Learning Center
Plans & pricing Sign in
Sign Out




More Info


magine the scenario … The chief executive

of a global pharmaceutical company has just been woken in his London hotel with the worst possible news of his career. The formula for the world’s first successful cancer cure, which cost billions to develop, has been stolen – by a member of his staff on the other side of the world in Australia. While the drugs company chief slept, the enemy within was busy communicating vital secrets to accomplices at a counterfeit drugs factory thousands of miles away in South America via a covert internet chat channel, before fleeing to the airport.

In cases of IP theft, a fast global response is crucial if vital clues are to be detected before the trail goes cold.

A hopeless case, right?
The chief executive picks up his mobile phone and rings his company’s forensic computing expert. He’s lying on a beach in Hawaii when the call comes in. Within minutes he has powered up his wireless laptop, accessed the suspect digital media and taken an evidentially-sound image of its contents – including the IP addresses of every recipient of the stolen information. Within hours investigators, acting on the newly recovered intelligence, raid the factory, recover the formula and round-up the suspects. Sounds like a rather far-fetched script for a TV drama? Of course, this story is completely fictional, but it is also perfectly plausible, thanks to a unique new solution from Evidence Talks. In fact we conceived Remote Forensics for almost exactly this sort of digital ‘incident’. We recognised long ago that businesses and organisations which operate in multiple geographical locations need a fast, cost-effective strategy for dealing with digital forensic issues. It is now simply too late – and expensive – to despatch a forensic investigator to the airport for a long-haul flight to the scene of an incident. This is particularly true when dealing with intellectual property, where speed of response is vital if the big players are to be identified and apprehended. Global companies need a global response if they are to protect themselves from the ever-increasing threats of the internet age. Staffing each location with the appropriate forensic or investigative skills is simply not cost effective. Remote Forensics enables them to respond faster to suspicious activities and incidents, mitigate their risk and make huge cost savings into the bargain.

Andrew Sheldon reports


speed is of the essence to beat IP thieves

Remote Forensics
So how does Remote Forensics work? Remote Forensics consists of two core elements: a hardware POD which sits at each of the client’s remote risk locations; and FIMS, a sophisticated and secure webbased case management application which acts as a bridge between the PODs, the incident manager and the forensic analyst. At the first sign of a problem, the incident manager creates a case in FIMS (Forensic Incident Management Service). FIMS stores all case data in a secure and traceable manner then alerts a nominated forensic expert that a case requires attention. Then, replicating the stages of authority normally associated with a traditional incident response, FIMS allows the case manager to authorise the forensic analyst to perform the work and grant access to the POD.

Once authorised, the forensic expert can electronically deliver specific incident response forms, generated by FIMS on a case by case basis, to a first responder at the remote location, who only needs basic technical support skills. They are guided by the forms to remove the suspect media and place it in the write-protected bay of the POD. This media can then be securely accessed by the forensic expert via the unique FIMS VPN and can be forensically imaged or examined in a totally secure environment using normal forensic or data recovery tools. What’s more, the POD provides access to all the tools the forensic analyst may need, meaning that they can respond from any workstation, anywhere. Due to the unique architecture of Remote Forensics, imaging does not take place over a network. This means forensic investigations can be carried out at almost the same speed as if the analyst was on site – even using a dial-up or wireless connection. s


speed is of the essence to beat IP thieves

Deploying Remote Forensics with strategic software tools to help business gain the upper hand against counterfeiters
How to win the battle against counterfeiters, pirates and intellectual property thieves using forensic internet investigation techniques
You are being attacked by online counterfeiters, pirates and fraudsters – hitting both your profits AND your reputation. And you are not alone. Businesses across the globe are under attack from highly-organised criminal gangs which get rich off the back of their sweat and hard work. Thanks to the virtual anonymity of internet relay chat (IRC) and other closed trade boards they have been trading industrial secrets, brokering illicit manufacturing deals, arranging product diversion and grey market distribution and organising e-mail campaigns to steal people’s identities for years. Taking advantage of the net’s low cost, low risk distribution channels, they have been leeching global corporations for billions of pounds, utilising open trade to flood developed, critical markets with illegal and infringing goods. Historically, the best most companies damaged by this activity managed to achieve was to identify the infringing products once they started to reach the market and trace them back to source. Now, after years of building intelligence in the underground communities, there is an alternative. Evidence Talks, in conjunction with our partner iCG, are uniquely positioned to help businesses defend their brands, products, intellectual property and customers from this attack on their profits, brand and reputation. Our iThreat solutions and closely-related professional services offer an integrated strategy that allows legal, security and marketing professionals to identify, analyse and act against organisations and individuals who threaten product integrity, intellectual property and corporate brand. Our suite of patented software products trawl the anonymous internet, identifying people, products and places and the links between them – files they swap, contracts they offer, e-mails they exchange and people they pay. We check the terabytes of digital evidence we uncover against a database built up from more than a decade of forensic investigations into cyber-crime. In short, there’s no hiding place any more. Media companies, software houses, pharmaceutical giants and consumer goods manufacturers are just a few of the businesses who currently benefit from our iThreat service offerings in the following areas: • iThreat Channel – defending distribution. • iThreat IP – defending intellectual property and brands. • iThreat eFraud – defending consumer trust. • iThreat Market – defending strategic revenues. • iThreat Forensics and eDiscovery – acquiring, analysing and producing digital evidence. • iThreat Investigative Solutions – investigating anonymous internet threats. Clients use the iThreat suite to gather, manage and access actionable intelligence and evidence related to the individuals, businesses and organisations that threaten their interests. They can determine who, why, how, when and where their products, intellectual property and assets are threatened, understand the potential impact of these threats and take measured, appropriate action to defend corporate value. Senior executives, corporate counsel, security management and litigators know they have to face up to the threats and challenges posed by the exponential growth of the internet and its billions of users. Intelligence and evidence management is central to winning the battle and businesses which have identified, analysed and acted upon the threats, and which have drawn up a watertight strategy, are the ones which will survive and prosper.

Evidence Talks addresses that requirement.
Andrew Sheldon is managing director of Evidence Talks.

Tel: 0845 125 4400 E-mail:


To top