Digital Forensics - Computer Imaging
Providing a full suite of digital and accounting forensic services.
Guernsey Forensic professionals include certified accountants, auditors, fraud examiners, and security professionals that provide a full suite of digital and accounting forensic services. For over 90 years, Guernsey has earned a reputation for quality and attention to detail that is essential for any investigation.
You need a team of good guys who are trained to think like the bad guys. That’s where our cybersecurity professionals come in.
Timothy Fawcett, CISSP, CISA, CSSA
Director of Cyber Security Consulting
Tim Fawcett is the Director of Cyber Security Consulting with Guernsey. He has extensive experience in performing risk assessments for IT environments and communicating best practices related to a range of systems and technologies. Tim started his career in information assurance and auditing in 2001. In his career, he has performed IT audits, risk assessments, and cyber threat and vulnerability analyses. Specific project topics include the areas of NERC-CIP compliance, PCI Data Security Standard compliance, ERP system security, application, and operating system security configurations, business continuity planning and disaster recovery, physical security, telecommunications, and security architecture and design.
Cyber Security Consultant
Isaac is an experienced pentester with experience from dozens of penetration tests. Working with companies of all fields and all sizes, he can communicate effectively and promptly with all parties involved. Other than pen testing, he has experience in physical security assessments and forensic work.
Digital Forensic Investigations
Uncovering and interpreting electronic data.
If your client or company needs computer and mobile forensics services, such as mobile device investigations or corporate data breach investigation, Guernsey’s team of forensic investigators has you covered. Using the same suite of tools that agencies like the FBI and state investigation agencies use, we can thoroughly and accurately examine any data present on a device in a forensically sound manner. In short, we are your go-to forensic weapon. Our evidence and examiners will be able to withstand the scrutiny of a criminal or civil investigation. Whether it is intellectual property theft, corporate espionage, misuse of company assets, incident response, divorce, or any other issues that may arise, we will be able to paint you an accurate picture of the data that we image and examine.
Our team is capable of collecting and examining iPhones, Android devices, computers, social media accounts, cloud storage, and removable media such as a USB drive or removable hard drives, among other devices.
Helping our Clients prevent and deter fraud.
Whether it is an analysis of digital information or financial records, our clients and partners benefit from a forensic team that includes Certified Public Accountants and Fraud examiners as well as economists and computer security experts. Examples of analytic include calculating disputed financial losses, Economic Damages Quantification, identifying financial discrepancies, embezzlement investigations, as well as business and asset valuation. We also help organizations design controls and processes to prevent and deter fraud.
Digital Forensic Litigation Support
We investigate and provide expert testimony.
Our professionals are uniquely qualified to investigate and provide expert testimony to support e-discovery, regulatory hearings, criminal trials, lawsuits, including intellectual property theft, fraud, employee misconduct, and family law and divorce cases.
We will often negotiate up-front, preferred pricing for law firms so that they can feel confident with our pricing when our services are needed. We have agreements in place with law firms that practice in Oklahoma City, Tulsa, Dallas, Houston, Norman, Bartlesville, Northwest Arkansas. Centrally located in the US, we can provide digital forensic investigation services to clients nationwide.
Preemptive Collection and Storage
Maintaining the integrity of evidence.
Preserving company computer assets, including mobile phones, computers, and cloud accounts, is a crucial step in the offboarding process if you suspect an employee of fraud, intellectual property theft, or other cases of misconduct that may result in termination or legal action. Collecting forensic images will allow you to preserve evidence that may be required during a trial, whether brought by you, or by the employee for wrongful termination.
With our advanced technology, we are often able to forensically collect images and files from computers without requiring physical access. We can even clandestinely investigate company computers without the knowledge of the employee.
Best in Class Tools
We use best in class tools in including Cellebrite (cellebrite.com), Magnet Axiom (magnetforensics.com), and other hardware and software used in the most advanced law enforcement labs in the country. These tools allow for forensic imaging and investigations of any electronic devices, from mobile phones to game consoles, to drowns. These tools aid in ediscovery by indexing and searching documents and images for keywords and other identifying information.
GSA Schedule 70
Engage Guernsey through Schedule 70.
Organizations that are eligible to purchase through GSA schedules can engage Guernsey through Schedule 70 - Contractor Awarded Unique Entity ID (DUNS): 062275144