AMR Forensics provides expert digital forensics services to lawyers and law firms across California and the rest of the United States. We believe in being a valuable partner to lawyers and law firms who will benefit from receiving the best evidence possible to assist their clients. We conduct investigations into digital devices to determine key facts like who, what, where, when and how.
Our services are often called upon by lawyers and law firms in cases involving: criminal law; intellectual property theft by an employee of a business; employment and labor disputes; workplace investigations; family law litigation; and in many other litigation matters.
In many other contexts, it is helpful for lawyers to have a trained, qualified and independent expert extract important evidence from a computer or mobile device so that it can be relied upon in court. For example, communication between relevant parties by way of email, text messages or communication apps like Facebook Messenger, WeChat, WhatsApp, Telegram, Signal and others as well as call logs can be vital evidence in certain cases.
When would you want to hire a digital forensics professional? Digital forensics can be used in both criminal and civil cases. Simply put, any device that can store data can potentially be analyzed for evidence. For example, the following devices are easily analyzed: laptops, desktop computers, smart phones, external or USB hard drives, thumb drives, SD cards, iPads, iPhones, tablets, digital cameras and GPS. Most cases these days usually involve at least a laptop or cell phone.
Our Expertise

Criminal Law
Criminal law cases often involve differing versions of the same event told by two or more people.
In order to resolve this issue, we can examine the evidence found on digital devices to assist in determining which version of events is more accurate. In many criminal cases, the charge itself will involve some allegation of the use of technology, social media or the internet, and it will be obvious that you should consult with us regarding the particular aspects your case.

Employment Law
Employees use technology, computers and cell phones in the workplace to a greater degree than ever before.
There are also a number of workplace policies that govern the use of technology and the internet in the workplace.
When employees contravene, or are alleged to have contravened, one of those policies, it is important to know the facts involved so that appropriate discipline or dismissal decisions can be made in a way that will stand up under possible future scrutiny.

Estate Litigation
Family members often have access to personal and confidential devices and accounts of loved ones in the final moments of their life.
For some, the temptation to manipulate documents and data from computers and cell phones of the deceased in the hopes of financial gain is too powerful to resist. Suspicions of this kind should be carefully and thoroughly investigated to ensure the true wishes of the deceased are effected.

Human Resources
Employees use technology, computers and cell phones in the workplace to a greater degree than ever before. There are also a number of workplace policies that govern the use of technology and the internet in the workplace.
When employees contravene, or are alleged to have contravened, one of those policies, it is important to know the facts involved so that appropriate discipline or dismissal decisions can be made in a way that will stand up under possible future scrutiny.

Family Law
The breakdown of a committed relationship is an emotionally challenging situation to endure for the parties.
Communication between former partners tends to shift from verbal to digital, through text messages, social media, email and communication apps.
Often times, things are said in conversations that need to be put in front of the Court when determining important issues in these proceedings, particularly child custody and access issues.

Intellectual Property
Intellectual property theft by the most trusted asset of a business – its employees – is a common problem that can result in significant financial losses to the employer.
Common targets of this kind of theft or unauthorized reproduction are, not only traditional intellectual properties like patents, trademarks and copywritten works, but also confidential information like proprietary business processes, pricing structure and customer lists.
Contact a Computer Forensics Expert
Just as we band together with other similarly skilled professionals, we offer our services to other laboratories as well. We specifically specialize in cell phone data extractions, computer forensics, and data recovery for other devices. If you are in need of a professional opinion or would like to utilize our broad experience of complex systems, we would be happy to partner with you.