Site icon New World Forensics

Details of Forensic Process

Our team has experience handling various types of cases, including:

Data Theft: This is the unauthorized taking or copying of information from a computer or other electronic device. It can have severe consequences for individuals and organizations and is a top priority for computer forensics professionals.

Intellectual Property Theft: This refers to the theft or misuse of copyrighted material, such as software, music, or movies, and is a major concern for businesses that rely on intellectual property to stay competitive.

Employer/Employee Disputes: These can arise when an employer and an employee disagree over issues such as improper computer usage, email misconduct, or data theft.

Computer Forensics: This is the process of using specialized techniques and tools to collect, analyze, and preserve digital evidence for use in legal or investigative proceedings.

eDiscovery: This involves the identification, preservation, collection, review, and production of electronically stored information (ESI) as part of a legal or regulatory matter.

Digital Forensic Imaging: This is the process of creating a bit-by-bit copy, or image, of a digital storage device such as a hard drive. This is crucial for preserving the integrity of the data for analysis.

E-mail Recovery/Analysis: This refers to the recovery and analysis of email messages and attachments, which can provide valuable evidence in investigations or litigation.

Web History Analysis: This involves examining a user’s browsing history to determine their online activities, which can be relevant in investigations or legal cases.

Document Analysis: This is the process of examining digital documents, such as word processing files or spreadsheets, to gather evidence or extract valuable information.

Timeline Analysis: This involves creating a chronological timeline of digital activities, such as file access or internet usage, to reconstruct events and identify patterns of behavior.

User History/Access Analysis: This involves examining a user’s account access and activity to determine their level of involvement in a particular event or activity.

Image Analysis: This is the examination and analysis of digital images, such as photos or videos, to gather evidence or identify alterations or manipulations.

Keyword/Phrase Searching involves using specific keywords or phrases to search for relevant digital evidence, documents, or data.

Data Recovery is the process of retrieving lost, damaged, or deleted data from digital storage devices. It can help reconstruct events or uncover potential evidence.

Data/Evidence Preservation and Storage: This involves properly storing and preserving digital evidence to ensure its integrity and admissibility in legal proceedings.

Trial/Litigation Support: This refers to providing technical expertise and support to aid in collecting, analyzing, and presenting digital evidence in a legal case. 

Evidence/Chain-of-Custody Documentation: This involves maintaining detailed records and documentation of the handling and transfer of digital evidence to ensure its admissibility in court.

On-Site and Lab Acquisitions: This refers to the process of physically collecting data and evidence from a digital device, either on-site or in a laboratory

Cross-Validation of Litigant/Defense Findings: This involves verifying the accuracy and validity of findings presented by both the litigant and the defense to ensure a fair and unbiased outcome.

Mobile Forensics:

1. Cell phone forensics is the practice of collecting and analyzing digital data from mobile devices. It can provide valuable evidence in legal cases involving mobile devices.

2. Compromised mobile device investigation involves examining a device to determine if it has been infected by malware or has been hacked. It is important to investigate and prevent further breaches of security.

3. Timeline of user activity is helpful in accident cases. It can show the actions and movements of individuals involved in the accident, providing crucial information for investigations.

4. Text messages contain written communications between individuals and can provide valuable evidence in legal cases.

5. Call logs and history show a record of past calls made and received on a device, which can assist in investigations and determining connections between individuals.

6. Pictures, video, and audio can provide visual and audio evidence in investigations and legal proceedings.

7. Malware analysis involves examining malicious software’s code and behavior to understand how it affects devices and networks.

8. Deleted content includes data that has been intentionally or unintentionally deleted from a device but can still be recovered through forensic techniques. It may contain important information in investigations.

9. GPS data, including waypoints, can provide a record of where a device and its user have been, which can be useful in investigations and tracking movements.

10. Phone details such as IMEI, ESN, and phone number are unique identifiers that can help identify a specific device and its network connections.

11. Ringtones may seem less important but can provide valuable information in investigations, such as the type of phone or personal preferences of the user.

Exit mobile version