Investigators & Technology Consultants
ESI & eDiscovery
Computerized information is sticky and can leave valuable artifacts and evidence behind, not only on computers and phones but also on tablets, social media, vehicle infotainment systems, cable modems and other data repositories. Whether requesting or responding, we help legal counsel ensure that relevant and pertinent data is not overlooked, and preservation requests are thorough. We also help counsel understand the value or in some cases the potential liability that lies within specific data productions.
Technology Consultants
Technology is evolving at an unprecedented pace, making planning, investment and analysis a challenging and rapidly moving target. We help organizations and stakeholders understand their current technology environment and develop plans for future success, including evaluation of current platforms and solutions, as well as uncovering deferred tech-debt, and investigation of prior incidents to confirm full and complete documentation and remediation.
Payment & Wire Fraud
Identifying initial vulnerabilities and a potentially negligent party for misdirected payments, bank fraud and other theft/fraud incidents can impact insurance coverage or 3rd party liability. Don’t wait until valuable evidence has been deleted or expired, reach out to us now to ensure evidentiary material is preserved and properly investigated in a timely and well documented manner to maximize client rights and recovery options.
Crypto-Currency
As the use of crypto currency by criminals, fraudsters and other malicious parties expands, our extensive experience in analyzing blockchain transfers can be valuable in detecting crime and identifying actors. We’ve worked on a wide array of cases that involved illicit payment and movement of funds around the globe, and have formidable experience in blockchain analysis.
Deep Web / Dark Web
The internet can be divided into three layers. Most people are only aware of, and operate within, the Surface Web, the level that’s indexed and can be accessed by browsers like Google and Bing. Less than 5% of the Web is in the Surface layer. The balance is in the Deep layer, where passwords are required for access, and the Dark Web, where site addresses are not publicly available, and special browser tools (TOR) are needed for access. The majority of illicit and illegal activity is in the Dark Web. Blackheart has extensive experience in navigating through these layers, and maintains a covert presence on forums and chat boards where stolen data and illicit products are distributed and monetized, to uncover potentially harmful client information that may have been exposed.
Cyber Extortion
Our extensive experience investigating and negotiating cyber extortion matters for a wide range of victims gives us unique perspective to help clients. Working in conjunction with law enforcement, legal counsel and insurers, we can help clients reach a satisfactory conclusion to what can be an otherwise catastrophic incident.
Take the Next Step
Ready to learn more about how we can help you achieve successful results . . .
Principals, Attorneys, Barristers and Other Qualified Parties Are Invited To Request A Copy Of Our Curriculum Vitae