Taking a perfect image of a computer suspected of containing incriminating data is critical to all ensuing investigative work. Its significance must not be underestimated. When an imperfect image is used to gather suspect data, the resulting evidence will be found inadmissible in court.
Using specialized forensic tools and software, the technician will:
- Inspect all hard drives, floppy drives, and other available electronic media using methods that will allow the data to be preserved and exhibited in court.
- Explore and recover deleted files.
- Explore unallocated space and file slack for data, including hidden data.
- Explore areas of the media for fragmented data.
- Explore swap files.
- Locate and document current and deleted e-mail (sent and received).
- Extract e-mail and e-mail conversations, identify all e-mail addresses and Web URLs.
- Explore and recover deleted files
In most cases, “hidden,” “deleted,” or “lost” data cannot be located with the assistance of the limited software tools available to most users. However, sophisticated computer forensic tools allow specialists to find and restore missing data.
EER can provide all of the services listed above and has a proven record for providing the forensic evidence that can make or break court cases.
Feel free to contact us if you would like to know more about computer forensics or if you wish to discuss the role of computer forensics in a current matter.