs, DVDs, hard drives.
Ensuring no data such as freespace or fileslack is included.
Antivirus check on all files.