Latest Blog Post

read more

Upcoming Events

September 16, 2015 - LMG will teach "Digital First Responder Training" at our World Headquarters in Missoula, MT. Sign up now!

September 22, 2015 - LMG will teach "Digital First Responder Training" in Billings, MT. Sign up now!


Congratulations to all the teams that participated in the Network Forensics Puzzle Contest at DEF CON 23! View contest results, hints, and passwords here.

We're pleased to announced that Network Forensics Puzzle DVDs from 2011, 2012, and 2014 are all available on BytePuzzles!

LinkedIn Reddit Delicious Technorati Twitter Digg Stumbleupon

Join our Email Newsletter

Send your cybersecurity questions to for the chance to have them answered in our newsletter!

Class and Book

Want "Network Forensics" (the class) taught privately at your facilities? Request an Onsite

Order Network Forensics: Tracking Hackers Through Cyberspace!

Need Expert Consulting?

Request a Quote

Email Us an RFP

Digital Forensics

LMG's staff are world-class leaders in forensic investigation. As published authors and instructors, we help set the standards for the industry. Whether you're recovering web surfing history from a laptop or GPS location data from a mobile device, LMG can get the job done quickly, effectively, and rigorously. Our high-tech experts can also develop a Digital Forensics Case Strategy for you, so that you know exactly what digital evidence you want for your case, and how to get it.

LMG's forensic services include:

For every investigation, we carefully preserve evidence, provide extensive documentation suitable for use in court, and take the time to fully explain our findings to you. We also work with your team to advise regarding next steps, given your resources and investigative goals. Our team of certified forensic analysts are diligent and professional, and can serve as expert witnesses.

Service Description Details
Digital Forensics Case Strategy

LMG's high-tech experts identify digital evidence that may exist for your case, create a prioritized list, and help you plan for obtaining digital evidence.

Digital evidence can make or break a case. Cell phones, laptops, desktops and network equipment can contain critical evidence that other attorneys may not even know about. LMG's high-tech experts show you what digital evidence may exist for your unique case, and help you develop a plan for getting it. Our staff will:

  • Identify digital evidence that may be obtainable
  • Create a prioritized list of recommendations for your case
  • Develop a strategy for obtaining key electronic evidence
  • Guide you through the digital evidence collection and analysis process
Cell Phone, Computer and Network Forensics

Recover critical evidence from cell phones, laptops, desktops, servers and tablets.

Extract evidence from:

  • Cell phones, Blackberries and tablets
  • Laptops and desktops
  • Web servers, email servers, databases, etc.
  • Network equipment
  • Cameras

Recovered data can include:

  • Text messages and call records
  • Deleted files and file fragments
  • Web surfing history
  • GPS location history
  • ...and much more.


Discovery of electronic records and evidence has become an integral part of both civil and criminal litigation. LMG consultants are experts in e-discovery techniques.

We can help you:

  • Respond to e-discovery requests
    • Understand what's being requested;
    • Find and deliver the data (using forensics if needed).
  • Craft e-discovery requests
  • Train your team to understand and present electronic evidence with confidence.
Expert Witness Testimony

LMG consultants are internationally recognized authors and teachers. We can provide expert witness testimony regarding e-discovery, computer security, and digital forensics.

Our credentials include:

  • Authors of the forensics textbook, Network Forensics (Prentice Hall, 2012);
  • Recognized IT security certifications, including CISSP, GCFA, GPEN, and GWAPT;
  • Instructors at highly competitive security training venues such as Black Hat Technical Security Conference and the SANS Institute;
  • Respected speakers and published authors on the topics of information security and digital forensics;
  • Among the most widely recognized and highly qualified professionals in the industry.