[vc_row fullwidth=”true” equal_columns=”true”][vc_column width=”1/2″ css=”.vc_custom_1555694532628{padding-top: 0px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;}”][mk_fancy_title color_style=”gradient_color” grandient_color_from=”#e5272f” grandient_color_to=”#1375ba” grandient_color_angle=”diagonal_left_top” size=”” font_weight=”bold” letter_spacing=”1″ margin_top=”50″ margin_bottom=”15″ font_family=”none” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]

SSD FORENSICS

[/mk_fancy_title][vc_column_text css=”.vc_custom_1555693714142{margin-bottom: 0px !important;}”]

In modern Notebooks and desktop computers you will find SSD hard drives. The way of storing data is quite different. This has a substantial influence on the way data is stored and deleted. Traces of evidence can be found differently with forensic methods.

[/vc_column_text][ultimate_modal btn_size=”md” modal_on_align=”left” btn_text=”Read More” modal_size=”medium” modal_style=”overlay-show-genie” overlay_bg_opacity=”80″ img_size=”80″]

Our certified forensics laboratory services can deal with damaged SSD drives, too. If a person has been accused of having visited illegal websites or stored documents refering to dangerous activities, it can be that he never was in contact with such data. Sometimes corrupt competitors try to get rid of their competition (e.g. newspapers) or unwanted publicity (e.g. bloggers or activists) by hacking into the systems and feeding stolen data.

[/ultimate_modal][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1556003816162{padding-right: 0px !important;padding-left: 0px !important;}”][vc_single_image image=”428″ img_size=”full” add_caption=”yes” alignment=”center” css=”.vc_custom_1556003752524{margin-bottom: 0px !important;}”][/vc_column][/vc_row][vc_row fullwidth=”true” equal_columns=”true” css=”.vc_custom_1555140004891{background-color: #f8f8f8 !important;}”][vc_column width=”1/2″ css=”.vc_custom_1556003797329{padding-right: 0px !important;padding-left: 0px !important;}”][vc_single_image image=”430″ img_size=”full” add_caption=”yes” alignment=”center” css=”.vc_custom_1556004109956{margin-bottom: 0px !important;}”][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1555140409375{padding-right: 50px !important;padding-left: 50px !important;}”][mk_fancy_title tag_name=”h3″ color_style=”gradient_color” grandient_color_from=”#e5272f” grandient_color_to=”#1375ba” grandient_color_angle=”diagonal_left_top” size=”30″ force_font_size=”true” size_smallscreen=”24″ size_tablet=”20″ size_phone=”18″ font_weight=”bold” letter_spacing=”1″ margin_top=”30″ margin_bottom=”0″ font_family=”none” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]FORENSIC ANALYSIS OF SSD STORAGE DEVICES:[/mk_fancy_title][vc_column_text css=”.vc_custom_1555693865548{margin-bottom: 0px !important;}”]

In some cases people are accused of having committed crimes, they never did. Sometimes this is in connection with smartphone apps (e.g. By Lock). As most smartphones can use computers for their backup the notebooks might also be part of the defenses evidence. This allowed users to install it on iOS and Android based devices.

[/vc_column_text][ultimate_modal btn_size=”md” modal_on_align=”left” btn_text=”Read More” modal_size=”medium” modal_style=”overlay-show-genie” overlay_bg_opacity=”80″ img_size=”80″]

SSD drives store their data differently. furthermore, the diversity of SSD ports makes it difficult to extract evidence from every type of device. The equipment of ACATO holds a vast array of forensic tools that can access data from even small ssds from Mac book Air or Asus z Notebooks.

[/ultimate_modal][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” css=”.vc_custom_1555140114548{padding-top: 50px !important;padding-bottom: 40px !important;}”][vc_column][mk_padding_divider size=”35″][vc_custom_heading text=”INVESTIGATION:” use_theme_fonts=”yes”][vc_separator color=”custom” align=”align_left” border_width=”5″ el_width=”10″ css_animation=”bounceInUp” accent_color=”#e12831″][vc_row_inner attached=”true” is_fullwidth_content=”false”][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Backups” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Shadow copies” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Pagefiles” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Deleted Messages” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Deleted Photos” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Identify Contacts” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Internet Activity” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Illegal Activity” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Hacking Attempts” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Manipulated data” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” bg_type=”grad” css=”.vc_custom_1552599167136{padding-top: 50px !important;padding-bottom: 40px !important;}” bg_grad=”background: url(data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjxkZWZzPjxsaW5lYXJHcmFkaWVudCBpZD0iZ3JhZGllbnQiIHgxPSIwJSIgeTE9IjAlIiB4Mj0iMCUiIHkyPSIxMDAlIj48c3RvcCBvZmZzZXQ9IjAlIiBzdHlsZT0ic3RvcC1jb2xvcjojRTUyNzMwOyIgLz48c3RvcCBvZmZzZXQ9IjEwMCUiIHN0eWxlPSJzdG9wLWNvbG9yOiMxMzc0QkE7IiAvPjwvbGluZWFyR3JhZGllbnQ+PC9kZWZzPjxyZWN0IGZpbGw9InVybCgjZ3JhZGllbnQpIiBoZWlnaHQ9IjEwMCUiIHdpZHRoPSIxMDAlIiAvPjwvc3ZnPg==);background: -webkit-gradient(linear, left top, left bottom, color-stop(0%, #E52730), color-stop(100%, #1374BA));background: -moz-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -webkit-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -o-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -ms-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: linear-gradient(100deg,#E52730 0%,#1374BA 100%);”][vc_column width=”2/3″][vc_column_text css=”.vc_custom_1552600091618{margin-bottom: 0px !important;}”]

Contact us for analysis and quote

We offer immediate, 24/7 assistance from our team of digital investigators.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_btn title=”CREATE CASE” style=”3d” color=”black” align=”center” button_block=”true” link=”url:https%3A%2F%2Fnew.acato.org%2Fcreate-case%2F|title:Create%20Case|target:%20_blank|”][vc_column_text css=”.vc_custom_1552600497951{margin-bottom: 0px !important;}”]

CALL: +49 89 – 54041070

[/vc_column_text][/vc_column][/vc_row]