Insider Theft

Insider Theft Requires a Unique Approach to Digital Forensic Investigations

We Investigate Insider Theft by Analyzing all Available Sources of Evidence

 
Services such as cloud based storage and encrypted messaging services like WhatsApp have made it easier for insiders to plan and execute intellectual property theft. It is now crucial to investigate all potential sources of evidence including the cloud, smart phones and web based email.
 
If you suspect a current or former insider of intellectual property theft you should contact a digital forensic examiner right away and treat the suspect’s data as a crime scene. In many cases we have encountered, the company’s internal IT department turned on the suspect computer and began investigating the contents. This type of activity can lead to claims of spoliation and damage your case. A digital forensic examiner will take proper measures to prevent changes to the original data.
 
We also offer pro-active forensic imaging whereby we image a departing employee’s computer  and preserve the image for later use if needed. In many cases, an employee is long gone before the company  realizes the damage that has been done. A pro-active forensic image of the employee’s company devices is a cost-effective way to preserve critical evidence before it has been altered or deleted and overwritten.
 

Our Investigation may reveal among many things that the suspect/s:

 
In some cases, it makes sense to combine digital forensics with traditional investigation techniques such as surveillance of the suspect/s and cooperation with outside agencies such as law enforcement to investigate the suspect company (beneficiary) of the IP theft.
 
In other cases, the suspects have stolen data which they had access to on a daily basis leaving few if any artifacts behind.  Traditional digital forensics techniques may fail to identify evidence of IP theft in such cases. In these cases, we may use stochastic forensics to identify unusual access patterns. In any given case, there will be thousands of access logs to sift through. Normal access events follow a Pareto distribution whereas an unusual access event such as copying a large amount of data will leave a completely different pattern. These unusual access events can be identified using the right tools and algorithms to reconstruct a timeline of events surrounding the IP theft.

Smartphone and Tablet Forensics

Mobile device forensics offers an abundance of insight and evidence to your case. We support over 15,000 different models of smartphones and tablets.

MORE

Supported Devices

In the future, digital investigations will depend on forensic access and analysis of cloud data more than any other data source including computers and phones.

MORE

Laptops and Personal Computer Forensics

Computer Evidence has been relied on in civil cases for a long time, however, the landscape has changed dramatically in the last five years. You need a digital forensic firm who can keep up with the rapid changes in technology.

MORE
Contact Us
Feedback