top of page
IMG_0035.jpeg

PRACTICE AREAS

The CFS Team has over 120 years of combined experience in forensic collection, analysis, and testimony in a wide range of forensic and incident response engagements. CFS has conducted ongoing forensic analysis, incident response, and/or training for large, multi-national corporations, numerous governmental agencies, as a judicial court neutral in complex litigation, and as a trusted resource for corporate and private counsel.

Code

DIGITAL FORENSICS

Computer forensics is the scientific process of capturing (imaging) and analyzing information stored in any electronic format, for the purpose of investigating allegations, to find the truth, with no predisposition as to the outcome.

 

It encompasses a number of services:

  • Disk Forensics: The process of acquiring and analyzing the data stored on physical storage media (computer hard drive, cell phones, PDAs, removable media, etc.). Disk forensics includes both the recovery of hidden and deleted data and also file identification.

  • Network Forensics: The process of examining network traffic, including transaction logs and real-time monitoring, using sniffers and tracing.

  • Internet Forensics: The process of piecing together where and when a user has been on the Internet or internal company network. This is used to determine whether inappropriate Internet content access and downloading was inadvertent or not. It is also used to determine if sensitive information was emailed inappropriately using a personal email account.

  • Email Forensics: The study of source and content of electronic mail as evidence. It includes the process of identifying the actual sender, recipient, date, time and location and from where the email originated. Email has become a significant issue for individuals and organizations. Harassment, discrimination or unauthorized activity violating company policy can be identified via email forensics.

  • Cloud Forensics: The process of acquiring and analyzing the data stored in cloud servers. CFS has conducted numerous cloud acquisitions and understands the legal and ethical considerations surrounding this form of preservation.

blur-chains-chrome-220237.jpg

INCIDENT RESPONSE

CFS is capable of responding to a security incident, event, or network-type intrusion. CFS conducts a scope assessment with the client, followed by a data acquisition plan involving a variety of potential sources/devices. Once data is acquired, CFS begins its forensic analysis and investigation to obtain a comprehensive view of a suspected security breach and reconstruct event activity. CFS then utilizes the analysis data and forensic artifacts to identify any additional threats with the ultimate goal of assisting the client contain the threat(s) and begin a remediation process. CFS remains ready to provide clients with additional consultation on where gaps occurred in their security posture and work to help prevent future incidents or attacks.

blur-chains-chrome-220237.jpg

SECURITY ASSESSMENTS

CFS is capable of conducting complete security assessment services. The security assessment includes, but is not limited to; policy review, technical vulnerability scanning, network architecture review, social engineering simulations, and penetration testing. Testing can be done with as little or as much knowledge as desired by the client. CFS will work with our clients on how you prefer results to be communicated with your organization.

black-and-white-electronics-illuminated-

DISCOVERY

Electronic discovery involves more than merely recovery of computer data. It involves proper evidence handling and preservation, sifting information through a thoughtful investigative process, and providing results in a form that can be used by a non-technical lead attorney or court. Electronic discovery is accomplished most effectively when performed in conjunction with a case strategy and an experienced forensic consultant.

accident-barrier-caution-tape-923681.jpg

LAW ENFORCEMENT SUPPORT

CFS is proud to provide services to the law enforcement community!  As former law enforcement officers we understand the demands of forensic work in the public sector and regularly provide services or additional support when needed.

 

CFS’ control and maintenance of electronic evidence comports with the highest standards in the field.  CFS serves as the digital forensic crime lab  for numerous law enforcement agencies and County Attorney’s offices in Minnesota.  All of our public and private sector client’s information enjoy the same protections which are required by complex criminal investigations, regulations, laws, and litigation practices.

 

CFS simultaneously manages hundreds of ongoing civil and criminal matters that require a tightly controlled and documented chain of custody.  All of CFS’ procedures are designed to ensure legal admissibility. 

 

Furthermore, CFS conducts the annual in-service training for a number of Federal Circuits, including the 8th Circuit (District of Minnesota), and state judicial conferences, focusing on electronic evidence chain-of-custody best practices.

Handshake

LITIGATION

In addition to performing electronic discovery and forensic analysis, Computer Forensic Services (CFS) also provides extensive litigation support services. Recovering information and finding the key evidence is only the beginning. The matter must be prepared, depositions conducted, and expert witness testimony provided.

unnamed.jpg

EDUCATION

CFS regularly presents on various cybersecurity or forensic and evidence handling topics across the country for a wide variety of public and private sector organizations and groups, as well as educational institutions.

 

In addition, Mark Lanterman has provided training in digital forensics for the United States Supreme Court, and has keynoted the Federal Bar Association Convention, the 11th Circuit Federal Judicial Conference, the 8th Circuit Federal Judicial Conference, the Department of Homeland Security Cybersecurity Conference, the Minnesota Government IT Symposium, and the Minnesota Criminal Justice Institute. 

 

Mark provided the keynote address to the Georgetown Law School’s advanced E-discovery conference and was the keynote speaker at the Chief Justice’s Conference.

 

Mark is faculty at the Federal Judicial Center, the National Judicial College in Reno, Nevada, Mitchell Hamline School of Law, and the University of Minnesota’s Cybersecurity and Forensics Program.

 

Mark is also a professor at the University of Saint Thomas Law School, teaching its Cybersecurity program. The Minnesota Supreme Court appointed Mark to the Lawyers Professional Responsibility Board, where he serves as the Chairman of its Opinion Committee.

Digital Forensics
Information Security
Discovery
Law Enforcement
Litigation
Education
Incident Response

COMPLIMENTS

CFS prides itself on providing the highest quality and unmatched exceptional service deliverables to its clients.

“Thank you for your contribution to the Eleventh Circuit Judicial Conference…your presentation on the Dark Web was a smash hit!  Without exception, everyone found it fascinating (and a little frightening at the same time!)…..”

Chief Judge, U.S. District Court, Northern District of Florida

"Plaintiffs retained the services of Mark Lanterman, a highly qualified computer forensic expert....Mr. Lanterman's testimony at the permanent injunction hearing was extremely helpful to the Court and critical to the Court's findings."

Court of Common Pleas

Cuyahoga County, Ohio

“As always, we can't thank you enough for a dynamic, thought-provoking presentation  Your sessions are so unique and the attendees loved it.  THANK YOU for sharing your time with lawyeers all over the country!”

Colorado State Bar Association

“…But they did not realize the magnitude of what they had until they asked…..Computer expert Mark Lanterman discovered that spreadsheets from a critical point in the map-drawing process were missing and that software to wipe the files had been used….”

Washington Post

(US Supreme Court Case on Wisconsin's Gerrymandering)

"The proposed independent examiner, Mark Lanterman, should perform the forensic examination of the computers... To begin, it is clear that Mr. Lanterman is well qualified to perform this forensic examination..."

United States District Court

Eastern District of Wisconsin

"So to that extent, counsel is directed to the Lanterman protocol ...that has successfully been used by attorneys for years."

District Court order

No. 27CV09-027889

bottom of page