About our Examiners
Altep employs a full-time staff of Certified Data Forensics Examiners who practice via our offices throughout the US and in the UK.
Our experts have a unique blend of experience and skill in the areas of information security, investigative techniques, forensic data analysis, jurisprudence and litigation support. This combination provides a well-rounded perspective on the requirements and limitations surrounding computer forensics and the Federal Rules of Civil Procedure.
Altep’s forensic investigators are recognized as leaders in their field, helping global clients uncover the data that can make or break their cases by utilizing state-of-the-art technology and forensically sound procedures and tools. Our Certified Forensic Examiners hold credentials including Certified Information Systems Security Professional, Certified Forensic Computer Examiner, EnCase Certified Examiner, Mac and iOS Certified Forensic Examiner, Cellebrite Certified Physical Analyst, and Data Forensics Certified Practitioner.
We are experienced in courtroom preparation and testimony, and in every case, we provide trial-proven, comprehensive yet understandable reports of all findings. We also have extensive experience working with corporate attorneys, outside counsel, internal investigative staff, and federal, state and local law enforcement. Some of our employees hold U.S. government clearance.
Altep has Certified Examiners stationed at our offices in
|Atlanta, GA||Phoenix, AZ||London|
|Chicago, IL||Red Bank, NJ|
|Dallas, TX||San Francisco, CA|
|San Diego, CA|
|El Paso, TX||Seattle, WA|
Our Principal Examiners
Warren G. Kruse II, CISSP, CFCE, EnCE, DFCP
Vice President of Data Forensics, author of “Computer Forensics: Incident Response Essentials” and technical editor of “Computer Forensic Jumpstart”
Timothy LaTulippe, CCE, EnCE, MiCFE, NECS, DFCP
Director, Altep Europe, and author of “Working Inside the Box: Real Life Example of GDS in a Forensic Examination,” which was published in The Journal of Data Forensics Security & Law, and “The Need for Targeted Collections in a Diminished Economy”
David Benton, EnCE, CISSP
Director of Data Forensics - Southern US, assisting clients throughout the Southern US with forensic data acquisition and analysis, evidence recovery, data breach investigations and information security. For the last 20 years, he has been employed in an investigative or forensics capacity for US Army Counterintelligence, the Georgia Bureau of Investigation and the Home Depot.
Senior Consulting Manager of Forensics, West Coast and Cross-Border, with broad and deep experience in the private sector as a Controller and Operations Manager, as well as significant expertise and a long track record of success in Data forensics, information security, and compliance.
Our Forensics Certifications
Non-Standard Data Sources
Altep’s Data Forensic Examiners are well-versed in complex data acquisition methods and have succeeded in fast-paced litigation involving a variety of non-standard and proprietary data sources.
- Various types of Apple hardware including iOS devices, MacBooks, legacy desktop systems and Apple servers
- New-to-market smart phones and tablets
- Legacy and unsupported dumb phones
Altep Examiners employ cross-validation methodology on phone acquisitions to ensure you are getting all possible evidence. Our Examiners do not believe that any one tool is good enough to have the final word; instead, we rely of a variety of platforms and techniques to fully explore each data source.
In addition to handling mobile devices and Mac systems, our teams have extensive experience in a variety of non-standard scenarios.
- Proprietary Corporate databases
- Cloud storage environments to include iOS backups of iPhones and iPads synced automatically or arbitrarily by end-users
- SharePoint servers
"Bring Your Own Device" poses governance and Information Security risks along with the potential for enhanced productivity.
As the availability, utility and versatility of mobile devices continues to evolve and expand, corporations and law firms face increasing pressure from employees, contractors and consultants to permit the use of personal devices on the organization's network. The trend, dubbed "Bring Your Own Device," or BYOD, poses serious challenges and risks for those charged governance and information security. First, there is the significant risk that permitting such connectivity might introduce viruses, malware and other forms of trouble into the organization's file servers, email systems and mission critical infrastructure. Second, there is the increased likelihood of data breaches, theft of proprietary information and trade secrets, and loss of intellectual property. In answer to these concerns, users cite improved productivity, ease of mobility, and a more satisfying end-user experience. So how can organizations reach a compromise between appropriate and adequate security, and the technology wants and needs of their internal client base?
Altep's Forensic Examiners and Solutions Engineers help corporations and law firms address the challenges of BYOD by:
- Assessing the existing technical infrastructure and security measures
- Identifying known weaknesses in proposed / desirable personal devices and recommending appropriate remediation
- Assisting in the development of a comprehensive BYOD policy
- Assisting in the development of Incident Response plans and remediation protocols to be employed in the event of a data breach or other negative outcome
Through proper planning, appropriate policy, and periodic review and assessment, organizations can successfully permit employees' use of personal devices, without sacrificing information security.
Altep’s Principal Data Forensic Examiners have testified in numerous State, Federal and Military proceedings of both criminal and civil varieties. They bring nearly 30 years' combined experience in law enforcement, information security, data forensics and investigations to every engagement.
- Expert for AMD on the AMD versus Intel antitrust litigation
- Served as the Expert for Continental and Cirrus Aircraft
- Testified as a Computer Forensic Expert for the US Securities and Exchange Commission (SEC) in the SEC vs. vFinance Investment Inc. matter
- Named Independent Court Expert in the NetJapan, Inc., et al. v. StorageCraft Technology Corporation matter
- Testified in New York Superior Court, Nassau County as an Expert in Computer Forensics
- Named the Court appointed expert for Union Pumps Company v. Centrifugal Technologies by US Magistrate Judge Hornsby, District of Louisiana.
- Testified as an expert for the American Arbitration Association
- Named as Independent Expert for an International Arbitrator
- Testified for Federal Grand Jury on Man Act case (18USC 2423(a)) - Transportation of a Minor to Engage in Criminal Sexual Activity
- Testified in San Diego Superior Court in a case regarding child molestation and possession of child pornography
- Testified at Naval ADSEP Board hearing regarding the dismissal of a Chief Technology Officer
After a decade of high-profile financial scandals, consumers, employees, regulators and the media have all become hyper-sensitive to corporate malfeasance. The merest suggestion of impropriety can quickly result in an investigation, and both the scope and frequency of regulatory activity have expanded.
Corporate leaders face ever-increasing pressure to ensure ethical behavior at every level in the organization. In many cases, at the first hint of an issue, those charged with governance will do well to launch an internal investigation, thus “getting out in front” of the situation. In light of the rising influence of social media, this may represent the best course to minimize damage to the organization’s credibility and reputation. In other situations, however, the organization has no advance warning and no opportunity to look into allegations independently.
Whether the organization is engaged in an internal investigation or responding to inquiries from Federal or State agencies, enlisting the help of highly-qualified forensic investigators can ensure that evidence is handled appropriately and that the chain of custody is properly maintained.
In an internal investigation, ensure thoroughness, objectivity and transparency.
- Understand the information hierarchy and ensure that the investigation targets appropriate data sources (individuals as well as devices.)
- Engage an objective third party with excellent credentials and reputation to manage the fact-finding process. It is not appropriate to ask employees to investigate their peers, for a number of reasons, and the involvement of a respected, disinterested party will help to reassure everyone involved.
- Take care to ensure that Upjohn warnings are handled correctly.
- Report findings to the appropriate agency, completely and transparently. Obfuscation will only further damage the organization’s credibility, increasing the likelihood of subsequent scrutiny and penalties. Especially in issues that involve the Foreign Corrupt Practices Act, prompt and complete self-disclosure and remediation can substantially reduce the impact of subsequent enforcement actions and/or penalties.
In a federal investigation, be prepared to cooperate fully and efficiently.
- Be aware of the kind of information that government investigators and auditors are likely to request. Develop a data map to track the devices from which you might need to collect data. Re-assess your environment regularly to keep the data map current.
- Be prepared to perform forensic collections if required; as noted above, engage the assistance of certified forensic examiners. Even if your own IT staff is capable of properly performing a forensic collection, the objectivity that an outside expert will bring to the process, and the weight that proper certifications carry, will bring significant credibility to your efforts.
- Respond quickly and comprehensively, and provide requested data in the agency’s preferred format.
Regardless of the nature of the investigation, utilize technologies and processes to effectively identify and assess potentially relevant materials.
Altep’s Forensic Examiners have broad experience as “embedded” analysts within the corporation, working to assist with investigations and compliance assessment initiatives. Our arsenal includes a variety of industry standard data acquisition and investigative tools, including Altep's custom-developed compliance assessment platform, Riskcovery, which can help pin-point areas of potential exposure in advance of regulatory action.