E-Discovery in Environmental Litigation
Malpractice at a Surgical Facility
Digging for Lost Emails
Malpractice Leads to Patient’s Death
Inside Job
Anti-Forensics
Awareness of anti-forensic activity lead to an expansion of the scope of the investigation. Our forensic team uncovered signs of IP theft, and circumnavigated attempts to cover up unusual activity.
Cell Phone Stalking
Our client was going through a divorce and had moved with her son to a friend’s house, where she was certain that her husband did not know her location. However, during this time she was served divorce papers at the address by her husband’s attorney. Our client was shocked and shaken that her husband knew her whereabouts, and as a result requested a restraining order from the courts. She asked ArcherHall to search for digital evidence pertaining to the alleged stalking.
Deleted Data: A Primer
Deleted Data: Basic Concepts for Attorneys and Investigators How deleted data can be recovered and used as evidence in a case.Deleted data is the most valuable digital evidence in many cases; it...
Internet-of-Things (IoT), Game Consoles, and Other Devices
The digital forensics field grows as fast as technology does. In modern litigation, there is a vast array of digital evidence beyond cell phones and computer workstations. Every new product or technological development presents a new source of data that can be relevant in an investigation.
Fitness Tracking Apps: Building a “Healthier” Case
Fitness tracking applications perform many functions designed to assist the athlete. In the legal realm, these same functions can also be used to help discover the truth.
Obtaining WhatsApp Data
WhatsApp messenger has grown increasingly popular over the years since its release in 2009. With 2 billion users as of February 2020, it’s probably safe to say that you, or someone you know, is using WhatsApp right now.
Command Line Usage: Cracking a Hidden Code
With the widespread use of the Graphical User Interface (GUI) based operating systems starting around the 1990s, most people have long forgotten the use of command line tools to perform data tasks.