A large corporation suspected one of its IT employees to be affiliated with a well-known malicious hacker group. Mr. Peck was asked to investigate to determine if company secrets were compromised.
Mr. Peck forensically examined the workstations of the employee and did not find any evidence to indicate that company secrets were compromised. What was discovered, however, were virtual machines on the systems that were customized for hacking built by the employee for distribution to other hackers. Also, a large amount of private messaging remnants remained within file structures. These message remains reconstructed several previous attacks on foreign and domestic governments, and also identified key individuals' aliases to real name. This information was furnished to the client and ultimately the FBI, which led to several arrests.