Signed in as:
With the increasing prevalence of mobile phones in peoples' daily lives and in crime, data acquired from phones become an invaluable source of evidence for investigations relating to criminal, civil, and even high-profile cases.
Computer forensics is a branch of forensic science which deals with the application of investigative analysis
techniques on computers in order to retrieve and preserve evidence in a way that is legally admissible.
Call detail records can reveal details as to an individual's relationships with associates, communication and behavior patterns, and even location data that can establish the general whereabouts of an individual during the call.
Androids have the ability to report the device’s location to online services, usually with high accuracy. Tracking your location history is very important to many android applications. Google Location History, if turned on, tracks the device’s location, sometimes at a minute by minute rate, with the best location measurements made from GPS if available. This data is then stored indefinitely on Google servers, and can be downloaded and analyzed by experts.
We can acquire user data from vehicles, and analyze the vast amount of data such as recent destinations, favorite locations, call logs, contact lists, SMS messages, etc., and even the navigation history of everywhere the vehicle has been (depending upon make and model of vehicle).
We can create custom maps of GPS data from various devices, including error ranges. Input can be in the form of driving routes, street addresses, or simple GPS coordinates from varying sources such as ankle bracelets, GPS tracking devices, vehicle navigation systems, EXIF data embedded in camera images, social media location metadata, cell phone location data, etc.
It is a common misconception that once a digital DVR system has “rolled over”, old data cannot be recovered. Even when the security DVR says the data you are looking for isn’t there, it very well could be. We can bypass DVR passwords and archaic menus to quickly extract evidence directly from the DVR hard drive. Even if the DVR was toasted in a fire, or destroyed by a subject, if the hard drive works, our process can recover the data.
Perform complex authentication and source identification examinations of video media. Authentication is the process of substantiating that the video information in question is a complete and accurate representation of what it purports to be. A variety of techniques are used in conjunction, according to best practices, that allow the examiner to draw a scientific conclusion. Authenticity examinations are often based on allegations of alteration, equipment misuse, chain of custody deficiencies and illegal monitoring techniques.
Copyright © 2020 IncidentResponse.us - All Rights Reserved.
a Digital Forensics Center of Excellence