TCS Forensics lab is equipped with up to the minute hardware and software to ensure that we can perform data analysis faster and more thoroughly than our competitors. Our examiners are trained and certified to perform digital forensics investigations using Guidance Software’s EnCase forensic (EnCE) and Access Data’s (ACE) who are pioneers in the field of legal computing and cryptography forensics. These two forensics suite have lead the industry since the field of digital forensics was in its infancy. No other forensic suites have been validated more times in case law, all the way to the Supreme Court in Canada, US, UK and Australia. Our examiners are also certified and trained in the field of Penetration/ Vulnerability testing and with our associates we offer the highest level of Risk Management and e-Discovery.
Our clients have come to know and depend on TCS to provide court-admissible forensic evidence that is backed up by expert testimonies when their case depends on it. TCS continues to develop and deliver an acclaimed series of legal education seminars on computer forensics, mobile forensics, social engineering and e-Discovery for our clients. Our clients span from coast to coast (Vancouver to Halifax) in Canada, the United States in Washington DC, Texas, California, Washington State and have the confidence of knowing each case is handled by experienced & certified professionals.
TCS Forensics has guest lectured at the University of British Columbia law faculty, the paralegal program at Capilano University, the computer forensics program at BCIT (British Columbia Institute of Technology) and is recognized by the law society.
What we do
We can investigate and recover deleted files from Computer Hard drives, USB drives, External devices, over 5200 types of mobile phones, iPads, iPhones, and tablets to assist your case. TCS is also famous for the Penetration testing, Risk Management, e-Discovery and Cyber (Terrorism, Threats, Crime) Intelligence for your firm.
- Provide an overall forensics analysis
- Extract possible evidence from any storage devices
- Penetration & Vulnerability testing to keep out hackers
- Provide international & global threat assessment
- Protect the subject computer system or device
- Analyze all possibly relevant data found
- Provide expert consultation and/ or testimony