[vc_row][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][mk_fancy_title tag_name=”h1″ color_style=”gradient_color” grandient_color_from=”#e5272f” grandient_color_to=”#1375ba” grandient_color_angle=”diagonal_left_top” size=”” font_weight=”bold” letter_spacing=”1″ margin_top=”50″ font_family=”none” align=”center” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]FILE FORENSICS[/mk_fancy_title][vc_column_text css=”.vc_custom_1556519005098{margin-bottom: 0px !important;}”]
Fraud and criminal cases often need to have a variety of files examined. These can be password protected office documents, manipulated emails or badly readable number plates on security cameras.
[/vc_column_text][vc_empty_space height=”40″][ultimate_modal btn_size=”lg” btn_bg_color=”#ffffff” btn_bg_hover_color=”#386aac” btn_text=”Read More” modal_size=”container” modal_style=”overlay-show-genie” overlay_bg_opacity=”80″ img_size=”80″ btn_txt_color=”#386aac”]
This is where the wide range of tools and expertise in the forensics field allows us to conduct laboratory examinations of file based evidence. Even if a file is damaged or shredded we can either fix the issue or extract relevant snippets that match the courts desire of evidence.
We provide forensic services for lawyers, companies and authorities around the world.
[/ultimate_modal][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row][vc_column css=”.vc_custom_1555740279427{padding-top: 0px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;}”][mk_fancy_title color=”#000000″ size=”30″ font_weight=”bold” letter_spacing=”1″ margin_top=”50″ margin_bottom=”15″ font_family=”none” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]LOOKING AT META AND SIGNATURES[/mk_fancy_title][bsf-info-box icon=”Defaults-fire” icon_size=”50″ icon_style=”advanced” icon_border_style=”solid” icon_border_size=”2″ icon_border_radius=”500″ icon_border_spacing=”100″ icon_animation=”bounceInUp” hover_effect=”style_2″ pos=”left”]
Files have meta data and typical signatures that can be tested to see if they have been falsified. Some times we have to recover files which were deleted by a suspect on purpose to cover up his crime.
[/bsf-info-box][bsf-info-box icon=”Defaults-fire” icon_size=”50″ icon_style=”advanced” icon_border_style=”solid” icon_border_size=”2″ icon_border_radius=”500″ icon_border_spacing=”100″ icon_animation=”bounceInUp” hover_effect=”style_2″ pos=”left”]
This is where we can reconstruct severly damaged documents so that the relevant content is readable for a judge and his jury. The way we conduct this is in accordance with intenational forensics and data privacy standards.
[/bsf-info-box][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” css=”.vc_custom_1555140114548{padding-top: 50px !important;padding-bottom: 40px !important;}”][vc_column][mk_padding_divider size=”35″][vc_custom_heading text=”FILES WE ANALYSE:” use_theme_fonts=”yes”][vc_separator color=”custom” align=”align_left” border_width=”5″ el_width=”10″ css_animation=”bounceInUp” accent_color=”#e12831″][vc_row_inner attached=”true” is_fullwidth_content=”false”][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Mailbox files (pst, eml,…)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Photos (pixel, messed, …)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”CCTV Videos (mp4,Avi, mov, …)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Log files (Web, File, Mail Servers)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Databases (MS SQL, Oracle, xml, …)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Analyze usage of device” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Presentations (ppt, notes, …)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Tables (xls, xml, xlsx, …)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Project and visio files” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Virtual drives (VHD,VDK, VDMK,…)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” bg_type=”grad” css=”.vc_custom_1552599167136{padding-top: 50px !important;padding-bottom: 40px !important;}” bg_grad=”background: url(data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjxkZWZzPjxsaW5lYXJHcmFkaWVudCBpZD0iZ3JhZGllbnQiIHgxPSIwJSIgeTE9IjAlIiB4Mj0iMCUiIHkyPSIxMDAlIj48c3RvcCBvZmZzZXQ9IjAlIiBzdHlsZT0ic3RvcC1jb2xvcjojRTUyNzMwOyIgLz48c3RvcCBvZmZzZXQ9IjEwMCUiIHN0eWxlPSJzdG9wLWNvbG9yOiMxMzc0QkE7IiAvPjwvbGluZWFyR3JhZGllbnQ+PC9kZWZzPjxyZWN0IGZpbGw9InVybCgjZ3JhZGllbnQpIiBoZWlnaHQ9IjEwMCUiIHdpZHRoPSIxMDAlIiAvPjwvc3ZnPg==);background: -webkit-gradient(linear, left top, left bottom, color-stop(0%, #E52730), color-stop(100%, #1374BA));background: -moz-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -webkit-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -o-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -ms-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: linear-gradient(100deg,#E52730 0%,#1374BA 100%);”][vc_column width=”2/3″][vc_column_text css=”.vc_custom_1552600091618{margin-bottom: 0px !important;}”]
Contact us for analysis and quote
We offer immediate, 24/7 assistance from our team of digital investigators.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_btn title=”CREATE CASE” style=”3d” color=”black” align=”center” button_block=”true” link=”url:https%3A%2F%2Fnew.acato.org%2Fcreate-case%2F|title:Create%20Case|target:%20_blank|”][vc_column_text css=”.vc_custom_1552600497951{margin-bottom: 0px !important;}”]
CALL: +49 89 – 54041070
[/vc_column_text][/vc_column][/vc_row]