Windows, Linux, or Mac, our digital forensics analysts can probe the hidden system files of any hard drive to extract important information. Each operating system has many small databases, logs, and settings files that, when analyzed by experts, can yield critical information that proves an important fact in a case. Depending on what the exact need of the case is, we focus on the relevant data sources and prepare a detailed forensic analysis report with concise conclusions and recommendations to assist the case in moving forward.
User passwords and domain security are no hindrance when it comes to extracting data directly off a PC’s hard drive. Even if the drive has been recently re-formatted, we can use our data recovery experience to complete a full forensic analysis for a case. In addition to our forensics services, each case has complete access to our data recovery services as well.
Examples of data we can forensically analyze on a PC:
. DELETED BROWSER HISTORY
. SOFTWARE INSTALL/UNINSTALLS
. USER PERMISSION CHANGES
. VIRUS/MALWARE INSTALLS
– Mobile Phone Forensics
We can probe and extract the memory of a mobile phone or tablet and retrieve information the legal and investigative community has long thought unavailable. A new genre of mobile device extraction and analysis tools has given birth to break-through capabilities in forensic evidence collection and production.
We have the technology to access over 20,000 makes and models of mobile devices including Apple’s iPhones, Android devices from Samsung, LG, HTC, Google Nexus, Motorola, also Microsoft’s Windows Phone, even old BlackBerry devices and burner phones. We can harvest evidence from smart tablets like Apple’s iPad, Amazon’s Kindle Fire, and Samsung’s Galaxy Tab. We can help you acquire case relevant text messages, call histories, address books, images, videos, audio recordings, voice messages, GPS track points, e-mail, instant messages, calendars, app data, and important subscriber identity information. We can even find deleted text messages, photos, videos and other hidden evidence! And we can recover or bypass missing passcodes that unlock mobile devices and all of their probative evidence.
Regardless of the pattern swipes, passwords or PINs utilized, we can extract, analyze, and provide detailed reports on many types of useful data stored in hidden areas of the phone, even if deleted by the user (depending on the operating system).
The mobile data we can forensically analyze includes:
. CALL LOGS
. SMS/MMS MESSAGES
. CHAT LOGS (FACEBOOK, WHATSAPP, VIBER ETC.)
. PHOTOS AND VIDEOS
. INTERNET HISTORY
. SEARCH HISTORY
. DOWNLOADED FILES
. LOCATION AND GPS RECORDS
. WI-FI CONNECTION LOGS
. EMAILS SENT/RECEIVED
. CONTACT LISTS
. TRACKING APPS
– DIGITAL FORENSICS FOR INDIVIDUALS
Our technicians analyze each case with the utmost confidentiality. We can report on deleted files, the types of activities that have occurred, and many other types of information you may want to know about your device.
Examples of our services for individuals include:
SCANNING FOR INAPPROPRIATE IMAGES
DISCOVERING COVERT EMAIL CORRESPONDENCE
LOCATING EVIDENCE OF HACKING
ACCESSING PROTECTED AND/OR ENCRYPTED DATA
ANALYZING RECENT DEVICE LOCATIONS
RECOVERING DELETED MESSAGES FROM VARIOUS CHAT MESSENGERS
– DIGITAL FORENSICS FOR BUSINESS
Our forensics team assists businesses in acquiring hard-to-find information hidden in system files on servers, PCs, and mobile phones used by staff and clients. If suspicion arises, we can be dispatched to a place of business to begin on-site digital forensic examinations to extract and explain information relating to the case. By choosing DOISS’s digital forensics services, we can help the business investigate digital fraud, discover disloyal employee activity or internet and email abuse.
Examples of our services for businesses include:
. DETECTING DIGITAL FRAUD
. EXAMINING COMPANY DEVICES
. ANALYZING INTERNET AND EMAIL USE
. DISCOVERING MALICIOUS INSIDER ACTIVITIES
. FNDING EVIDENCE OF CORPORATE ESPIONAGE