Data Reprocessing  & Data acquisition where local IT involvement is not desirable.

Mobile phone interrogation - Oxygen 

 

 

Oxygen Forensic Detective enables us to examine the majority of smartphones, dumbphone, liephones and tablets on the market. Pincodes can be an issue on some but there are ways to open in 95% of cases. 

 

This suite has a massive capability to recover deleted data - images, messages and whatsapp etc.  User communication records, locations the list is very comprehensive. 

 

see http://www.oxygen-forensic.com/en/products/oxygen-forensic-detective

 

We offer a back at base examination, or in the field service.

 

 

PC - Mobile phone interrogation - En Case Forensic v7

 

 

Guidance Software enables us to examine most forms of data storage SSD, HDD (Server & PC) memory cards, mobile phones/tablets etc. 

 

This suite has a massive capability to recover deleted data - images, documents, emails, messages in part or full detail.   

 

The examination can be done on the original drive using data blockers to protect the original from the effects of write backs or we can mirror the drive and examine the mirrored drive.

 

see https://www2.guidancesoftware.com/products/Pages/encase-forensic/overview.aspx

 

We offer a back at base examination, or in the field service but note a large drive will take 6 to 24 hours to index.

 

 

PC - Mobile phone interrogation - Forensic Tool Kit 

 

 

Accessdata very similar to En Case enables us to examine most forms of data storage SSD, HDD (Server & PC) memory cards, mobilephones /tablets etc.  

 

This is much the same as En Case but having the 2 systems enables a thorough investigation and validates each of the examinations if needed.    

 

The examination can be done on the original drive using data blockers or we can examine the mirrored drive.

 

see http://accessdata.com/solutions/digital-forensics/forensic-toolkit-ftk?/solutions/digital-forensics/ftk

 

We offer a back at base examination, or in the field service. 

Data Storage mirroring  

 

 

We can attend site remove a Target PC Drive, mirror and replace to allow the "PC or Mac" continued usage in an ongoing investigation, this includes Mac's PC's laptops desktops, servers etc.

 

We can attend site make multiple copies of the drives and return to base.

 

We use both Image Solo Masster and Tableau Forensic duplicators.

 

Write Blockers - Drive Locks

 

 

We have a range of data blockers, these connect between the target drive and the interrogation PC and allows interrogation of the suspects drive without writing to it and therefore free from contamination, potentially "interfering" with the evidence.

Data acquisition where data is needed fast  

Keystroke capture 

 

 

We have a range of key stoke capture device for USB and PS/2 both have 4Gb storage with a typical word doc of 64Kbs this is a massive storage.

 

Recover the device and view in a document view as raw text.

 

A wifi connected keystroke logger is available that connects to the internet using an access point this enables the data to be emailed out on a regular basis or you connect in over TCP/IP and view the captured data.

Keystroke capture module

 

 

We have the keystroke modules which can be installed into your range of keyboards to blend in covertly. 

Video frame capture

 

 

We have the new video frame inline capture device which grabs the video output to the monitor and saves them as JPEG's to the 2Gb internal memory.  Once recovered the grabber is connected to a Mac or PC as a USB flash drive and data extracted.

 

It is offered in 3 connection formats VGA, DVI or HDMI.

 

A multi format version is offered but less covert.

 

Data Reprocessing  & Data acquisition where local IT involvement is not desirable.