[vc_row][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][mk_fancy_title tag_name=”h1″ color_style=”gradient_color” grandient_color_from=”#e5272f” grandient_color_to=”#1375ba” grandient_color_angle=”diagonal_left_top” size=”” font_weight=”bold” letter_spacing=”1″ margin_top=”50″ font_family=”none” align=”center” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]ANALYSIS OF DIGITAL TRACES[/mk_fancy_title][vc_column_text css=”.vc_custom_1556035328618{margin-bottom: 0px !important;}”]

You have collected evidence or have found traces that indicate a possible crime? You are not sure how to continue and want to have the traces secured and evaluated in order to avoid false accusations against an employee or business partner?

[/vc_column_text][vc_empty_space height=”40″][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row][vc_column][ultimate_ctation ctaction_background_hover=”#386aac”]Our IT Forensic Experts can help analyze and evaluate the risks such a trace may have.[/ultimate_ctation][/vc_column][/vc_row][vc_row][vc_column][vc_column_text css=”.vc_custom_1556036174310{margin-bottom: 0px !important;}”]

The objectives of a forensic analysis could be:

  • What did really happen?
  • How did it happen?
  •  What are the sources of the crime?
  • Is there a timeline of events?
  • Which systems and persons are involved?
  • What can be done to prevent future events of this type?

POSSIBLE ACTIVITIES IN THE COURSE OF SECURING EVIDENCE:

  • Analysis and evaluation of digital traces
  • Scanning through data and images with forensic techology
  • Identification of anomalies that lead to unusual activities that are part of a crime
  • Examination und interpretation of system and user related traces
  • Standard Analysis:
    • Operating System Forensic Analysis
    • last opened and used files
    • attached devices
    • file system forensic analysis
    • Analyzing Websites, data entry of web forms and other activities (Browser forensics)
    • Examination of log files (Log file forensics)
    • Forensic Examination of databases
    • Extraction and searching for evidence in online plattforms (Cloud forensics)
    • Research of possible configurations
    • Reconstrction of historical time lines and testing time stamps (including Meta data)
    • Examination of contents of deleted areas (Carving) and files
  • complex forensic work at a particular deep level, e.g.:
    • Checking differences in a variety of different Backups, i.e. data deleted by suspects
    • Identification of communication activity and relationships between multiple parties (e-Mail, Chat, SMS, virtuel friends, what’sapp, byLock, eagle, telegraph, signal, etc.):
    • Internet forensics, Chat forensics, social media Forensics , Mail forensics
    • Analysis of encripted data and files
    • Examination of time stamps, hash key, time lines which are claimed to have been falsified
    • Analysis of manipulated documentse-Mails, etc.
    • Extraction and examination of data from cell phones, smartphone und navigation systems with GPS data (Mobile device forensics)
    • Analysis of digital traces inside RAM and Pagefiles (fluent memory forensics)
    • Research into Malware attacks
  • Providing individual technical Reports on forensic examinations
  • IT Forensics expert analysis of traces in regards to case relevant data, timelines and other objects that lead to better understanding technical complexities that govern a crim

[/vc_column_text][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” bg_type=”grad” css=”.vc_custom_1552599167136{padding-top: 50px !important;padding-bottom: 40px !important;}” bg_grad=”background: url(data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjxkZWZzPjxsaW5lYXJHcmFkaWVudCBpZD0iZ3JhZGllbnQiIHgxPSIwJSIgeTE9IjAlIiB4Mj0iMCUiIHkyPSIxMDAlIj48c3RvcCBvZmZzZXQ9IjAlIiBzdHlsZT0ic3RvcC1jb2xvcjojRTUyNzMwOyIgLz48c3RvcCBvZmZzZXQ9IjEwMCUiIHN0eWxlPSJzdG9wLWNvbG9yOiMxMzc0QkE7IiAvPjwvbGluZWFyR3JhZGllbnQ+PC9kZWZzPjxyZWN0IGZpbGw9InVybCgjZ3JhZGllbnQpIiBoZWlnaHQ9IjEwMCUiIHdpZHRoPSIxMDAlIiAvPjwvc3ZnPg==);background: -webkit-gradient(linear, left top, left bottom, color-stop(0%, #E52730), color-stop(100%, #1374BA));background: -moz-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -webkit-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -o-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -ms-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: linear-gradient(100deg,#E52730 0%,#1374BA 100%);”][vc_column width=”2/3″][vc_column_text css=”.vc_custom_1552600091618{margin-bottom: 0px !important;}”]

Contact us for analysis and quote

We offer immediate, 24/7 assistance from our team of digital investigators.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_btn title=”CREATE CASE” style=”3d” color=”black” align=”center” button_block=”true” link=”url:https%3A%2F%2Fnew.acato.org%2Fcreate-case%2F|title:Create%20Case|target:%20_blank|”][vc_column_text css=”.vc_custom_1552600497951{margin-bottom: 0px !important;}”]

CALL: +49 89 – 54041070

[/vc_column_text][/vc_column][/vc_row]