Latest Blog Post

read more

News and Events

September 5, 2014 - We're pleased to announced that Network Forensics Puzzle DVDs from 2011, 2012, and 2014 are all available on BytePuzzles!
 
January 27-30, 2015 - LMG will host our 4-day course "Network Forensics: Tracking Hackers Through Cyberspace." Register now or click for a quote!
 
March 24-25, 2015 - LMG will teach "Network Forensics: Black Hat Asia Edition" at Marina Bay Sands in Singapore. Sign up today!
 
read more
 
LinkedIn Reddit Delicious Technorati Twitter Digg Stumbleupon

 
Join our Email Newsletter

 
Class and Book

Want "Network Forensics" (the class) taught privately at your facilities? Request an Onsite

Order Network Forensics: Tracking Hackers Through Cyberspace!


 
Need Expert Consulting?

Request a Quote

Email Us an RFP



Legal Industry - Let Us Be Your Experts™
 

You have to stay on the cutting edge of technology, both in the office and in court. Electronic evidence such as GPS location records or deleted files may exist in places you don't expect. Our high-tech experts can develop a Digital Forensics Case Strategy for you, so that you know exactly what digital evidence you want for your case, and how to get it.

LMG is prepared to support you during all phases of litigation. We deliver concise and valuable reports to you on time so that you can effectively leverage electronic evidence. LMG can train your team to understand high-tech issues and present digital evidence at trial, or act as expert witnesses.

We can also provide you with expert guidance in office IT security and communications security, and help you comply with regulations such as HITECH.

 
Service Description Details
Digital Forensics Case Strategy

LMG's high-tech experts identify digital evidence that may exist for your case, create a prioritized list, and help you plan for obtaining digital evidence.

Digital evidence can make or break a case. Cell phones, laptops, desktops and network equipment can contain critical evidence that other attorneys may not even know about. LMG's high-tech experts show you what digital evidence may exist for your unique case, and help you develop a plan for getting it. Our staff will:

  • Identify digital evidence that may be obtainable
  • Create a prioritized list of recommendations for your case
  • Develop a strategy for obtaining key electronic evidence
  • Guide you through the digital evidence collection and analysis process
Cell Phone, Computer and Network Forensics

Recover critical evidence from cell phones, laptops, desktops, servers and tablets.

Extract evidence from:

  • Cell phones, Blackberries and tablets
  • Laptops and desktops
  • Web servers, email servers, databases, etc.
  • Network equipment
  • Cameras

Recovered data can include:

  • Text messages and call records
  • Deleted files and file fragments
  • Web surfing history
  • GPS location history
  • ...and much more.

HITECH Compliance Comply with the HITECH Act (section 13401(a)) and receive a letter of certification. Suitable for law firms which handle medical information on behalf of doctors, hospitals or insurance companies.

Let us guide you through compliance with the HIPAA Security Rule, required by the HITECH Act. Options include:

Office IT Security

Your office's IT infrastructure is functional, but is it secure? Do viruses, spyware, and software vulnerabilities place your confidential client informtion at risk? Make sure your IT systems are diligently secured.

Ensure that your office's network is as trustworthy as your firm by conducting:

E-Discovery

Discovery of electronic records and evidence has become an integral part of both civil and criminal litigation. LMG consultants are experts in e-discovery techniques.

We can help you:

  • Respond to e-discovery requests
    • Understand what's being requested;
    • Find and deliver the data (using forensics if needed).
  • Craft e-discovery requests
  • Train your team to understand and present electronic evidence with confidence.
Expert Witness Testimony

LMG consultants are internationally recognized authors and teachers. We can provide expert witness testimony regarding e-discovery, computer security, and digital forensics.

Our credentials include:

  • Authors of the forensics textbook, Network Forensics (Prentice Hall, 2012);
  • Recognized IT security certifications, including CISSP, GCFA, GPEN, and GWAPT;
  • Instructors at highly competitive security training venues such as Black Hat Technical Security Conference and the SANS Institute;
  • Respected speakers and published authors on the topics of information security and digital forensics;
  • Among the most widely recognized and highly qualified professionals in the industry.