archerhall.com
Open in
urlscan Pro
64.90.56.108
Public Scan
Submitted URL: http://archerhall.com/
Effective URL: https://archerhall.com/
Submission: On June 22 via manual from US — Scanned from DE
Effective URL: https://archerhall.com/
Submission: On June 22 via manual from US — Scanned from DE
Form analysis
2 forms found in the DOMPOST /#wpcf7-f13420-p5365-o1
<form action="/#wpcf7-f13420-p5365-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init" data-hs-cf-bound="true">
<div style="display: none;">
<input type="hidden" name="_wpcf7" value="13420">
<input type="hidden" name="_wpcf7_version" value="5.7.7">
<input type="hidden" name="_wpcf7_locale" value="en_US">
<input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f13420-p5365-o1">
<input type="hidden" name="_wpcf7_container_post" value="5365">
<input type="hidden" name="_wpcf7_posted_data_hash" value="">
<input type="hidden" name="_wpcf7_recaptcha_response"
value="03AL8dmw_6VgOhjRf1LA1zIUSRCmWPp5hz6fHpKGpKYmz0_su-RAWOBe8xms53bVNicPCehfDi2hcYiK2IzD8i04y2HvbEMmKfmNOpICfFNLzFs2pl-ZJfEruRc4wfAkPjfO9cI6VBcSHSWqn5eb8fuYE14croW0qn-Kv3gTvj8IG2t6iuB9qQf0NPmwgcfcyDOEMxy-tmhMhsLot3KcPuZen34z2-jWP4n7PkDBwMQCXb_bFHrzsvXILA-fqtwuoyXm368odXIMHJq0IaARC19DO_D_axalDo9CjH07mrs0fl9L5qGS1mzThcK-Vm2GRU5HxbGuvAKJkgUX2uH6VRehxwVPXgh63Kp5c9Sb6sawE20PhRCeW9IDuPhWeHqKxnigU0orewLKQFErKwiTrOJWHXHEP-rbJZhlQknvZkiGaciFFQyzVCk3ZnnvSe8LJT6vO8YbCVJUFC8JwS5xurfyW8OkvIiwf8pBHfIp67z0mhdfQGsQcRgoBwnGj03v_roSMxuV_74ZQxnMIo3MQ1_L1lGIP_J7fjcuL88DRWRnd2kchsWgBT_S46IlSQNH3JI8_hmLsPobCPtL-9HmMOrXBrWj7lRe0XLw">
</div>
<div class="contact-form">
<div class="row">
<div class="col-12">
<p><span class="wpcf7-form-control-wrap" data-name="text-514"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Name *" value="" type="text"
name="text-514"></span>
</p>
</div>
<div class="col-12">
<p><span class="wpcf7-form-control-wrap" data-name="email-582"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true" aria-invalid="false"
placeholder="Email *" value="" type="email" name="email-582"></span>
</p>
</div>
</div>
<div class="row">
<div class="col-12">
<p><span class="wpcf7-form-control-wrap" data-name="tel-732"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel" aria-required="true" aria-invalid="false" placeholder="Phone *"
value="" type="tel" name="tel-732"></span>
</p>
</div>
</div>
<div class="col-12">
<p><span class="wpcf7-form-control-wrap" data-name="textarea-912"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Message"
name="textarea-912"></textarea></span>
</p>
</div>
<div class="col-12">
<p><input class="wpcf7-form-control has-spinner wpcf7-submit" type="submit" value="Send"><span class="wpcf7-spinner"></span>
</p>
</div>
</div><input type="hidden" class="wpcf7-pum" value="{"closepopup":false,"closedelay":0,"openpopup":false,"openpopup_id":0}">
<div class="inv-recaptcha-holder">
<div class="grecaptcha-badge" data-style="none" style="width: 256px; height: 60px; position: fixed; visibility: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfLfKkZAAAAAMQbUhyhBdgiXdicVbQCclruceLd&co=aHR0cHM6Ly9hcmNoZXJoYWxsLmNvbTo0NDM.&hl=de&v=SglpK98hSCn2CroR0bKRSJl5&size=invisible&badge=bottomright&cb=e37kaiu20m7v"
width="256" height="60" role="presentation" name="a-13ys2p69fr99" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div>
</div>
<div class="wpcf7-response-output" aria-hidden="true"></div>
</form>
POST
<form id="forminator-module-11427" class="forminator-ui forminator-custom-form forminator-custom-form-11427 forminator-design--material forminator_ajax" method="post" data-forminator-render="0" data-form-id="11427" data-design="material"
data-grid="open" style="" data-uid="6493f83215fb3" novalidate="novalidate" data-hs-cf-bound="true">
<div role="alert" aria-live="polite" class="forminator-response-message forminator-error" aria-hidden="true"></div>
<div class="forminator-row">
<div id="name-1" class="forminator-col forminator-col-12 ">
<div class="forminator-field"><label for="forminator-field-name-1_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-name-1_6493f83215fb3-label">Your Name <span class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="text" name="name-1" value="" placeholder="" id="forminator-field-name-1_6493f83215fb3" class="forminator-input forminator-name--field" aria-required="true"></div>
</div>
</div>
</div>
<div class="forminator-row">
<div id="email-1" class="forminator-col forminator-col-6 ">
<div class="forminator-field"><label for="forminator-field-email-1_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-email-1_6493f83215fb3-label">Your Email <span
class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="email" name="email-1" value="" placeholder="" id="forminator-field-email-1_6493f83215fb3" class="forminator-input forminator-email--field" data-required="true" aria-required="true"></div>
</div>
</div>
<div id="phone-1" class="forminator-col forminator-col-6 ">
<div class="forminator-field"><label for="forminator-field-phone-1_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-phone-1_6493f83215fb3-label">Your Phone Number <span
class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="text" name="phone-1" value="" placeholder="" id="forminator-field-phone-1_6493f83215fb3" class="forminator-input forminator-field--phone" data-required="1" aria-required="true"
autocomplete="off"></div>
</div>
</div>
</div>
<div class="forminator-row">
<div id="text-1" class="forminator-col forminator-col-12 ">
<div class="forminator-field"><label for="forminator-field-text-1_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-text-1_6493f83215fb3-label">Claim Number <span
class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="text" name="text-1" value="" placeholder="" id="forminator-field-text-1_6493f83215fb3" class="forminator-input forminator-name--field" data-required="1"></div>
</div>
</div>
</div>
<div class="forminator-row">
<div id="name-2" class="forminator-col forminator-col-12 ">
<div class="forminator-field"><label for="forminator-field-name-2_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-name-2_6493f83215fb3-label">Insured Name <span
class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="text" name="name-2" value="" placeholder="" id="forminator-field-name-2_6493f83215fb3" class="forminator-input forminator-name--field" aria-required="true"></div>
</div>
</div>
</div>
<div class="forminator-row">
<div id="phone-2" class="forminator-col forminator-col-6 ">
<div class="forminator-field"><label for="forminator-field-phone-2_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-phone-2_6493f83215fb3-label">Insured Phone Number <span
class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="text" name="phone-2" value="" placeholder="" id="forminator-field-phone-2_6493f83215fb3" class="forminator-input forminator-field--phone" data-required="1" aria-required="true"
autocomplete="off"></div>
</div>
</div>
<div id="email-2" class="forminator-col forminator-col-6 ">
<div class="forminator-field"><label for="forminator-field-email-2_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-email-2_6493f83215fb3-label">Insured Email <span
class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="email" name="email-2" value="" placeholder="" id="forminator-field-email-2_6493f83215fb3" class="forminator-input forminator-email--field" data-required="1" aria-required="true"></div>
</div>
</div>
</div>
<div class="forminator-row">
<div id="address-1" class="forminator-col forminator-col-12 ">
<div class="forminator-row">
<div id="address-1-street_address" class="forminator-col">
<div class="forminator-field"><label for="forminator-field-address-1-street_address_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-address-1-street_address_6493f83215fb3-label">Insured Address <span
class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="text" name="address-1-street_address" placeholder="" id="forminator-field-address-1-street_address_6493f83215fb3" class="forminator-input" data-required="1" aria-required="true" value="">
</div>
</div>
</div>
</div>
<div class="forminator-row" data-multiple="true">
<div id="address-1-city" class="forminator-col forminator-col-6">
<div class="forminator-field"><label for="forminator-field-address-1-city_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-address-1-city_6493f83215fb3-label">Insured City <span
class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="text" name="address-1-city" placeholder="" id="forminator-field-address-1-city_6493f83215fb3" class="forminator-input" data-required="1" aria-required="true" value=""></div>
</div>
</div>
<div id="address-1-state" class="forminator-col forminator-col-6">
<div class="forminator-field"><label for="forminator-field-address-1-state_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-address-1-state_6493f83215fb3-label">Insured State <span
class="forminator-required">*</span></label>
<div class="forminator-input--wrap"><input type="text" name="address-1-state" placeholder="" id="forminator-field-address-1-state_6493f83215fb3" class="forminator-input" data-required="1" aria-required="true" value=""></div>
</div>
</div>
</div>
</div>
</div>
<div class="forminator-row">
<div id="text-2" class="forminator-col forminator-col-12 ">
<div class="forminator-field"><label for="forminator-field-text-2_6493f83215fb3" class="forminator-label forminator-floating--input" id="forminator-field-text-2_6493f83215fb3-label">Device Make/Model (if known)</label>
<div class="forminator-input--wrap"><input type="text" name="text-2" value="" placeholder="" id="forminator-field-text-2_6493f83215fb3" class="forminator-input forminator-name--field" data-required=""></div>
</div>
</div>
</div>
<div class="forminator-row">
<div id="textarea-1" class="forminator-col forminator-col-12 textarea-insurance-form">
<div class="forminator-field" style="position: relative;"><label for="forminator-field-textarea-1_6493f83215fb3" id="forminator-field-textarea-1_6493f83215fb3-label" class="forminator-label forminator-floating--textarea"
style="padding-top: 29px;">Notes on the claim</label>
<div class="forminator-textarea--wrap"><textarea name="textarea-1" placeholder="(What information are you looking for, etc.)" id="forminator-field-textarea-1_6493f83215fb3" class="forminator-textarea" rows="6"
style="min-height: 140px; padding-top: 29px;" maxlength="500"></textarea></div><span id="forminator-field-textarea-1_6493f83215fb3-description" class="forminator-description"><span data-limit="500" data-type="characters">0 /
500</span></span>
</div>
</div>
</div>
<div class="forminator-row">
<div id="captcha-1" class="forminator-col forminator-col-12 ">
<div class="forminator-g-recaptcha recaptcha-invisible" data-theme="light" data-badge="inline" data-sitekey="6Lc7oq4eAAAAADJoc-F0xws75ck21CTT2SqbFAxb" data-size="invisible">
<div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px; z-index: 99;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lc7oq4eAAAAADJoc-F0xws75ck21CTT2SqbFAxb&co=aHR0cHM6Ly9hcmNoZXJoYWxsLmNvbTo0NDM.&hl=de&v=SglpK98hSCn2CroR0bKRSJl5&theme=light&size=invisible&badge=inline&cb=78ecs49x96ou"
width="256" height="60" role="presentation" name="a-txiwptwwism5" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response-1" name="g-recaptcha-response" class="g-recaptcha-response" aria-hidden="true" aria-label="do not use" aria-readonly="true"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
</div><input type="hidden" name="referer_url" value="">
<div class="forminator-row forminator-row-last">
<div class="forminator-col">
<div class="forminator-field"><button class="forminator-button forminator-button-submit"><span>SUBMIT</span><span aria-hidden="true"></span></button></div>
</div>
</div><input type="hidden" id="forminator_nonce" name="forminator_nonce" value="457b16e390"><input type="hidden" name="_wp_http_referer" value="/"><input type="hidden" name="form_id" value="11427"><input type="hidden" name="page_id"
value="5365"><input type="hidden" name="form_type" value="default"><input type="hidden" name="current_url" value="https://archerhall.com/"><input type="hidden" name="render_id" value="0"><input type="hidden" name="action"
value="forminator_submit_form_custom-forms"><label for="input_11" class="forminator-hidden" aria-hidden="true">Please do not fill in this field. <input id="input_11" type="text" name="input_11" value="" autocomplete="off"></label><input
type="hidden" name="pum_form_popup_id" value="11428">
</form>
Text Content
855.839.9084 DIGITAL EVIDENCE FOR LITIGATION FORENSIC DATA COLLECTION, ANALYSIS, AND EXPERT WITNESS TESTIMONY. Speak to an expert Cellphones | Computers | Email | Documents | Text Messages | Location Data Cellphones | Computers | Email | Documents | Text Messages | Location Data DIGITAL FORENSICS Collect evidence from phones and computers. Find and recover relevant data. Deliver it in court. LEARN MORE E-DISCOVERY Process large amounts of data, then easily filter what you need for production or review. LEARN MORE WHAT OUR CLIENTS SAY I love working with ArcherHall. They’re responsive, professional and actively manage the project. They keep me in the loop relative to the original budget and timing. ACORN LEGAL SERVICES I have used ArcherHall for several years in connection with ESI services including data collection in connection with litigation. Their team has been required to deal with high pressure situations and difficult personalities. ArcherHall has always dealt with these situations with the utmost professionalism. The services they provide are of excellent quality. Their team is able to explain ESI issues in clear, layman’s terms to make them understandable. ArcherHall is very supportive and easy to work with. ATTORNEY AT BLANK ROME I wanted to thank you for all your help with the case. Your expertise was amazing. You have such a gift. Many lawyers have asked me who I used as an expert because they knew I had a big cell tower forensic case. I will be sending word to our legal community that they should use you as an expert. ATTORNEY AT CLARK COUNTY PUBLIC DEFENDER Working at Kassouni Law, the practice has used ArcherHall’s services for over ten years. Throughout those ten years, their services have always been reliable and professional. I'm appreciative of the work they've done for Kassouni Law, in helping provide exceptional service for clients, and would not hesitate to recommend their services to other law practices. KASSOUNI LAW Our firm works on large projects, processing enormous volumes of documents, and over the past six months I have been in almost daily, several times a day, contact with the team at ArcherHall. I am so thankful for their professionalism, work product, and responsiveness - truly bar none. If you have a project in need of a digital document task force, ArcherHall is the right call to make. REMY MOOSE MANLEY LLP I love working with ArcherHall. They’re responsive, professional and actively manage the project. They keep me in the loop relative to the original budget and timing. ACORN LEGAL SERVICES I have used ArcherHall for several years in connection with ESI services including data collection in connection with litigation. Their team has been required to deal with high pressure situations and difficult personalities. ArcherHall has always dealt with these situations with the utmost professionalism. The services they provide are of excellent quality. Their team is able to explain ESI issues in clear, layman’s terms to make them understandable. ArcherHall is very supportive and easy to work with. ATTORNEY AT BLANK ROME I wanted to thank you for all your help with the case. Your expertise was amazing. You have such a gift. Many lawyers have asked me who I used as an expert because they knew I had a big cell tower forensic case. I will be sending word to our legal community that they should use you as an expert. ATTORNEY AT CLARK COUNTY PUBLIC DEFENDER Working at Kassouni Law, the practice has used ArcherHall’s services for over ten years. Throughout those ten years, their services have always been reliable and professional. I'm appreciative of the work they've done for Kassouni Law, in helping provide exceptional service for clients, and would not hesitate to recommend their services to other law practices. KASSOUNI LAW Our firm works on large projects, processing enormous volumes of documents, and over the past six months I have been in almost daily, several times a day, contact with the team at ArcherHall. I am so thankful for their professionalism, work product, and responsiveness - truly bar none. If you have a project in need of a digital document task force, ArcherHall is the right call to make. REMY MOOSE MANLEY LLP I love working with ArcherHall. They’re responsive, professional and actively manage the project. They keep me in the loop relative to the original budget and timing. ACORN LEGAL SERVICES PreviousNext SPEAK TO AN EXPERT FOR FREE → Permanently preserve data → Find new evidence → Ensure evidence is admissible → Present high-quality custom reports → Review data in easy-to-use formats → Enjoy clear, prompt communication FREE CONSULTATION DIGITAL FORENSICS SERVICES FORENSIC IMAGING Create exact bit-for-bit copies of the data on a computer or other storage medium. Admissible in court and provably identical to the original. CELL PHONE FORENSICS Imaging, recovery, and analysis of data from cell phones, tablets, and other mobile devices. DATA RECOVERY Extract data from corrupted or damaged devices. Find and restore deleted files and messages. EXPERT EVIDENCE ANALYSIS Identify files, emails, or activity logs that are relevant to the case. Piece together subtle clues to provide a clear story. EXPERT TESTIMONY Testify in court or deposition regarding the conclusions of evidence analysis, validity of data, and soundness of methodologies. THEFT OF TRADE SECRETS Investigate unauthorized copying, printing, or transfer of sensitive or valuable data. E-DISCOVERY SERVICES DATA COLLECTION Collect local, network, or cloud data from multiple custodians at multiple locations. PROCESSING & PRODUCTION Exclude irrelevant data, capture text and metadata, and Bates label. Produce native files or TIFFs and load files for all popular systems. HOSTED REVIEW Access discovery documents from anywhere through our online review platform. Spend time on review, not document management. ADVANCED CULLING TECHNIQUES Reduce discovery costs by excluding more non-relevant documents, especially for clients operating in big data environments. EARLY CASE ASSESSMENT Find out what your data contains before you get too deep. Quickly view data by file type, timeline, or relationships between people. ELECTRONIC MEDICAL RECORDS Collection, processing, and analysis of Electronic Medical Records (EMR) and associated metadata. CASE STUDIES Digital ForensicsE-DiscoveryData Breach DIGITAL FORENSICS Client and Sales Data in Employment Dispute Snapchat and Murder Malpractice Leads to Patient’s Death Cell Phone Stalking Plaintiff’s Attorney in Wrongful Termination Anti-Forensics Digging for Lost Emails Malpractice at a Surgical Facility Falsely Accused Inside Job CLIENT AND SALES DATA IN EMPLOYMENT DISPUTE DEEP RETRIEVAL OF DATA FROM INACTIVE CRM Our client was being sued by one of their former employees. To defend against the claim, they needed to retrieve data from the oldest available backup of their inactive customer relationship management (CRM) system. The company required data from the backup to demonstrate the employee’s performance as evidenced by his activity within the system. Client: Corporation Categories: Digital Forensics View Case Study SNAPCHAT AND MURDER METICULOUS ANALYSIS REVEALS CRITICAL CELLPHONE EVIDENCE A member of a notorious gang was found murdered in a small California city. Police had arrested a known associate of the gang (the Suspect) on grounds that cell phone towers showed his location at the crime scene during the given time window. The Suspect claimed that he did not commit the murder, but was at the crime scene. He identified another individual (the Defendant) as the murderer. The Defendant denied being at the crime scene, and denied being with the Suspect at any point during the day that the crime was admitted. The Defendant’s attorney hired ArcherHall to look through his cell phone for evidence pertaining to the crime. Client: Defense Attorney Categories: Digital Forensics View Case Study MALPRACTICE LEADS TO PATIENT’S DEATH ELECTRONIC MEDICAL RECORD ANALYSIS UNCOVERS RECORDS TAMPERING Our client, an attorney specializing in medical malpractice, hired ArcherHall for our experience analyzing electronic medical records (EMR) and presenting accurate timelines of patient care. The attorney was dealing with a case involving a physician who was accused of medical malpractice after their patient’s condition worsened significantly under their follow-up care. The attorney requested a copy of the patient’s electronic medical record from the physician, who presented him with paper documents. The attorney noticed inconsistencies in the dates of the records and suspected fabrication or tampering had occurred. ArcherHall conducted EMR analysis to find out the truth. Client: Medical Malpractice Attorney Categories: Digital Forensics, E-Discovery View Case Study CELL PHONE STALKING CELL PHONE FORENSIC EVIDENCE IN RESTRAINING ORDER CASE Our client was going through a divorce and had moved with her son to a friend’s house, where she was certain that her husband did not know her location. However, during this time she was served divorce papers at the address by her husband’s attorney. Our client was shocked and shaken that her husband knew her whereabouts, and as a result requested a restraining order from the courts. She asked ArcherHall to search for digital evidence pertaining to the alleged stalking. Client: Party to Family Law Case Categories: Digital Forensics, Data Breach View Case Study PLAINTIFF’S ATTORNEY IN WRONGFUL TERMINATION DIGITAL FORENSICS INVESTIGATION FOR PLAINTIFF’S ATTORNEY IN WRONGFUL TERMINATION The Plaintiff was a cashier who was terminated after she reported to HR that she had been the target of extremely inappropriate behavior from her Supervisor. She reported that he made lewd comments and that twice he had pressured her into sexual intercourse. Plaintiff’s Attorney filed a complaint on her behalf alleging that the defendant employer had failed to prevent sexual harassment and had retaliated against and wrongfully terminated Plaintiff. Client: A cashier who was terminated after she reported to HR that she had been the target of extremely inappropriate behavior from her Supervisor. Categories: Digital Forensics View Case Study ANTI-FORENSICS INVESTIGATING ATTEMPTS TO HIDE IP THEFT USING ANTI-FORENSIC SOFTWARE Our client asked us to investigate a suspected theft of IP. Two employees had recently left the company for competitors and were suspected of misappropriating intellectual property and proprietary information. ArcherHall was given their laptops to search for unusual activity and build evidence of the IP theft, including file transfers to USB, files sent to personal email addresses, correspondence with rival companies, and mass deletion of files. Client: Global Market Research Firm Categories: Digital Forensics View Case Study DIGGING FOR LOST EMAILS A CREATIVE SOLUTION TO A CHALLENGING EMAIL EXTRACTION Our client required access to copies of emails recorded on their company email journaling system to use as evidence for their defense in court. Due to technical difficulties with the system, extracting the information needed was becoming a long and arduous procedure. The judge’s concerns about delays in the discovery process mounted extra pressure on the attorneys, who were told to provide the digital evidence as quickly as possible. Client: Public School District Categories: Digital Forensics, E-Discovery View Case Study MALPRACTICE AT A SURGICAL FACILITY FORENSIC EXAMINATION OF ELECTRONIC MEDICAL RECORDS Our client was the plaintiff in a case seeking to prove that a surgical facility was not following proper medical protocol and performing surgeries without the proper pre-surgery health assessment. Allegations were made that the facility was falsifying medical records by overwriting the pre-surgery assessment digital signatures with the post-surgery medical record signature. In effect, this data replacement was erasing the evidence of the malpractice. Client: Malpractice Victim Categories: Digital Forensics, E-Discovery View Case Study FALSELY ACCUSED A SOFTWARE COMPANY IS ACCUSED OF DESTROYING THEIR CLIENT’S DATA Our client was a software company accused of selling faulty software. The software package purchased by the plaintiff was designed for use in a specific retail industry. According to the plaintiff’s complaint, the defendant’s software destroyed the data stored by the plaintiff, causing the business to sustain significant losses. The plaintiff refused to settle with the defendant but insisted that the case go to trial. Client: Software Company Categories: Digital Forensics View Case Study DIGITAL THEFT OF IP A COVER-UP IS UNCOVERED Our client was a corporation investigating suspected theft of intellectual property by a former employee. The employee had left for a competitor, allegedly taking proprietary customer and technical data with him. The client suspected the defendant had attempted to cover his tracks by wiping his computer. The case ultimately involved multiple computers, external media, and mobile devices. Key Success: Overcame the defendant’s efforts to hide and destroy evidence and won recognition from the judge for our work. Client: Corporation Categories: Digital Forensics, Data Breach View Case Study EXPLICIT CONTENT IN SCHOOL AN INNOCENT TEACHER IS EXONERATED We were retained to investigate accusations that a special education teacher had been browsing the internet for adult content, including suspected child pornography. The school’s web traffic monitoring software had flagged a site the teacher had visited. Given the severity of the accusations, the school executives wanted to verify with certainty that the allegations were accurate. From the Attorney: “I wanted you to know how much the [client] and I appreciated the work done by you and your team to resolve the mystery involving [the teacher]’s computer. The fact that you didn’t simply accept the easy explanation — that he must have searched for pornography and hid it so well that you couldn’t find it — and doggedly pursued the truth, avoided what might have been a serious miscarriage of justice that could have resulted in [the teacher] losing his job, his reputation and maybe his freedom. You should also know that being under this cloud of suspicion has overwhelmed [the teacher] and, while he will take some time to recover, he is extremely relieved to have been exonerated. And the professionalism and expertise of you and your co-workers relieved [client] of the horrible burden of mistakenly taking action against an innocent man.” Client: School District Categories: Digital Forensics, Data Breach View Case Study INSIDE JOB INVESTIGATING AN INTERNAL DATA BREACH Our client, an industry-leading manufacturer of fuel cells, was involved in a large lawsuit related to the termination of an employee. The client believed an accomplice in IT, who had previously received advanced technical training in the military, was helping the ex-employee steal data from the company. Key Success: Rapidly determined the method, intent, and suspected perpetrator of the network breach. Client: Large Corporation Categories: Digital Forensics, Data Breach View Case Study E-DISCOVERY Client and Sales Data in Employment Dispute Malpractice Leads to Patient’s Death Digging for Lost Emails Malpractice at a Surgical Facility E-Discovery in Environmental Litigation CLIENT AND SALES DATA IN EMPLOYMENT DISPUTE DEEP RETRIEVAL OF DATA FROM INACTIVE CRM Our client was being sued by one of their former employees. To defend against the claim, they needed to retrieve data from the oldest available backup of their inactive customer relationship management (CRM) system. The company required data from the backup to demonstrate the employee’s performance as evidenced by his activity within the system. Client: Corporation Categories: Digital Forensics, E-Discovery View Case Study MALPRACTICE LEADS TO PATIENT’S DEATH ELECTRONIC MEDICAL RECORD ANALYSIS UNCOVERS RECORDS TAMPERING Our client, an attorney specializing in medical malpractice, hired ArcherHall for our experience analyzing electronic medical records (EMR) and presenting accurate timelines of patient care. The attorney was dealing with a case involving a physician who was accused of medical malpractice after their patient’s condition worsened significantly under their follow-up care. The attorney requested a copy of the patient’s electronic medical record from the physician, who presented him with paper documents. The attorney noticed inconsistencies in the dates of the records and suspected fabrication or tampering had occurred. ArcherHall conducted EMR analysis to find out the truth. Client: Medical Malpractice Attorney Categories: Digital Forensics, E-Discovery View Case Study DIGGING FOR LOST EMAILS A CREATIVE SOLUTION TO A CHALLENGING EMAIL EXTRACTION Our client required access to copies of emails recorded on their company email journaling system to use as evidence for their defense in court. Due to technical difficulties with the system, extracting the information needed was becoming a long and arduous procedure. The judge’s concerns about delays in the discovery process mounted extra pressure on the attorneys, who were told to provide the digital evidence as quickly as possible. Client: Public School District Categories: Digital Forensics, E-Discovery View Case Study MALPRACTICE AT A SURGICAL FACILITY FORENSIC EXAMINATION OF ELECTRONIC MEDICAL RECORDS Our client was the plaintiff in a case seeking to prove that a surgical facility was not following proper medical protocol and performing surgeries without the proper pre-surgery health assessment. Allegations were made that the facility was falsifying medical records by overwriting the pre-surgery assessment digital signatures with the post-surgery medical record signature. In effect, this data replacement was erasing the evidence of the malpractice. Client: Malpractice Victim Categories: Digital Forensics, E-Discovery View Case Study E-DISCOVERY IN ENVIRONMENTAL LITIGATION A MULTI-YEAR CASE GOES TO TRIAL Our client was a state agency involved in decades-long litigation regarding an even older environmental issue. The long history of the matter meant a substantial volume and variety of documents, with new relevant documents being generated every day. The agency had the foresight to involve ArcherHall as early as possible, allowing us to collect and process the complete set of documents, and giving us the full picture of the evidence related to the case. Client: Government Agency Categories: E-Discovery View Case Study DATA BREACH Cell Phone Stalking Anti-Forensics Inside Job CELL PHONE STALKING CELL PHONE FORENSIC EVIDENCE IN RESTRAINING ORDER CASE Our client was going through a divorce and had moved with her son to a friend’s house, where she was certain that her husband did not know her location. However, during this time she was served divorce papers at the address by her husband’s attorney. Our client was shocked and shaken that her husband knew her whereabouts, and as a result requested a restraining order from the courts. She asked ArcherHall to search for digital evidence pertaining to the alleged stalking. Client: Party to Family Law Case Categories: Digital Forensics, Data Breach View Case Study ANTI-FORENSICS INVESTIGATING ATTEMPTS TO HIDE IP THEFT USING ANTI-FORENSIC SOFTWARE Our client asked us to investigate a suspected theft of IP. Two employees had recently left the company for competitors and were suspected of misappropriating intellectual property and proprietary information. ArcherHall was given their laptops to search for unusual activity and build evidence of the IP theft, including file transfers to USB, files sent to personal email addresses, correspondence with rival companies, and mass deletion of files. Client: Global Market Research Firm Categories: Digital Forensics View Case Study DIGITAL THEFT OF IP A COVER-UP IS UNCOVERED Our client was a corporation investigating suspected theft of intellectual property by a former employee. The employee had left for a competitor, allegedly taking proprietary customer and technical data with him. The client suspected the defendant had attempted to cover his tracks by wiping his computer. The case ultimately involved multiple computers, external media, and mobile devices. Key Success: Overcame the defendant’s efforts to hide and destroy evidence and won recognition from the judge for our work. Client: Corporation Categories: Digital Forensics, Data Breach View Case Study EXPLICIT CONTENT IN SCHOOL AN INNOCENT TEACHER IS EXONERATED We were retained to investigate accusations that a special education teacher had been browsing the internet for adult content, including suspected child pornography. The school’s web traffic monitoring software had flagged a site the teacher had visited. Given the severity of the accusations, the school executives wanted to verify with certainty that the allegations were accurate. From the Attorney: “I wanted you to know how much the [client] and I appreciated the work done by you and your team to resolve the mystery involving [the teacher]’s computer. The fact that you didn’t simply accept the easy explanation — that he must have searched for pornography and hid it so well that you couldn’t find it — and doggedly pursued the truth, avoided what might have been a serious miscarriage of justice that could have resulted in [the teacher] losing his job, his reputation and maybe his freedom. You should also know that being under this cloud of suspicion has overwhelmed [the teacher] and, while he will take some time to recover, he is extremely relieved to have been exonerated. And the professionalism and expertise of you and your co-workers relieved [client] of the horrible burden of mistakenly taking action against an innocent man.” Client: School District Categories: Digital Forensics, Data Breach View Case Study INSIDE JOB INVESTIGATING AN INTERNAL DATA BREACH Our client, an industry-leading manufacturer of fuel cells, was involved in a large lawsuit related to the termination of an employee. The client believed an accomplice in IT, who had previously received advanced technical training in the military, was helping the ex-employee steal data from the company. Key Success: Rapidly determined the method, intent, and suspected perpetrator of the network breach. Client: Large Corporation Categories: Digital Forensics, Data Breach View Case Study CONFUSED ABOUT DIGITAL FORENSICS? Read about common topics in plain language: KNOWLEDGE BASE CONTACT GIVE US A CALL AT(855) 839-9084 Or send us a message and we’ll get back to you right away. * Digital Forensics * E-Discovery * Data Breach * Knowledge Base * MCLE Presentations * Digital Forensics * E-Discovery * Data Breach * Knowledge Base * MCLE Presentations * Pricing * Pricing * About * Live Remote CLEs * Careers * Contact * About * Live Remote CLEs * Careers * Contact * Follow Texas Department of Public Safety Investigations Company – License #: A23023701 Your Name * Your Email * Your Phone Number * Claim Number * Insured Name * Insured Phone Number * Insured Email * Insured Address * Insured City * Insured State * Device Make/Model (if known) Notes on the claim 0 / 500 SUBMIT Please do not fill in this field. × CAPITOL DIGITAL & CALIFORENSICS IS NOW ARCHERHALL We are pleased to announce the new name of our company: ArcherHall. We have the same ownership, same dedicated team, and same great service that we’ve delivered for over 20 years. We look forward to continuing to work with you! × * Home * Services * Pricing * Contact * Send Files 855.839.9084 ×