Client and Sales Data in Employment Dispute
Deep retrieval of data from inactive CRM
Our client was being sued by one of their former employees. To defend against the claim, they needed to retrieve data from the oldest available backup of their inactive customer relationship management (CRM) system. The company required data from the backup to demonstrate the employee’s performance as evidenced by his activity within the system.
Client: Corporation
Categories: Digital Forensics
Snapchat and Murder
Meticulous analysis reveals critical cellphone evidence
A member of a notorious gang was found murdered in a small California city. Police had arrested a known associate of the gang (the Suspect) on grounds that cell phone towers showed his location at the crime scene during the given time window. The Suspect claimed that he did not commit the murder, but was at the crime scene. He identified another individual (the Defendant) as the murderer. The Defendant denied being at the crime scene, and denied being with the Suspect at any point during the day that the crime was admitted. The Defendant’s attorney hired ArcherHall to look through his cell phone for evidence pertaining to the crime.
Client: Defense Attorney
Categories: Digital Forensics
Malpractice Leads to Patient’s Death
Electronic Medical Record analysis uncovers records tampering
Our client, an attorney specializing in medical malpractice, hired ArcherHall for our experience analyzing electronic medical records (EMR) and presenting accurate timelines of patient care. The attorney was dealing with a case involving a physician who was accused of medical malpractice after their patient’s condition worsened significantly under their follow-up care. The attorney requested a copy of the patient’s electronic medical record from the physician, who presented him with paper documents. The attorney noticed inconsistencies in the dates of the records and suspected fabrication or tampering had occurred. ArcherHall conducted EMR analysis to find out the truth.
Client: Medical Malpractice Attorney
Categories: Digital Forensics, E-Discovery
Cell Phone Stalking
Cell phone forensic evidence in restraining order case
Our client was going through a divorce and had moved with her son to a friend’s house, where she was certain that her husband did not know her location. However, during this time she was served divorce papers at the address by her husband’s attorney. Our client was shocked and shaken that her husband knew her whereabouts, and as a result requested a restraining order from the courts. She asked ArcherHall to search for digital evidence pertaining to the alleged stalking.
Client: Party to Family Law Case
Categories: Digital Forensics, Data Breach
Plaintiff’s Attorney in Wrongful Termination
Digital Forensics Investigation for Plaintiff’s Attorney in Wrongful Termination
The Plaintiff was a cashier who was terminated after she reported to HR that she had been the target of extremely inappropriate behavior from her Supervisor. She reported that he made lewd
comments and that twice he had pressured her into sexual intercourse. Plaintiff’s Attorney filed a complaint on her behalf alleging that the defendant employer had failed to prevent sexual harassment and had retaliated against and wrongfully terminated Plaintiff.
Client: A cashier who was terminated after she reported to HR that she had been the target of extremely inappropriate behavior from her Supervisor.
Categories: Digital Forensics
Anti-Forensics
Investigating attempts to hide IP theft using anti-forensic software
Our client asked us to investigate a suspected theft of IP. Two employees had recently left the company for competitors and were suspected of misappropriating intellectual property and proprietary information. ArcherHall was given their laptops to search for unusual activity and build evidence of the IP theft, including file transfers to USB, files sent to personal email addresses, correspondence with rival companies, and mass deletion of files.
Client: Global Market Research Firm
Categories: Digital Forensics
Digging for Lost Emails
A creative solution to a challenging email extraction
Our client required access to copies of emails recorded on their company email journaling system to use as evidence for their defense in court. Due to technical difficulties with the system, extracting the information needed was becoming a long and arduous procedure. The judge’s concerns about delays in the discovery process mounted extra pressure on the attorneys, who were told to provide the digital evidence as quickly as possible.
Client: Public School District
Categories: Digital Forensics, E-Discovery
Malpractice at a Surgical Facility
Forensic examination of Electronic Medical Records
Our client was the plaintiff in a case seeking to prove that a surgical facility was not following proper medical protocol and performing surgeries without the proper pre-surgery health assessment. Allegations were made that the facility was falsifying medical records by overwriting the pre-surgery assessment digital signatures with the post-surgery medical record signature. In effect, this data replacement was erasing the evidence of the malpractice.
Client: Malpractice Victim
Categories: Digital Forensics, E-Discovery
Falsely Accused
A software company is accused of destroying their client’s data
Our client was a software company accused of selling faulty software. The software package purchased by the plaintiff was designed for use in a specific retail industry. According to the plaintiff’s complaint, the defendant’s software destroyed the data stored by the plaintiff, causing the business to sustain significant losses. The plaintiff refused to settle with the defendant but insisted that the case go to trial.
Client: Software Company
Categories: Digital Forensics
Digital Theft of IP
A cover-up is uncovered
Our client was a corporation investigating suspected theft of intellectual property by a former employee. The employee had left for a competitor, allegedly taking proprietary customer and technical data with him. The client suspected the defendant had attempted to cover his tracks by wiping his computer. The case ultimately involved multiple computers, external media, and mobile devices.
Key Success: Overcame the defendant’s efforts to hide and destroy evidence and won recognition from the judge for our work.
Client: Corporation
Categories: Digital Forensics, Data Breach
Explicit Content in School
An innocent teacher is exonerated
We were retained to investigate accusations that a special education teacher had been browsing the internet for adult content, including suspected child pornography. The school’s web traffic monitoring software had flagged a site the teacher had visited. Given the severity of the accusations, the school executives wanted to verify with certainty that the allegations were accurate.
From the Attorney: “I wanted you to know how much the [client] and I appreciated the work done by you and your team to resolve the mystery involving [the teacher]’s computer. The fact that you didn’t simply accept the easy explanation — that he must have searched for pornography and hid it so well that you couldn’t find it — and doggedly pursued the truth, avoided what might have been a serious miscarriage of justice that could have resulted in [the teacher] losing his job, his reputation and maybe his freedom. You should also know that being under this cloud of suspicion has overwhelmed [the teacher] and, while he will take some time to recover, he is extremely relieved to have been exonerated. And the professionalism and expertise of you and your co-workers relieved [client] of the horrible burden of mistakenly taking action against an innocent man.”
Client: School District
Categories: Digital Forensics, Data Breach
Inside Job
Investigating an internal data breach
Our client, an industry-leading manufacturer of fuel cells, was involved in a large lawsuit related to the termination of an employee. The client believed an accomplice in IT, who had previously received advanced technical training in the military, was helping the ex-employee steal data from the company.
Key Success: Rapidly determined the method, intent, and suspected perpetrator of the network breach.
Client: Large Corporation
Categories: Digital Forensics, Data Breach