12 Jun

When Is It Time To Call in Digital Forensics

With the proliferation of the worlds largest network, namely the Internet, our reliance on technology has become even greater. A networked device is now intrinsic to our way of life and the role of Information Technology has expanded into almost every facet of day to day life.

The more devices the larger your fingerprint can be and your local IT Technician is now involved more so than ever in HR issues or security issues. All departments will consult with IT or a related party for instances where information needs to be found out, or evidence gathered, data recovered or even following up on a complaint.

This is where Digital Forensics comes into play: the gathering of sound digital forensic data that can be presented either in court or for internal investigations. Can anyone present digitally captured data to court? The short answer is no and the best company to go with is one with experience and the correct accreditation. Keep in mind evidence can get thrown out of court so you don’t want to gamble on a rookie so to speak.

It’s not all gloom and doom and court rooms since your Digital Forensic company also comes into play when that dreaded event occurs as it often does and that is the loss of data. Either a flash drive or a hard drive has crashed and sometimes data is erased in error. An entire Coca-Cola plant can burn down, be no real loss and rebuilt. However think about losing the hard drive with that all important recipe for the classic soda. Just a few lines of text gone and no matter how many plants you rebuild they are all ineffective. Such is the value of data in 2019.

Forensic data can be held on many devices across the spectrum ranging from mobile phones to CCTV systems to email servers. Who did what? When did it happen? Can we achieve non-repudiation? What was the data on that device ? All these questions can potentially be answered in Digital Forensics.


Collect | Recover | Analyze | Store | Report | Certify | eDiscover & Testify – Done!

(c)2019 Expert Data Forensics

Share this
01 Feb

New 2017 Federal Rule of Evidence Expected to Significantly Influence E-Discovery Best Practices

As our society continues to trend towards a greater technological and electronic dependence, attorneys can expect to see a rise in the prevalence and importance of electronic data as evidence. Slated to go into effect on December 1, 2017, a new amendment to Federal Rule of Evidence 902 will have strong implications on the importance of proper collection methods of electronic evidence.

The new amendment, known as subsection (14), states that electronic evidence will now be self-authenticated if it is collected properly, able to be digitally verified, and is certified valid by a qualified professional. This new change will make old, less professional methods of collecting electronic evidence obsolete while giving rise to the importance of structured and verifiable collection methods.

The attached Advisory Committee notes address the recommended use of generating a “hash value” for the copied piece of data and comparing it to the “hash value” of the original for authentication. As defined in the Advisory Committee notes:

“A hash value is a number that is often represented as a sequence of characters and is produced by an algorithm based upon the digital contents of a drive, medium, or file. If the hash values for the original and copy are different, then the copy is not identical to the original. If the hash values for the original and copy are the same, it is highly improbable that the original and copy are not identical. Thus, identical hash values for the original and copy reliably attest to the fact that they are exact duplicates.”

What this means for investigators and attorneys is that self-collection methods of electronic data including manual print-screen, drag and drop file copying, or any other simplistic method will not be deemed self-authenticated under the new law. This will most certainly create evidentiary hurdles and headaches. Simply taking a screenshot of emails or social media posts will not provide the necessary hash values for identification. Copying a file or document from a server to yours will alter the meta-data and produce a different hash value from the original flagging the file or document as being altered.

To limit evidentiary issues and remain compliant with the new law changes, your best practice is to hire a professional digital forensics firm that specializes in ESI (Electronically Stored Information) that can certify and generate hash values.

Our firm is licensed to handle sensitive data, we certify our collections, and use the correct digital forensics tools and methodology when processing data into eDiscovery. Our experts are masters in collecting, recovering, searching, and analyzing data and presenting it to you in a professional platform ready for trial. Our firm stands behind our work and if a situation arises, we are ready and willing to testify to support you, back up our findings, and help you win your case.

Evidence is the backbone of any strong legal case. Start the online Case Evaluation to get a quote on our services. We can collect cloud, social media and email data remotely, no travel required and we also have a nationwide network of data collectors in most states. When digital data is required for litigation – make one call to Expert Data Forensics 702.435.8885.


Collect | Recover | Analyze | Store | Report | Certify | eDiscover & Testify – Done!

(c)2017 Expert Data Forensics

Share this
28 Mar

7 Things About Social Media as Evidence

7 Things About Social Media as Evidence

1. Public or Private?
When a “Facebook” account is created, the user agrees that their personal information would be shared with others. Once the information is made public it can be copied, tagged, and distributed. When a person creates a social media account for themselves they are, in a sense, a self-created celebrity. So, is it “reasonable” to expect complete privacy of the account?

2. Let’s Subpoena – Not!
Can Facebook, Instagram, Snapchat, or Twitter be subpoenaed for the user account data? How would you domesticate and overcome another “little” obstacle called – “End User Stored Communication Act?”
Sending a subpoena to Facebook, in a civil matter, could prove to be a waste of time. I would much rather focus resources on trying to obtain the actual device used to post to the social media account, than try to get Facebook to comply.
read more

Share this
14 Feb

Love Bytes 2015

Love Bytes

3 Tech Tips for Couples

Advice from Digital Forensic Investigators

Valentine’s Day is an extremely popular day to celebrate your love with a proposal. An American Express survey found that 6 million couples are likely to get engaged on February 14th.

Before you pop open the champagne bottle and FaceTime your Mom, take a minute to discuss how you feel about having kids, where you will spend Thanksgiving as a couple and how you would handle Social Media and Device Access Preferences in your relationship and home. 

In 2014, 25% of the cases we analyzed were divorce and infidelity based. In the initial case assessment we categorize the digital nature of the relationship prior to the breakdown, this gives us the information we need to establish online behavior regarding infidelity, banking and finances.

With this statistic in mind, my advice for newlyweds would be to set the ground rules for;

read more

Share this
29 Jul

Press Release July 2014

Forensic DataTRACK – Unleashing Weapon against Cyber Crime in the Work Place

July 18, 2014
For immediate release
Contact: Eliya Azoulay (888) 335-3888, ext. 119

Las Vegas digital forensics firm releases new weapon in fight against digital security breaches
read more

Share this
13 Jul
20 Feb

Expert analyzes video of Sands Corp. hack

Interview with Digital Forensic Expert Investigator, Leon Mare of Expert Data Forensics

 Expert analyzes video of Sands Corp. hack

Posted: Feb 18, 2014 10:25 PM PST

Updated: Feb 19, 2014 7:56 AM PST

Written by Ashley Conroy – bio | email

Leon Mare, an investigator with Expert Data Forensics, was shocked to see the level of information to which the hacker had access.

“If you’ve got a domain administrator, and the domain administrator has got the main routes throughout the whole organization, it means he is actually like God on their network,” he said.

read more

Share this
29 Oct

Press Release October 2009

Computer Data Forensics Specialists offer New Name and Release Monthly Newsletter

By Expert Data Forensics

Dated: October 1st, 2009

The Only Private Investigator Licensed Computer Firm in the state of Nevada

Las Vegas – After being granted a private investigators license, the Vegas IT Techs computer firm has changed its focus and is now concentrating more on sciences of Computer & Data forensics. They are dedicated to helping businesses and individuals obtain electronic forensics needed for personal or legal reasons. It is the first computer forensics firm to be licensed in Nevada. With a new d/b/a Expert Data Forensics in the state, more cases can be solved involving the retrieval of electronic data.

read more

Share this
11 Feb
11 Feb

Computer Forensics and Family Law

Tel: 888-355-3888
eForensic Focus


The use of a Computer Forensics Expert can be extremely effective in building and collating evidence in family law matters such as:   divorce cases with larger estates, complicated businesses, real estate holdings or cases with multi-jurisdictional assets, proving/disproving parental competence or harassment.  Most cases of custody and visitation have been solved or modified because of computer evidence recovered by a Computer Forensics Expert. Experts assist attorneys in the recovery of financial information,   decryption of passwords, recovery of instant messages and archived data.

read more

Share this

© 2018 Expert Data Forensics • Nevada • PILB1498