Informative Articles About Digital Forensics Litigation Support

Cellebrite’s UFED, a Must for Forensic Investigators!

By admin | April 19, 2012

The digitalization has transformed the criminal enterprise to a high tech, stealthy, global organization. Identity theft, money laundering, fraud, theft of intellectual property, etc., are a few to add in a long list of crimes happening in web 2.0. Imagine if your friend is charged with money laundering which he/she is not committed. What if you could show electronic evidence that proves his/her innocence! Sounds interesting? Cellebrite’s UFED, a mobile forensic devise, gives investigators all the tools necessary to do job efficiently, with a full complement of accessories, cables, card readers and much more, plus powerful analyzing, extraction & reporting software that can be run from any PC. With a rapid change in technology and advanced mobile devices, BlackBerrys, Androids, iPhones are some of the smart phone we use on daily basis to take photographs,send texts and emails, update Facebook, consult maps, search the web, and the list goes on. As we do this, however, our mobile devices often are quietly making records and generating evidence of all these activities. For better or for worse, this makes mobile devices perhaps the richest source of evidence about the people that use them. However, one of the major issues is that, because the mobile device industry is still at nascent stage, a multitude of different operating systems, communications protocols, and data storage methods are in use, and more are being developed every day such as…

Read More

Virtualization – A Threat To Hard Drive Data Recovery

By admin | July 3, 2011

Hard drive data recovery is the process of retrieving lost data from hard drive. This retrieval is done due to the inaccessibility of data through normal recovery processes. Notwithstanding the fact that your hard drive has crashed or locked up for some reason, you can recover the data using a variety of hard drive data recovering techniques. Virtualization makes it complex to manage disparate virtual, physical and cloud resources simultaneously. There are three areas of IT where virtualization is making news – network virtualization, storage virtualization and server virtualization. Virtualization enables IT enterprises focus on their core competencies while their day-to-day troubles are taken care of by third party data centers and disaster recovery facilities. These centers offer end-to-end managed IT services on virtual systems to enable enterprises save on setting up IT infrastructure. While virtualization is a great option, it is a path to leaving data unprotected. While IT companies are adopting virtualization to reduce costs, this process is adding to the complexity to their IT environments. This leaves the critical data unprotected. Only ten percent of the critical applications data that is stored on virtual system is protected. It is time IT companies resorting to virtualization assess the necessity of having a protection for virtual data. Almost half of the data stored on virtual systems is not even backed up. One of the greatest drawbacks of virtualization is that there is…

Read More

Phone Log Reconciliation

By admin | June 30, 2011

Knowingly or unknowingly we transmit a lot of information over phones. While we may not realize or even see the need to keep such information, it becomes useful to retrieve phone log information for legal issues. In complex litigation, all information passing between the client and vendor is considered part of intellectual property or trade secrets. In legal cases phone log information records can be subpoenaed to determine if there was a trade secret violation or any other breach, or intellectual property information that is confidential has been compromised. In such scenarios, a search should be conducted through multiple phone numbers’ log records to produce a comprehensive report of violation or non violation. Data Triage Technologies (DTT) has pioneered in Phone Log Reconciliation Service that is designed to manage completely a process that can be very time consuming if not automated appropriately. Now, it is possible for you to retrieve information that you may need to call as proof in a case. This service is extremely beneficial for lawyers and legal firms. Phone logs come in several patterns that include digitally archived as images and spreadsheets as well as in paper format. Each phone company and cell phone provider has its own proprietary format for storing and presenting records. These formats require standardization to generate a comprehensive analysis. DTT executes a process of Optical Character Resolution (OCR) as well as Quality Assurance to…

Read More

Why E-Discovery Protocol?

By admin | April 18, 2011

Too many Electronically Saved Information cases are left pending, without ever discovering the light of a solution in sight. The E-Discovery protocol is expected to facilitate the just, speedy, and inexpensive conduct of discovery involving Electronically Stored Information (ESI) in civil cases, and to promote, whenever possible, the resolution of disputes regarding the discovery of ESI without the intervention. Lawyers engaged in civil litigation on smaller matters are not sure regarding the extent to which ESI must be preserved. They are worried about the costs associated with identifying, preserving, collecting, reviewing, and producing this information. This uncertainty, and a lack of understanding of the technical issues involved, forces many lawyers to choose one of the two extremes: over preservation to prevent sanctions or delegate preservation responsibilities to vendors or the clients themselves. Without the benefit of large E-Discovery budgets, attorneys handling smaller matters may find themselves trapped. Engaging an outside expert to assess the client’s technology infrastructure and implement an appropriate E-Discovery protocol is prohibitively expensive. Clients may not be comfortable with the internal information being assessed by outside experts when their own technology personnel can handle the chunk of information. They may question the need to hire outside experts. These are, of course, reasonable arguments Usually the time consuming collection of ESI may even go waste. Then there is the attorney review time which again takes a long time to process including…

Read More

Scope of E-Discovery Protocol

By admin | April 15, 2011

E-Discovery has raised many important issues for litigators and their clients, including evidence integrity, preservation of meta data and its forensic value, recovery of electronic documents from backup tapes, the sheer volume of electronically stored information (ESI) and its impact on the scope of discovery and burden on the parties, and the suitable exchange of electronic documents. In December 2006, the US through the Federal Rules of Civil Procedure, introduced wide ranging measures to tackle these issues. Ever since the US courts have adopted these measures. The Federal Rules of Civil Procedure altered the federal litigation expanse by imposing certain strict rules on litigants. The litigants now have to discuss early in the case a range of matters relating to the discovery of their ESI. It also provides for an early discussion of the assertion of privilege claims. The scope of E-Discovery protocol has now changed from how it was earlier dealt with and not dealt with. Before the new federal rules came into existence, litigants had to deal with issues related to ESI without a specified framework of rules specifying their disclosure and production obligations. Often, due to a lack of refinement of E-Discovery, the requesting parties’ counsel makes responding parties either to ignore their E-Discovery obligations or to run out the clock without providing any significant E-Discovery responses, information or ESI. The prohibitive cost involved in E-Discovery makes parties concerned failing…

Read More

Sarbanes Oxley Compliance Financial Security Audit and Management

By admin | March 26, 2011

Various rules and regulations require management of companies to the protection of proprietary and confidential information. Sarbanes-Oxley and SB-1386 are examples of such rules and regulations. The Sarbanes-Oxley Act was passed into law in 2002 to protect investors by improving the accuracy and reliability of corporate disclosures. The requirements of Sarbanes-Oxley are that a public company must have written policies and procedures that are followed to protect the interests of its stock holders. Sarbanes-Oxley SB-1386 mandates that if a company maintains client personal information. This information must be maintained in a secure manner. In the event any client personal information is compromised each client who may have been affected must be informed within a reasonable period of time. Data Triage Technologies provides confidential auditing services that comply with Sarbanes-Oxley and ISO (1)7799. DTT’s consultants will test and review network security policies and procedures and provides a detailed report addressing the security findings. Recommendations will be made if needed to insure proper compliance. Upon request, DTT can further assist the client by drafting written policies and procedures. Details of all work performed including testing and our analysis of the network security situation is included in a comprehensive report and delivered to the client in a timely manner after completion of work. Our network security policies and procedures will ensure that your end-to-end Network security solution always provides you the suitable level of protection. We…

Read More

The Sarbanes-Oxley Compliance For Corporates

By admin | March 26, 2011

Auditing is a major concern of any company. Every organization should comply with rules and regulations set forth by the US government. One such regulation is Sarbanes-Oxley Act which applies to public companies. The Sarbanes-Oxley Act was enacted as a reaction to a number of corporate and accounting scandals. These scandals shook the confidence of the public because they cost investors millions of dollars when the share price of the affected companies collapsed. This Act does not apply to privately held companies though. The Sarbanes-Oxley Act was passed into law in 2002 to protect investors by improving the accuracy and reliability of corporate disclosures. The requirements of Sarbanes-Oxley are that a public company must have written policies and procedures that are followed to protect the interests of its stock holders. This law totally changed the standards of all US public company boards, management and public accounting firms.The SOX orders strict reforms to improve financial disclosures from corporations and prevent accounting fraud. The Sarbanes-Oxley Act (SOX) requires that if a company records client personal information, it must be maintained in a secure manner. In the event any client’s personal information is compromised each client who may have been affected must be informed within a reasonable period of time. The Act Creates a Public Company Accounting Oversight Board to enforce professional standards, ethics, and competence for the accounting profession Strengthens the independence of firms that…

Read More

The Process for Recovering Electronic Evidence

By admin | March 1, 2011

There are two primary steps in the process of recovering electronic data; “acquisition” of the target medium, and a forensic byte-by-byte analysis of the data. Computer forensic science was created to address the specific and articulated needs of law enforcement to make the most of this new form of electronic evidence. Computer forensic science is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer medium. Rather than producing interpretative conclusions, as in many forensic disciplines, computer forensic science produces direct information and data that may have some significance in a case. This type of direct data collection has wide-ranging implications for both the relationship between the investigator and the forensic scientist and the work product of the forensic computer examination. Using customized computer forensic tools, the target medium is acquired through a non-invasive complete area-by-area bit-stream image procedure. During the imaging process, it is critical the mirror image be acquired in a DOS environment. Switching on the computer and booting into its operating system will subtly modify the file system, potentially destroying some recoverable evidence. The resulting image becomes the “evidence file,” which is mounted as a read-only or “virtual” file, on which the forensic examiner will perform their analysis. The forensics software used by CFI creates an evidence file that will be continually verified by a Cyclical Redundancy Checksum (“CRC”) algorithm for every…

Read More

Electronic Discovery Services

By admin | February 27, 2011

Electronic data discovery is a collection of huge chunks of data that is either lost due to some accident or deleted due to some reason. Such electronic data retrieved is used in litigation cases where electronic data is evidence. Electronic document discovery services for law firms and corporate clients involved in litigation are no longer a matter of requesting printed copies of documents. New and extremely valuable data can be found in accounting systems, Email or databases if one knows where to look. This retrieval requires processing and review of large volumes of desperate data, many times eliminating the expense of converting irrelevant data. Electronic discovery enables you to streamline e-discovery by providing a window into your case data before data processing and review. It helps you gain control and transparency by determining filtering guidelines. Electronic data discovery includes retrieval of e-mails, voice mails, instant messages, e-calendars, audio files, data on handheld devices, animation, metadata, graphics, photographs, spreadsheets and other types of digital data. E-discovery can also be in the form offline discovery carried out on a particular computer for a particular case. Computer forensics is an electronic data discovery service that includes the collection, preservation, analysis, and presentation of computer-related evidence. Computer evidence can be useful in criminal cases, civil disputes, and human resources/employment proceedings. Computer forensics is a specialized form of e-discovery in which an investigation is carried out on the…

Read More

Hard Drive Recovery Services

By admin | February 17, 2011

With the advent of technology there is a broad range of problems we encounter on a daily basis. The current trends allow us to store a huge amount of data in the form of files on computer hard drives. Hard drives have replaced the earlier cumbersome piles of papers that were susceptible to damage easily. With hard drives on computers we can save humongous chunks of data that can be retrieved at an unimaginable speed. However, there is a possibility of this data being lost, the drive not accessible, the drive getting corrupt and other unexpected snags. Hard drives being the most valuable assets of a company should not be messed with. If you chance to lose data due to a hard drive crash, a state of the art means by Data Triage Technologies assists you to recover data from corrupted drives. In the absence of back ups such data recovery is invaluable. How is data retrieved? Hard drive data recovery is the process of retrieving lost data from hard drive. This retrieval is due to the inaccessibility of data through normal recovery processes. Notwithstanding the fact that your hard drive has crashed or locked up for some reason, Data Triage has hard drive recovery services that can recover the data using a variety of hard drive data recovering techniques. Why does a hard drive crash? Reasons can be many when it comes…

Read More

Contact us

(Free initial consultation – no spam)

Contact form (1)

"*" indicates required fields

This field is for validation purposes and should be left unchanged.