EnCase Spoliation Steve Bunting

​Copyright
© 2022 | Bunting Digital Forensics, LLC

​Bunting Digital Forensics, LLC

Digital Forensic Examinations

​​Digital Media Forensic Examinations - Bunting Digital Forensics, LLC


Whether you are involved in litigation, criminal prosecution, an internal investigation, a due diligence review, or the like, sooner or later you will need to address the digital evidence in the case.  The best way to destroy evidence is to turn on the computer and review the data yourself.  


​Steve Bunting has literally written the book  on computer forensic examinations.  In addition to writing the leading texts on the subject, he has trained hundreds of examiners from the U.S. and almost 20 other countries around the world on how to carry out the computer forensics process according to best practices of the industry.


Computer forensics is a process with several steps that are industry best practices.  Those steps are:

  • ​Identification and seizure
  • Acquisition or imaging
  • Examination or analysis
  • Reporting


Identification of the digital evidence in a case is sometimes obvious and sometimes not.  Digital evidence often exists in places most would not think to consider.  We can help you identify it all and secure it for inclusion in your case.  


Acquisition and imaging must be done correctly, otherwise the rests of the the process is built upon a weak foundation.  There are many ways to acquire or image source media.  Choosing the best and most efficient method ensures the security and integrity of the data and also saves you money.


Examination and analysis of data is the time consuming and most tedious step in the process.  There are basically two types of examiners.  There is the type that pushes buttons and run scripts and who knows very little about the underlying process and data structures.  The other type understands the underlying processes and data structures and pushes buttons and runs scripts to streamline their workflow and increase their efficiency.  There are too many of the former and too few of the latter in this industry.  We pride ourselves as being among the latter.  When the buttons and scripts don't return the data we expect, we can dig and use alternative analysis methods where others have to give up.  When asked to explain the results, we are more than capable.


We have experience in the following types of examinations:

  • Computer intrusions (hacking)
  • Intellectual property theft
  • Digital rights cases
  • Spoliation cases
  • Electronic discovery
  • Fraud in its many variants
  • Counterfeit identity cases
  • Medicaid Fraud
  • Homicide cases
  • Child pornography cases
  • Research fraud & abuse cases
  • Domestic matters: Cheating spouse cases
  • Mobile Device Examinations
  • Data recovery from various media types
  • ​Password recovery or bypass services


The final phase is that of reporting.  Reporting is not just pushing a button and printing a report, rather it is the reporting of the findings in such a way that the client and all involved parties understand.  It further involves testifying about one's findings.  We have experience in court.  We know how to explain complex digital concepts.


When you need a computer forensic examiner, you need one of the best.  Contact Steve Bunting now and we can discuss your needs.