I was recently having a conversation with my business partner Mike and an attorney. When the attorney asked us the types of cases we normally work on, the first thought I had was that we have yet to experience a “normal” case. His question sparked the idea to let our past, current and potential clients know on a more regular basis the types of cases that come to us each quarter. I will of course be vague and always leave out names and locations, but wanted to give an idea of cases that are brought to us. I hope you find it interesting. • We were able to recover deleted text messages for a case involving an inappropriate relationship with a minor. • Worked with counsel to provide proof positive information regarding the intellectual property theft from computers from a major corporation. • Worked diligently to find information concerning alleged child sex abuse and deviant pornography behaviors that supports the claims of the minor child involved. • Teamed up with a private organization from NY to forensically test a software cell phone application for personal information left behind on the phone, thus preventing security flaws. • Contracted with a personal banking cell phone application to find personal security information flaws. • Successfully recovered 9 mobile devices that were otherwise damaged and unable to recover information from. • Successfully worked with the F.B.I. to recover information from a tablet and an iPhone that directly lead to the recovery of a teenager who had been missing for over a week. This was done on a strictly volunteer basis. • Recovered over 20 hard drives for customers that had crashed or had become inoperable. • Successfully recovered vital information for counsel in a wrongful death case. • Assisted forensic accountants in 100 million dollar Ponzi scheme case. • Used custom built password/decryption breaking machine to break difficult encryption in record time. (Machine operates at 5 BILLION password attempts per second) • Provided information to numerous attorneys on writing discovery requests that cover all areas of electronically based discoverable information in civil cases. • Provided multiple forensic collections for law offices throughout the country. • Successfully deployed “man in the middle” attack for an employer seeking info on deviant activity of an employee. I hope this provides additional insight into what we might consider “normal” case work. We perform all standard computer forensics and have experience working with attorneys, private investigators and law enforcement. In addition you see that we have the ability to break passwords and encryption, recover and perform cellular forensics among other services.