Services

Services

Service Offerings

Take a look at some of the Maryman service offerings to gain an insight into how we support and assist our clients with their Cyber Investigations, litigations, and projects.

The Maryman team of experts have been qualified as digital forensic experts in local, state, federal and international courts.

Contact us today at 818-290-3775 to discover how engaging a Maryman team of experts may assist your case.

Digital Forensics Analysis
Autonomous Device Forensics

Unmanned Aerial Vehicles (UAVs)
Unmanned Maritime Vehicles
Drones
Autonomous Vehicles
Robots

Cyber Investigations

Participant and Suspect Technical interviews
Cyber Stalking & Digital Harassment
Business Email Compromise (BEC) and Wire Fraud
Email Fraud and Internet Fraud
Fraud using personal information (theft and misuse of personal data)
Theft of financial data or bank card data
Theft and sale of corporate data
Cyber blackmail (demanding money to prevent a cyber-attack)
Cryptojacking
Cyberespionage
Cryptocurrency Theft
Cryptocurrency Tracing

Deep Web and Dark Web Investigations
Deep Web Searches Dark Web Searches Dark Web Monitoring
Digital Device Forensics

GPS Units
Vehicle Navigation Systems
Routers
Switches
Modems
Printers

Digital Forensics Analysis

Digital Forensics Consulting
Collection, Preservation, And Analysis Of Digital Artifacts
Class Action Litigation Support
Data Validation
Data Destruction Certification
Online/Cloud Data Validation
Litigation Support
Analysis of corporate intellectual property theft
Deleted File Recovery
Investigations that may require Breach Notification
Extraction of Internet and Social Media history
Litigation support for ongoing cases and matters
Deleted File Analysis & Evidence Data Recovery
Metadata Analysis
Human Resources (HR) Investigations
Internal Investigations
Data Searching and Filtering
Data Mining
Imaging Electronic Media
Database Queries
Queries Across Multiple Databases
Creating Evidence Repositories
Data De-Duplication
Vehicle Infotainment Forensics
Wearable Technology Forensics
Back-up Data Retrieval and Analysis
Insurance Claims Support
Click Fraud
Labor Law Abuse
Employment Contract Violations
Financial Ledger Fraud
Time and Attendance Fraud
Self-Dealing Investigations
Salary and Wage Fraud
Family Law Disputes
Computer Intrusion
Sexual harassment
Wrongful Termination
Computer Misuse
Computer Fraud and Abuse
Plaintiff Client Support
Defense Client Support
Multi Media Forensics
Child Pornography Investigations
Child Sexual Abuse Material (CSAM) Investigations
Cloud forensics
Online Account Fraud
Child Exploitation
Mergers and Acquisition Due Diligence Services
EEOC Violation Investigations
Insider Threats and Accidental Data Loss
Advanced Persistent Threats (APT)
Third Party and Vendor-Related Risks
Malware, Keyloggers, and Backdoors
Targeted Intellectual Property Theft
Payment Card Fraud (PCI/PFI)
Web Application Attacks and Password Theft
Network Forensics
Automotive Forensics Services
Personal injury cases
Insurance fraud investigations
Accident reconstruction
Civil or criminal litigation
Proving or disproving an alibi
Bankruptcy/Insolvency cases
Receivership cases
Intellectual Property Theft
Patent and Trademark Disputes
Theft of Trade Secrets
Breach of Fiduciary Duty
Partner Disputes
Broker/Dealer Disputes
Embezzlement
Contract and Business Disputes
Employment Issues
Contract Disputes
Regulatory Actions
Matrimonial and Family Matters
Probate Matters
Trust Disputes
Cyber Harassment
Audio Video Forensics
Deceased Person’s Data
Business Valuation
Due Diligence Matters
Missing Persons Support
Minor Children’s Communications Monitoring
Data Exfiltration
Trade Theft
Intellectual Property Theft
Metadata Analysis
ESI Spoliation
Anti-Forensics Analysis
Digital Pornography Analysis
Business Computer Abuse
Manufactured Digital Evidence Investigation
Online Gambling Analysis
Business Computer Abuse
Embezzlement Investigations
Insurance Fraud Investigations
Alibi Analysis
Remote Forensic Services
Personally Identifiable Information (PII) Analysis
Governance and Compliance Analysis
Call Detail Record (CDR) Analysis
Cell Site Analysis
Big Data Analytics

Digital Forensics Incident Response

Breach Response
Ransomware Response

Electronic Discovery (E-Discovery eDiscovery e-Discovery)

Collections
Processing
Analytics
Productions
Assisted Review
Technology Assisted Review

Estates, Trusts, and Probate Matters
We can help you determine the authenticity of electronic wills, trust, and probate documents to ensure the proper documents have been or are being submitted to the Court. Dealing with lost and outdated documents, forgeries, and unauthorized edited versions of documents are not an uncommon issue in the settlement process.

Let the Maryman team assist you with the document authentication needs of your case.

The Maryman team of experts have been qualified as digital forensic experts in local, state, federal and international courts.

Contact us today at 818-290-3775 to discover how engaging the Maryman team of experts may assist in your case.
Expert Witness Testimony Services

Expert Witness Testimony Services

Government Contract Services

Forensic Support of Federal, State and Municipal Criminal Investigations and Civil Litigations.

Internet of Things (IoT) Device Forensics

Fitness Trackers
Smart Appliances
Smart Home Devices
Connected Vehicles
Wearable Devices
Medical Implant Devices
Motion Sensors
Environmental Sensors
Biometric Devices
Voice Assistants
Security Systems
Smart Watches
Smart Glasses
Smart Locks
Virtual Reality Devices
Point of Sale Devices
Industrial Control Devices
Personal Transportation Devices
Logistics Tracking Devices
Medical Monitoring Devices

Law enforcement liaison services

Law enforcement liaison services

Mobile (Cell Phone) Forensics

Preservation Of Phone Data
Hacked/compromised Phones

iPhone, Android, and smartphone devices

Recovery of Deleted Mobile Data

Such as Text Messages, Pictures, Audio Video files, Contact Lists, etc.

Phone Log Reconciliation

Phone Log Reconciliation Service is designed to completely manage a process that can be very time consuming if not automated appropriately. Phone logs come in various formats, including digitally archived as images and spreadsheets, as well as in paper format. Each phone company and cell phone provider has its own proprietary format for storing and presenting records. These formats require standardization in order to generate a comprehensive analysis. Data Triage Technologies executes a process of Optical Character Resolution (OCR) as well as Quality Assurance to ensure the information is correctly entered into a database able to handle the various formats.

Location and GPS Forensics

Neutral Forensic Services

Court Appointments
Both Plaintiffs and Defendants
Cross Complainants

Participant/Suspect Technical interviews

Participant/Suspect Technical interviews

Polygraph Administration & Analysis

Polygraph Administration & Analysis

ProAct™ DFIR Services
Incident Response Plans

Customized to your company’s network

Incident Response Plans

Prepare

Detect & Analyze

Contain, Eradicate & Recover

Post Incident Handling

DFIR Preparedness

DFIR Workshops

DFIR Retainer Services Program

Services are available in Four Service Level Packages

Tabletop Exercises

Threat Intelligence Briefings

DFIR Plans Assessment

DFIR Plans Development

Threat Hunting

Network Mapping

Collect and Preserve

Analyze and Hunt

Respond, Report and Recommend

Emergency DFIR Response

Social Media Forensics
Social Media Analytics
Digital Footprint Determination
Online Activity Analysis
Online Vulnerability Assessment
Technical Surveillance Counter Measures (TSCM) (Bug Sweeps)

Technical Surveillance Counter Measures (TSCM) (Bug Sweeps)

Training

CLE Training
Table Top Exercises
Forensics For Attorneys Sessions

Forensics familiarization for litigators and General Counsels

Forensic Tools Training to Law Enforcement and Government Agencies

“I have worked with Maryman on many complex data breach responses and security incident investigations. I consider them to be among the very best at what they do, both in terms of their technical expertise and their knowledge of current and emerging cyber threats throughout the world. Also, their ability to effectively communicate complex technical information to lawyers and business leaders adds to their value as a resource.”

Michael A. Gold
Jeffer Mangels Butler & Mitchell LLP
Scroll to Top