Digital Forensics Investigators

Network Security Breach & Cyber Threat

Digital ForensicsWith any active cyber threat, it is critical to understand the source and full extent of the network security breach in order to effectively respond and eradicate its presence in your environment. Our Digital Forensics Investigators and Network Security Specialists move quickly to capture and analyze data stored in your hard drives, CDs, DVDs, thumb drives and other media formats using industry standard incident response procedures.

Following evidentiary procedures to ensure integrity and admissibility, we will thoroughly investigate the incident while keeping you informed of all results. Digital Forensics and Network Security investigations can be performed during Incident Response Handling or independently, depending on your needs.

Understand the extent of the security breach and the compromise

Determining the source and full extent of a breach is vital to containing the incident and addressing the root cause. You need to know how far a hacker has penetrated your organization and systems, and what has been exfiltrated from your environment. In many cases, this can be accomplished only through in-depth Digital Forensics and Network Security investigation.

Allegiant Digital Forensics services get to the bottom of how your systems were penetrated and what has been compromised. If you suspect systems and sensitive data have been compromised but do not have sufficient evidence to declare an incident, our Digital Forensics Investigators can help you confirm a breach has occurred.

Ensure the integrity of the Chain of Custody

In the midst of an incident, following evidentiary procedures often is overlooked as your team focuses on containing the problem. This can impair your organization’s ability to provide reliable and useful evidence of the breach to proper authorities.

Our Digital Forensics Investigators perform a proper forensic investigation of your data storage devices, adhering to standards of evidence and legally admissible proof for criminal proceedings. We provide appropriate Chain of Custody documentation for systems, images or data acquired during the investigation. In addition, our investigators will prepare reports or forensic evidence for law enforcement or investigating government agencies, upon request.

If your organization has become a victim of a security breach, or suspects a breach has occurred, contact Allegiant immediately at (469) 892-8256.

Digital Forensics

Expert Digital Forensics Services for computers, mobile devices, business networks, and home networks.

Our Digital Forensics Investigators help companies and individuals respond to incidents and litigation where electronic data may play a role in substantiating claims or proving actions. Our experts provide assistance in the identification, preservation, and analysis of all forms of electronic data residing on mobile and cellular devices, computer or server systems, or cloud storage.

During Digital Forensics investigations, we routinely assist in matters related to the misuse of confidential data, employee misconduct, non-compete and employment contract disputes, insurance fraud, digital image analysis, mobile and cellular device analysis, and electronic document collection and production. The data collected and analyzed will aid in the successful investigation and litigation of complex matters.

Data Collection

Whether you need to collect data from multiple locations around the globe or just a single location, our team of certified Digital Forensics Investigators can help respond to regulatory and legal requirements in the most cost-effective, efficient and forensically sound manner. We can consult on and design an approach based on your objectives, develop an inventory of the universe of potentially responsive data, and acquire data from nearly every file type and source, using proven technology and forensically sound methods.

Data Processing

We can satisfy your requirements for filtering and early case assessment. We offer:

  • Native file processing, TIFF and native file production
  • All metadata, text, embedded objects and domains processing
  • Filtering based on objective and subjective criteria
  • Support for virtually any file type, including legacy, non-standard email formats, corrupt files, password-protected, encrypted files, Bloomberg data, chat, SharePoint, audio and video files
  • Identification and processing of hundreds of languages, with full Unicode compliance
  • Rigorous quality control and chain-of-custody protocols

Analytics

Our technology offers advanced analytical features to cull data efficiently and effectively, increasing the speed and accuracy of your review. Analytics are fully integrated into our platforms, to inform you earlier in the process of other strengths and weaknesses of your case.

Contact Us Now

Our Expert Digital Forensics Investigators are here to serve you.

Based in North Dallas -- Serving Texas -- CALL (469) 892-8256
Contact Us Now

Highly Qualified and Experienced Digital Forensic Expert

Dr Chuck Easttom - Digital Forensics Expert - Dallas TXExpert in Computer Forensics, Network Security, Penetration Testing – Dr. Chuck Easttom

Our Computer Forensics, Forensic File Recovery, Network Security and Penetration Testing services are directed by one of the most highly qualified Computer Forensics and Computer Science experts in Texas. Dr. Easttom is an expert in Forensic Science, Computer Forensics, Mobile Forensics, Network Security, Penetration Testing, Forensic File Recovery, Cryptography, and related topics. He has extensive experience in training law enforcement and computer forensics professionals, as well as a long history of testifying in court as an expert witness. You can view is entire CV here.

Dr. Easttom’s forensic qualifications and experience include:

  • A D.Sc. in Cyber Security, a Ph.D. in Technology, a Ph.D. in computer science, and three masters degrees
    • 67  computer industry certifications including following forensic certifications:
        • Certified Cyber Forensic Professional (CCFP)
        • Certified Hacking Forensic Investigator (CHFI)
        • Access Data Certified Examiner 2014-2017 (ACE)
        • OSForensics Certified Examiner (OSFCE)
        • Oxygen Forensics Certified Examiner
        • Certified Criminal Investigator (CCI)
        • Certified Forensic Consultant (CFC)
        • Certified Information Systems Security Professional (CISSP)
        • CompTIA Security Analytics Expert-CSAE

      CompTIA Pentest+

      • CompTIA Certified Cybersecurity Analysis (CySA+)
    • Author of 33  computer science books including 4 forensics books and 8 security textbooks that have chapters on forensics.
    • Authored several research papers on forensics including:
      • Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).
      • Easttom, C., Sanders, W. (2019). ‘On the Efficacy of Using Android Debugging Bridge for Android Device Forensics. IEEE 10th Annual Computing and Communication Conference UEMCON.
      • Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination. International Journal of Innovative Research in Information Security (IJIRIS), 4(2).
      • Easttom, C. (2018). How to model digital forensics investigations with graph theory. Digital Forensics Magazine, 37.
      • Easttom, C. (2018). “A Systems Approach to Indicators Of Compromise Utilizing Graph Theory”. 2018 IEEE International Symposium on Technologies for Homeland Security.
      • Easttom, C. (2019). ” Conducting Investigations on the Dark Web”. Journal of Information Warfare 18 (1).
      • Easttom, C. (2018). A Method for Using Historical GPS Phone Records. Digital Forensics Magazine, 36.
      • Alsmadi, I, Easttom, C. (2019). Using Maximum Weighted Cliques in the Detection of Sub-Communities’ behaviors in OSNs. Proceedings of the Future Technologies Conference 2019.
      • Easttom, C. (2020). On the Application of Algebraic Graph Theory to Modeling Network Intrusions. 2020 IEEE 10th Annual Computing and Communication Conference.
      • Easttom, C. (2020). Mathematically modeling cyber-attacks utilizing engineering techniques 15th International Conference on Cyber Warfare and Security ICCWS
      • Easttom, C. (2021). Mathematically modelling victim selection in cybercrimes. 16th International Conference on Cyber Warfare and Security – ICCWS 2021
      • Easttom, C. (2021). A methodology for smart TV Forensics. 16th International Conference on Cyber Warfare and Security – ICCWS 2021
      • Easttom, C., Adda, M. (2021). Application of the Spectra of Graphs in Network Forensics. IEEE 11th Annual Computing and Communication Conference
    • Adjunct professor for University of Dallas teaching graduate digital forensics.
    • Adjunct Lecturer for Georgetown University in the Master of Professional Studies in Applied Intelligence department
    • Associate member of the American Academy of Forensic Sciences 2015 to 2018.
    • Frequently teaches forensics including to state, local, and federal law enforcement. His computer security and forensics courses are approved by the U.S. Department of Homeland Security National Initiative For Cyber Security Careers and Studies (NICCS).
    • Created the OSFCE (OSForensics Certified Examiner) course and test.
    • Frequent speaker at forensic conferences including: AAFS conference 2017, IAFLS Conference 2017 in Cairo, Secure Jordan 2016 and 2017, ADFSL Conference 2016, and ISC2 Security Congress 2014, 2015, and 2017.
    • Extensive experience testifying in court as an expert witness
    Dr. Easttom is an expert in computer forensics as well as portable device forensics (Cell Phone, Tablet, etc.). He has extensive expertise in forensic science, cell phone forensics, operating system forensics, network forensics, file recovery, and related topics.