Digital Forensics

Capturing, assessing, investigating, and analyzing digital evidence requires specialized knowledge, skills and abilities – making digital forensics an art, as much as it is a science. Computers, mobile phones and other data storage devices can hold a wealth of electronically stored information that, in order to discover, requires a level of expertise above and beyond that of most end-users or Information Technology personnel.

Because it’s so easy for criminals to hide cybercrime evidence and other pertinent information within a computer network, illegal profits are often earmarked to help protect their organization and computer crime evidence, leading criminals to seek out the brightest computer operators that money can buy.

Our digital experts are forensic scientists who use specialist techniques to safely examine digital storage media and devices whilst maintaining the original evidence in line with international guidelines, thereby ensuring their findings are suitable for presentation in criminal, civil, or other court proceedings.  As the field has progressed, the older terms Computer Forensics, Cyber Forensics, Digital Evidence Recovery and Internet Forensics have generally been assimilated under the heading of Digital Forensics.

Our Digital Forensics practice specializes in:

Computer Forensics is the science of gathering, retrieving and evaluating electronic data, often for the purpose of stopping or preventing computer fraud, to gather and preserve digital evidence for a criminal investigation, or to recover data accidentally lost or deleted.

Claims of fraud, financial tampering, computer crime, employee misconduct, and other wrongdoing require corporations, law firms, and government agencies to follow digital trails to piece together facts that lead to the truth. Our computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.

Computer forensics requires knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. Our computer forensics engineers will safely extract electronic data from almost any computer system, even if data has been previously destroyed, deleted or hidden. Our engineers are trained to recover data from many sources besides computer hard drives, including items such as tablets including iPads, GPS devices, CD-ROMs, USB memory sticks and devices, digital cameras, and other sources.

We ensure no digital evidence is overlooked and assist at any stage of a digital forensics investigation or litigation, regardless of the number or location of data sources. Trust our computer forensics experts to assist you with your most complex and sensitive investigative or litigation matters involving electronic evidence or data preservation.

  • Cyber Crime Investigation: We examine physical and digital evidence to uncover what did or did not happen, using a combination of computer forensic expertise and traditional investigative techniques.
  • Data Collection: Regardless of the volume and complexity of your collection needs, our team deploys forensically sound, best-practice methodology to gather your data for electronic investigation and forensic analysis, or forensic discovery.
  • Data Preservation: In the event of an investigation or litigation, we offer cost-effective and defensible methodologies and solutions to identify and preserve electronic data.
  • Data Recovery and Forensic Analysis: Whether data was deleted or manipulated on purpose or by accident, our digital forensics experts analyze the digital clues left behind to quickly and defensibly uncover critical information.
  • Expert Testimony and Reporting: Our experts have the necessary experience and credentials to creditably serve as an expert witness or special master.

As mobile telephones become more powerful and multifunctional, the wealth of evidence they can provide increases. Mobile phones are capable of storing a wealth of personal information, often intentionally, and sometimes unintentionally. This holds true for almost all mobile devices, such as PDAs and iPhones as well. Our experts specialize in the forensic retrieval of data from cell phones and other mobile devices in a manner that preserves the evidence under forensically acceptable conditions, ensuring that it is court-admissible. This includes the data found on the cell phone SIM/USIM, the cell phone body itself, and any optional memory cards.

More and more court cases are being won with the proper submittal of electronic evidence, so it’s imperative that the cell phone forensic investigator understands the legal issues and imperatives surrounding electronic evidence gathering.

Whilst calls and SMS messages rank top in the instructions we receive from most of our clients, alternative communications systems such as WhatsApp, Viber and Facebook messenger are also requested on a regular basis.  Our experience with these applications allow for a thorough examination, not only looking at the information visible to the user, but also hidden or encrypted backups, or fragments that remain after deletion.

Some of the kinds of data that may be retrieved and examined during a mobile phone forensic investigation, even after being deleted, include:

  • Call times; dialed and received calls, and call durations
  • Text messages recovery of SMS message recovery
  • Contact names & phone numbers
  • Address book entries; residential addresses and email addresses
  • Photos & graphics
  • Videos

Also by working closely with other scientists within Forensic Options, we can accommodate cross-discipline examinations such as working with our fingerprint experts to find fingerprints on mobile phones, providing both the identification of the print and the content of the mobile telephone.

When sensitive information is compromised, it’s critical to ensure electronic evidence is handled with precision and care to prevent it from being overwritten, destroyed, or otherwise corrupted. Our data collection and data preservation experts follow a strict chain-of-custody protocol at every stage of the process to improve the outcomes of on-site investigation and reduce your potential for litigation and fines.

Preserving critical electronic evidence during on-site investigation and threat containment paves the way for a successful incident analysis. Our trained and certified forensic experts adhere to strict data preservation standards to ensure all potentially relevant data is captured and remains intact during an on-site investigation. We have the ability to quickly and efficiently capture electronic data from:

  • Email servers
  • Network shares
  • Desktop or laptop computers
  • Handheld and portable devices
  • Backup media

Whether gathering digital evidence from a single source or from multiple sources organization-wide, we apply forensically sound methods to preserve key digital evidence so you can establish a clear picture of the incident and launch an effective response.

OUR OTHER SERVICE LINES

Forensic Examinations
Learn More
Digital Forensics
Learn More
CYBERSECURITY
Learn More
DUE DILIGENCE
Learn More
cblock
Contact us for an analysis and quote

We offer immediate response from our team of digital investigators.