Projects

Nothing speaks more to Catzen Forensic’s capabilities in computer forensics than examples of our work and the testimonials of our clients.

Forensic analysis of multiple compters and devices deployed to prove deed fraud.

A series of deeds were filed with the county and dated, notarized and signed at a point where council for the plaintiff believed that the deeds were not yet created. [read more] Catzen Forensics recovered information from a recently formatted hard drive that showed the creation and existence of the deeds after there alleged signing. The actual deeds were recovered and found to contain “undo” information that showed the suspected back date change.[/read]

Persistent forensic analysis utilized to find lost files and secure a strong defense in medical malpractice case.

A pain management practice was accused of insurance fraud; manipulating patient records after the filing of a law suit. This claim put the practice at risk of defending the claim without the assistance of their malpractice insurer.
[read more=”Read More” less=”Read Less”]Through imaging, analysis of multiple computers and access to the practices’ hosted medical records system, Catzen Forensic located the missing documents, determined why they were no available when the system was searched, and documented a deficiency in the web based medical records management system that allowed transcription and posting of records without all the necessary data. Mystery solved. Malpractice insurer was held to defend the case which was ultimately settled.[/read]

Data Recovery critical in reclaiming 4 Raid Arrays with 100% of data recovered.

A vendor in the software services industry located in New York sustained the loss of 4 raid arrays in a mission critical server. Lack of a suitable backup, and old technology on an obsolete and failed controller made the task more difficult. [read more=”Read More” less=”Read Less”]Catzen Forensic responded within 24 hours of the initial client call and imaged each element of each raid set and despite some failed array set elements and failed file systems was able to rebuild all of the RAID 5 arrays for 100% recovery.[/read]

Data Destruction necessary to delete stolen documents and keep financial information secure.

A large financial services company claimed an employee removed sensitive documents upon their departure. Catzen Forensic was retained as part of the settlement agreement to locate those documents. [read more=”Read More” less=”Read Less”] Once located, Catzen forensically delete them from multiple systems and the financial services company’s sensitive information was safe. [/read]

E-discovery (ESI) by Catzen locates documents in 24 hours; found the “needle in a haystack.”

Catzen Forensic was engaged to locate documents for a $40MM lawsuit. The engagement involved the collection and searching of 3.8 TB as directed by the Court within 24 hours. The collection involved multiple platforms and 6 custodians. [read more=”Read More” less=”Read Less”]The first pass isolated approximately 180 documents\emails for review of which 120 documents and emails were produced along with privilege logs. This engagement also involved the search of unallocated space and recovery of deleted documents to ensure full compliance with the court order per customers request. While the document counts were extremely low (as expected by client and counsel) this case highlights the ability of the Catzen Forensic to find the “needle in the haystack”.[/read]

Data discovery allows evidence to be preserved in case of future litigation.

A class action lawsuit involving a multi-billion dollar corporate merger required data preservation and extraction of a board member’s computer and other external media. Catzen Forensic, who responded within 24 hours of the original call from the New York-based client,  was selected to image the computer hard drive and other media and perform an on-site search for case specific data. [read more=”Read More” less=”Read Less”]The extracted data was preserved under seal in the event that further evidence would be required for discovery. [/read]

Proof of system invasion leads to legal termination of employee.

Bank IT Employee used administrative access to acquire their HR performance review. Catzen Forensic was retained to provide methodology and chronology of how the file was acquired, [read more=”Read More” less=”Read Less”]the password crack, and the evidence deleted. Based on the findings, the employee was subsequently fired without recourse. [/read]