A Forensic analysis can be done on anything digital. Chances are, if it has ESI (electronically stored information), it can be preserved and analyzed. Many times, attorneys only think of computers or cell phones.
Technology is constantly evolving, which makes this a quickly evolving industry with many challenges. In addition to the changes in technology, users are utilizing an ever growing number of devices including: smartphones, computers, tablets, the cloud, etc.
As digital forensic analysts, we look for hidden folders and files, check the unused disk space for copies of deleted, or even damaged files.
Many times we can determine:
- If any external devices were connected to the computer.
- The author of documents.
- How many revisions of documents exist.
- Recover deleted files
- Recover deleted text messages.
- Recover deleted voice mails.
What is involved in a Forensic Analysis?
The first step is maintaining a "Chain of Custody." An image (read-only copy) of the media is created. Once the data is preserved, the next step or steps begin...
The analysis is performed on a COPY of the image created. This phase allows the examiners to determine authors of documents, external devices connected to the computer, deleted files, email analysis, etc.etc.
Report of Findings
We report our findings in a very easy to read format IN PLAIN ENGLISH!
Contact us today to learn how you can save on your next case.
Receive your free copy of "Things you should know about Digital Forensics."