Cyber Tech Investigators & Consultants
ESI & eDiscovery
We don’t just search for documents, Blackheart leverages and exploits technology to provide leading edge insight and asymmetrical advantage to our clients.
Beyond the typical identification of documents and readily available files, we craft efficient and proportionate strategies to identify critical data repositories, map communication flows, extract relevant content and analyze pertinent artifacts.
By developing and executing a strategic plan to identify all relevant data and help counsel assess its significance, we provide critical details to counsel giving them a holistic understanding of not only the file contents, but also the “who, what, when, where and why” related to each item.
Computerized information is “sticky” and can leave valuable details and evidence behind, not only on computers and phones but also on tablets, cloud applications, social media, vehicle infotainment systems and other data repositories. Whether requesting or responding, Blackheart helps legal counsel ensure that relevant and pertinent data is used to its fullest advantage. We can also help counsel assess the value or in some cases the potential liability that lies within specific data productions.
Cyber Crime
Payment & Wire Fraud
Identifying a potentially negligent party for misdirected payments, bank fraud and other theft/fraud incidents can impact insurance coverage or 3rd party liability. Don’t wait until valuable evidence has been deleted or expired, reach out to us now to ensure evidentiary material is preserved and properly investigated in a timely and well documented manner to maximize client rights and recovery options.
Deep/Dark Web
The internet can be divided into three layers. Most people are only aware of, and operate within, the Surface Web, the level that’s indexed and can be accessed by browsers like Google and Bing. Less than 5% of the Web is in the Surface layer. The balance is in the Deep layer, where passwords are required for access, and the Dark Web, where site addresses are not publicly available, and special browser tools (TOR) are needed for access. The majority of illicit and illegal activity is in the Dark Web. Blackheart has extensive experience in navigating through these layers, and maintains a covert presence on forums and chat boards where stolen data and illicit products are distributed and monetized, to uncover potentially harmful client information that may have been exposed.
Cryptocurrency
In some instances threat actor activity may be trackable, creating an opportunity for potentially recovering funds obtained through illicit activities. However, speed and timing are crucial as funds can move quickly through multiple wallets and blenders, making seizure difficult. As each instance is unique, we encourage victims and/or their legal counsel/insurers to reach out to us immediately to assess the likelihood of successfully recovered cryptocurrency tied to criminal activity.
Cyber Tech Consulting
Cyber technology is evolving at an unprecedented pace, making planning, investment and analysis a challenging and rapidly moving target. We help organizations and stakeholders understand their current technology environment and develop plans for future success, including evaluation of current platforms and solutions, as well as uncovering deferred tech-debt, and investigation of prior incidents to confirm full and complete documentation and remediation.
A key element of pre-deal due diligence is understanding the status and viability of underlying technology, whether it be a new software product or the operational IT employed by a mature entity. Blackheart can help stakeholders understand the current condition, limitations and dependencies of technology and uncover deferred technology that may require unforeseen, incremental investment. We can provide insight so that fair and accurate values can be properly documented, and post-closing surprises can be greatly minimized.
Take the Next Step
Ready to learn more about how we can help you achieve successful results . . .
Principals, Attorneys, Barristers and Other Qualified Parties Are Invited To Request A Copy Of Our Curriculum Vitae