[vc_row][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][mk_fancy_title tag_name=”h1″ color_style=”gradient_color” grandient_color_from=”#e5272f” grandient_color_to=”#1375ba” grandient_color_angle=”diagonal_left_top” size=”” font_weight=”bold” letter_spacing=”1″ margin_top=”50″ font_family=”none” align=”center” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]E-MAIL FORENSICS[/mk_fancy_title][vc_column_text css=”.vc_custom_1556521520133{margin-bottom: 0px !important;}”]

Our laboratory can analyze small to large mailboxes from Thunderbird to Exchange. When courts are not sure if the printed mails are valid evidence, our expert witnesses investigate and report in details. We look into a 360° perpective as a variety of factors can influence a digital document.

[/vc_column_text][vc_empty_space height=”40″][ultimate_modal btn_size=”lg” btn_bg_color=”#ffffff” btn_bg_hover_color=”#386aac” btn_text=”Read More” modal_size=”container” modal_style=”overlay-show-genie” overlay_bg_opacity=”80″ img_size=”80″ btn_txt_color=”#386aac”]

Therefore we perform a very deep examination of messages and servers. We do not belief in superficial reviews of evidence as this would be revoked at court as an analysis baised due to a myoptic vision.

Clients, lawyers and courts want certainty that they are not being unfairly treated. That is why our activities are conducted according to international standards (ISO27035-27042) and the code of ethics (ACFE, DEKRA Standards).

When providing support for government we are aware of compliance rules and standards (AQAP, ISO 9001). The Allied Quality Assurance Publications (NATO’s AQAP) are the military version of the civilian Quality Management Standards ISO9001.

In order to understand how messages are transmitted our experts have different qualifications and certifications. This includes the Microsoft Professional certification for Microsoft Exchange Server and the Microsoft Certified Systems Engineer for Internet Security (MCSE+I) and the Microsoft Certified Trainer (MCT). We operate our own clean room (ISO 5/Class100) and conduct our investigations in compliance with ISO9001 and ISO 27035-27042. We are an organisation with staff audited by german authorities to ensure confidencial client data remains confidencial.

We provide forensic services for lawyers, companies and authorities around the world. Even forensics experts in America ask for help when they are having to solve issues (e.g. Ransomware, …).

[/ultimate_modal][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row][vc_column css=”.vc_custom_1555740279427{padding-top: 0px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;}”][mk_fancy_title color=”#000000″ size=”30″ font_weight=”bold” letter_spacing=”1″ margin_top=”50″ margin_bottom=”15″ font_family=”none” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]MESSAGE FORENSICS[/mk_fancy_title][bsf-info-box icon=”Defaults-fire” icon_size=”50″ icon_style=”advanced” icon_border_style=”solid” icon_border_size=”2″ icon_border_radius=”500″ icon_border_spacing=”100″ icon_animation=”bounceInUp” hover_effect=”style_2″ pos=”left”]

Many companies and authorities conduct business activities using emails and text messages. This can lead to disputes about contracts and content of agreements.

[/bsf-info-box][bsf-info-box icon=”Defaults-fire” icon_size=”50″ icon_style=”advanced” icon_border_style=”solid” icon_border_size=”2″ icon_border_radius=”500″ icon_border_spacing=”100″ icon_animation=”bounceInUp” hover_effect=”style_2″ pos=”left”]

Eventually a party might claim that an email presented as evidence has been falsified, manipulated or was never sent. A quick forensics test can result in a wrong report to court. Some times we then have to prove to a judge that the previously conducted investigation of a 3rd party delivered a misrepresenting view of the truth.

[/bsf-info-box][bsf-info-box icon=”Defaults-fire” icon_size=”50″ icon_style=”advanced” icon_border_style=”solid” icon_border_size=”2″ icon_border_radius=”500″ icon_border_spacing=”100″ icon_animation=”bounceInUp” hover_effect=”style_2″ pos=”left”]

This when we conduct a deep examination of emails, mailbox files, mail servers and telecommunication systems. This has resulted in courts changing their point of view and dismissing superficial forensics results.

[/bsf-info-box][bsf-info-box icon=”Defaults-fire” icon_size=”50″ icon_style=”advanced” icon_border_style=”solid” icon_border_size=”2″ icon_border_radius=”500″ icon_border_spacing=”100″ icon_animation=”bounceInUp” hover_effect=”style_2″ pos=”left”]

As our experts hold international certifications we can provide acceptable documentation that is understandable also by a jury that has little technical understanding of the complexity of information technology. This expertise can decide whether a jury will vote in favour of a falsely accused innocent person.

[/bsf-info-box][mk_fancy_title color=”#000000″ size=”30″ font_weight=”bold” letter_spacing=”1″ margin_top=”50″ margin_bottom=”15″ font_family=”none” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]Technology Standards[/mk_fancy_title][bsf-info-box icon=”Defaults-fire” icon_size=”50″ icon_style=”advanced” icon_border_style=”solid” icon_border_size=”2″ icon_border_radius=”500″ icon_border_spacing=”100″ icon_animation=”bounceInUp” hover_effect=”style_2″ pos=”left”]

We use modern forensics equipment that can also deliver data collection compatible with the tools state and federal police have access to.

[/bsf-info-box][bsf-info-box icon=”Defaults-fire” icon_size=”50″ icon_style=”advanced” icon_border_style=”solid” icon_border_size=”2″ icon_border_radius=”500″ icon_border_spacing=”100″ icon_animation=”bounceInUp” hover_effect=”style_2″ pos=”left”]

This includes forensics tools from market leaders: Cellebrite, AceLabs, Rusolut, Atola, WiebeTech, Guidance Software, Tableau, Vound, Amped, EDEC DF and ACATO.

[/bsf-info-box][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” css=”.vc_custom_1555140114548{padding-top: 50px !important;padding-bottom: 40px !important;}”][vc_column][mk_padding_divider size=”35″][vc_custom_heading text=”KEY CHARACTERISTICS:” use_theme_fonts=”yes”][vc_separator color=”custom” align=”align_left” border_width=”5″ el_width=”10″ css_animation=”bounceInUp” accent_color=”#e12831″][vc_row_inner attached=”true” is_fullwidth_content=”false”][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Mail Server certified experts” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Forensics certified experts” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Analysis of mailbox files” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”DKIM analysis” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Body Hash authentification” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Damaged Outlook Extractions” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Thunderbird Analysis” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Languages (DE/EN/NL/FR/ES)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Germany Laboratory” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”German Data protection standards” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Certified Privacy Experts (TÜV)” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Certified Fraud Examiners” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Own Development of Tools” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” bg_type=”grad” css=”.vc_custom_1552599167136{padding-top: 50px !important;padding-bottom: 40px !important;}” bg_grad=”background: url(data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjxkZWZzPjxsaW5lYXJHcmFkaWVudCBpZD0iZ3JhZGllbnQiIHgxPSIwJSIgeTE9IjAlIiB4Mj0iMCUiIHkyPSIxMDAlIj48c3RvcCBvZmZzZXQ9IjAlIiBzdHlsZT0ic3RvcC1jb2xvcjojRTUyNzMwOyIgLz48c3RvcCBvZmZzZXQ9IjEwMCUiIHN0eWxlPSJzdG9wLWNvbG9yOiMxMzc0QkE7IiAvPjwvbGluZWFyR3JhZGllbnQ+PC9kZWZzPjxyZWN0IGZpbGw9InVybCgjZ3JhZGllbnQpIiBoZWlnaHQ9IjEwMCUiIHdpZHRoPSIxMDAlIiAvPjwvc3ZnPg==);background: -webkit-gradient(linear, left top, left bottom, color-stop(0%, #E52730), color-stop(100%, #1374BA));background: -moz-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -webkit-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -o-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -ms-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: linear-gradient(100deg,#E52730 0%,#1374BA 100%);”][vc_column width=”2/3″][vc_column_text css=”.vc_custom_1552600091618{margin-bottom: 0px !important;}”]

Contact us for analysis and quote

We offer immediate, 24/7 assistance from our team of digital investigators.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_btn title=”CREATE CASE” style=”3d” color=”black” align=”center” button_block=”true” link=”url:https%3A%2F%2Fnew.acato.org%2Fcreate-case%2F|title:Create%20Case|target:%20_blank|”][vc_column_text css=”.vc_custom_1552600497951{margin-bottom: 0px !important;}”]

CALL: +49 89 – 54041070

[/vc_column_text][/vc_column][/vc_row]