data recovery
Emergency Service Call:   +27 82 553 1845
Imperative Technology South Africa Call us Now:     +27 11 462 1680
computer forensic services
DO YOU REQUIRE COMPUTER FORENSIC SERVICES?
Our    specialist    expertise    enable    us    to    forensically    analyse    computer    systems    and electronic   devices   for   criminal   investigations,   data   fraud   analysis,   finding   hidden   and deleted   evidence,   intellectual   property   that’s   been   compromised   etc.   We   also   assist representatives   as   appointed   by   the   Honourable   Court,   to   execute   Anton   Piller   Orders   in the seizure of electronic devices and computer data for the purpose of prosecution. Contact   us   for   an   estimate   on   our   Computer   Forensic   Services   once   we’ve   discussed your   specific   requirements.   We’ll   then   explain   the   various   processes   we   need   to   follow to conduct a Forensic Analysis. A BRIEF EXPLANATION OF OUR DIGITAL FORENSIC PROCEDURE The   first   step   is   a   brief   by   the   client   to   discuss   requirements   to   enable   us   to provide an estimate of timeframe and associated costs. We   start   the   Evidence   Acquisition   and   Verification   Process,   this   is   to   ensure   the preservation   of   data   integrity   and   includes   a   Forensically   Sound   Imaging   Process of    all    electronic    devices.    As    soon    as    electronic    data    will    be    used    as    possible evidence   in   any   legal   matter,   data   preservation   is   critical.   Forensically   sound   and verified    images    are    used    for    the    analysis,    therefore    original    electronic/storage media is never used for analysis to avoid contamination of possible evidence. We    proceed    with    an    exhaustive    Forensic    Analysis    following    a    proper    Chain    of Custody and documentation process. We   present   our   findings   to   the   Client/Legal   Counsel   by   means   of   a   detailed   Digital Forensic report that is concise and easy to follow. Expert Witness Testimony when required. SOME OF THE COMPUTER FORENSIC REQUIREMENTS: Hexadecimal searching for evidence and links to all areas of fraudulent activity. Intellectual   Property   that   may   have   been   compromised   incl.   connected   storage devices. Examination   of   user   activity,   computer   misuse/abuse   at   work,   website   visit   logs, Internet cache examination. Finding/recovering deleted data with relevant date & time stamps. Examination of hidden Operating System logs, Registry & META file information. Email searches, Data Recovery of deleted mail messages. Data decryption, file repair and restoring password protected files. Permanently   erasing   sensitive   data   for   those   organisations   whose   policies   insist that sensitive data is destroyed irreversibly.
WHAT YOU SHOULD NOT DO
Please    do    not    allow    anyone    to search   or   by   any   means   work   on any   electronic   device   that   may   be used     as     evidence     in     any     legal matter.      This      will      contaminate evidence    that    could    be    used    to support your case. By    simply    connecting    a    storage device    to    any    computer,    already makes    a    change    to    the    storage volume   information,   date   &   time stamps etc. Users      may      unintentionally      or inadvertently      overwrite      critical evidence   by   simply   doing   a   search for    information    or    continuing    to access   the   electronic   device   in   a normal working environment. Forensic        experts        use        very advanced                        hexadecimal techniques         to         search         for fragments   of   evidence   that   link   to other    deleted    fragments    all    over the        device        that        may        be compromised      when      computer users access the device. BOTTOM   LINE:    Do   not   access   the device     if     needed     in     any     legal matter. Rather     call     us,     even     if     it’s     for advice only.
TEL: +27 11 462-1680
© IMPERATIVE TECHNOLOGY - 2016
Emergency Service Call:   +27 82 553 1845
Imperative Technology SA Call us Now: +27 11 462 1680
DO YOU REQUIRE COMPUTER FORENSIC SERVICES?
Our   specialist   expertise   enable   us   to   forensically analyse      computer      systems      and      electronic devices    for    criminal    investigations,    data    fraud analysis,    finding    hidden    and    deleted    evidence, intellectual    property    that’s    been    compromised etc.   We   also   assist   representatives   as   appointed by   the   Honourable   Court,   to   execute   Anton   Piller Orders   in   the   seizure   of   electronic   devices   and computer data for the purpose of prosecution. Contact    us    for    an    estimate    on    our    Computer Forensic    Services    once    we’ve    discussed    your specific    requirements.    We’ll    then    explain    the various   processes   we   need   to   follow   to   conduct a Forensic Analysis. A      BRIEF      EXPLANATION      OF      OUR      DIGITAL FORENSIC PROCEDURE The    first    step    is    a    brief    by    the    client    to discuss     requirements     to     enable     us     to provide    an    estimate    of    timeframe    and associated costs. We    start    the    Evidence    Acquisition    and Verification   Process,   this   is   to   ensure   the preservation   of   data   integrity   and   includes a   Forensically   Sound   Imaging   Process   of   all electronic    devices.    As    soon    as    electronic data   will   be   used   as   possible   evidence   in any     legal     matter,     data     preservation     is critical.     Forensically     sound     and     verified images   are   used   for   the   analysis,   therefore original   electronic/storage   media   is   never used   for   analysis   to   avoid   contamination   of possible evidence. We    proceed    with    an    exhaustive    Forensic Analysis     following     a     proper     Chain     of Custody and documentation process. We       present       our       findings       to       the Client/Legal     Counsel     by     means     of     a detailed     Digital     Forensic     report     that     is concise and easy to follow. Expert Witness Testimony when required. SOME        OF        THE        COMPUTER        FORENSIC REQUIREMENTS: Hexadecimal    searching    for    evidence    and links to all areas of fraudulent activity. Intellectual   Property   that   may   have   been compromised      incl.      connected      storage devices. Examination     of     user     activity,     computer misuse/abuse   at   work,   website   visit   logs, Internet cache examination. Finding/recovering      deleted      data      with relevant date & time stamps. Examination   of   hidden   Operating   System logs, Registry & META file information. Email   searches,   Data   Recovery   of   deleted mail messages. Data   decryption,   file   repair   and   restoring password protected files. Permanently     erasing     sensitive     data     for those    organisations    whose    policies    insist that        sensitive        data        is        destroyed irreversibly.
WHAT YOU SHOULD NOT DO
Please     do     not     allow anyone   to   search   or   by any   means   work   on   any electronic     device     that may        be        used        as evidence    in    any    legal matter.          This          will contaminate     evidence that    could    be    used    to support your case. By   simply   connecting   a storage    device    to    any computer,             already makes   a   change   to   the storage                  volume information,       date       & time stamps etc. Users                            may unintentionally              or inadvertently   overwrite critical       evidence       by simply    doing    a    search for        information        or continuing      to      access the   electronic   device   in a         normal         working environment. Forensic      experts      use very                    advanced h    e    x    a    d    e    c    i    m    a    l      techniques     to     search for          fragments          of evidence     that     link     to other                      deleted fragments    all    over    the device     that     may     be compromised          when computer   users   access the device. BOTTOM    LINE:     Do    not access     the     device     if needed     in     any     legal matter. Rather    call    us,    even    if it’s for advice only.
CONTACT US AT +27 11 462-1680
© IMPERATIVE TECHNOLOGY - 2016