Our forensic examiners conduct digital investigations using the latest technology, software and methods. We forensically capture, process and analyze electronically stored information (ESI) both visible and invisible on computers, mobile devices, the cloud and office networks.
Data Collections | Expert Analysis | Reporting | Testimony
Computer Forensics
Computers, laptops and servers are analyzed to uncover all relevant artifacts to determine user activity, internet activity, USB access, potentially recover hidden or deleted data, and much more.
Mobile Devices (cell phones, tablets) across all OS (iOS, Android) are imaged and examined to retrieve data such as messages/chats, images, calls, contacts, calendar, and more.
Retrieval and examination of emails, backups, data stored on cloud services (iCloud, Google Drive, One Drive, and Dropbox), social media accounts, websites, and collaboration apps.
Our Digital Forensics experts work closely with clients in this phase to:
Identify the purpose, scope of the investigation, key issues and relevant data to be reviewed.
Identify the custodians and where the relevant data resides.
Provide flexible data acquisition methods such as, on-site, drop off at our lab, on the cloud or remote.
Legal consent forms are signed to allow us examine the evidence and expectation of privacy is preserved.
All devices and evidence are meticulously documented with a complete chain of custody.
Casework Examples:
White color crime
Recovery of digital evidence
Fraud & Embezzlement
Criminal cases – Fraud & Bribery
Theft of Trade secrets
Anti-Forensics
Intellectual Property Theft
Partnership Disputes
Employment disputes
Evidence spoliation
Matrimonial & Family Matters
Authentication of Digital Evidence
Data Breaches & Incidence Response
Court Certifications and Affidavits
Professional Malpractice
Rebuttal Expert Reports
Patent & Trademark disputes
Sexual Harassment
Preservation
Once the custodians and data sources are identified:
The original digital evidence is forensically imaged in a write-blocked environment to ensure the source media is not altered.
The forensic image is verified against the original media device using a hashing algorithm.
A working copy of the original forensic image is created and used during the examination process.
The original forensic image is kept for preservation purposes and safe keeping.
The original media is returned to the client.
Analysis
Our forensic examiners use the latest software and technology to review evidence related to your case. We use data artifacts to reconstruct events and answer core questions related to the case.
Digital Analysis Includes, but is not limited to:
User Activity
Computer & Server Event Logs
USB Devices attached
Registry
Office Documents
Images
PDFs
Emails
Internet Browsing History
System Memory
Databases
Windows – Shadow Copies
Program Artifacts
ThumbCache
Passwords
Mac OS Forensics
Reporting
In the event a report is required by the Court or your adversary, Axiana certified forensic examiners will prepare a report detailing the scope of the examination, the devices examined, the methodology we followed, the evidence uncovered and the conclusions of our examination.
Our reports are designed to ensure the validity, reliability and soundness of the digital evidence used for our analysis and conclusions.
Expert Testimony
The majority of cases are usually settled out of court. However, a small number of cases require a digital forensics expert to testify in court or through deposition testimony. Our process is built, step by step, to endure any scrutiny we should face in court. Our digital forensics experts are experienced and equipped to testify and defend:
The methodologies used during the digital examination.
The integrity and validity of the data examined.
That our conclusions are based on facts derived from our analysis of the digital evidence and are within a reasonable degree of digital forensic certainty.