What We Offer

Forensically sound
Digital Data acquisitions

By utilizing forensically sound acquisition for a digitally stored information, we can be 100% sure data is presented as it was on source machine without altering any piece of it. All Metadata (date and time stamps) will remain the same. We will acquire every bit and byte of information even if it was deleted and/or hidden. By using our service, customers can be sure nothing will be left behind.

Electronically Stored Information (ESI)

Whenever your data reside on computer, mobile phone, tablet, server, cloud storage, social account, email server – we will try to acquire it. Forensically sound acquisition is possible almost against any Electronically Stored Information or otherwise known as ESI.

Main Benefits

Sector-by-Sector

Identified Data is acquired in full applying sector-by-sector acquisition method, making sure absolutely nothing will be left behind.

Unused Space

By applying forensically sound acquisition, even deleted and/or hidden data will be collected for further investigation.

Court Proven

Acquisition process if completely court proven and accepted as evidence in arbitration as chain of custody is followed at all stages.

Full Compatibility

Acquired data is stored in worldwide known digital evidence file formats and can be uploaded to any Digital Forensics software.

Well-known Forensic Methodology

Forensically Sound Acquisition might be a difficult process to understand, but it is just in the beginning. In overall Digital Forensics is a part of a Forensic Science and therefore process is like the acquisition of a fingerprint on a crime scene.

Identification

Identification

Identification of a fingerprint on a crime scene. Making sure it is present.

Acquisition

Acquisition

Acquisition of an evidence applying forensically sound methods.

Verification

Verification

Verification of acquired evidence and making sure acquired copy matches source.

Processing

Processing

Evidence processing. Curving out data. Matching results and all-side analysis.

Production

Production

Evidence production either to party in question or directly in court.

Digital, Forensically Sound Methodology

Below is a standard digital forensic acquisition applying forensically sound methodology. As it is visible, digital forensics investigator apply same principles and processes during their electronically stored information acquisition.

Identification

Identification

Identification of Electronically Stored Information (ESI) source as well as tools required for acquisition. Creation of acquisition process.

Imaging

Imaging

Sector-by-sector acquisition utilizing specifically crafted Digital Forensics hardware and software tools to make sure absolutely all data is collected.

Verification

Verification

Hashing and Verification process with MD-5 and/or SHA-1 algorithm. Probability of error is lower than how many grains of sand are in the world.

Processing

Processing

Acquired data processing using Digital Forensics software tools. This is essential stage of Digital Forensic Investigation when we look for evidence to be present.

Production

Production

Generating of final report based on findings. Process documentation and preparation for delivery either to party in question or directly in the court process.

loading...