Computer Forensics
Computer Forensics is gathering and analyzing of electronically stored information (ESI) in a way as free from distortion or bias as possible to reconstruct data or what has happened in the past on a system and providing clear and objective report about actual course of events and persons involved. With millions of computers and mobile devices being used worldwide, data stored on their hard drives and internal memory are now an integral component in establishing factual information within any investigation.
We render computer forensics services both as support in litigation or within broad fraud investigations. In our work we combine detailed record keeping with thorough and consistent evidence processing practices. In undertaking computer forensic engagement we follow the best-practice principles and standards of electronic evidence handling as prescribed by the rules of evidence and admissibility.
We have the experience and industry knowledge to understand our clients' needs and conduct the kinds of digital forensic investigations necessary to accomplish their goals. We provide our clients with comprehensive investigative, analytical and defensible examination results.
The scope of computer forensics analysis can vary from elementary information retrieval to an extensive process of reconstructing a series of events within multiple systems. Our computer forensic services include, but not limited to:
- Preservation and forensic imaging of digital evidence from personal computers, servers and external storage devices;
- Recovering deleted files, electronic messages and their metadata;
- Creating timelines of user activity;
- Analyzing ESI for evidence of authenticity, modification or alteration;
- Searching and analyzing of internet artifacts and network activity;
- Accessing password protected files and drives;
- Identifying applications used by persons of interest;
- Preservation, analysis and recovery of data from mobile phones and tablets.
Our computer forensics experts possess vast experience and professional tools for collection and analysis of electronic evidence that makes it possible to answer relevant questions:
- Who worked on targeted computer and what was his/her/their activity during a certain period of time?
- Were files or e-mails deleted, when and how it occurred, what exactly was deleted?
- Did user try to hide, fabricate or destroy data intentionally?
- Which applications recently used on a system?
- Which external storage devices were connected to the computer? When were these connections? What files were located on external storage devices?
- What was user's activity in Internet network?
- Has data been transmitted through third-party email accounts (e.g., Mail.ru, Gmail, etc.)?
- Did user use instant messaging programs? Is there any chat history in storage?
- Did user connect mobile phones or tablets to his computer? Are there any backup copies of these devices still available on the computer?
- Was a computer intentionally used to download illegal content?
Our mobile forensic experts are capable to extract key evidence from cellular phones, smartphones, tablets and other mobile devices. Using specialized software and equipment designed specifically for advanced cell phone forensics we are able to extract active and deleted data from various cell phones available on the market.
In our computer forensics practice we utilize industry’s lead forensic tools from Access Data, Guidance Software, Magnet Forensics, Nuix and Cellebrite to process and analyze ESI in a timely and effective manner.