EN
TH
Computer Forensics
+ What is Computer Forensics
Investigation?
+ Who needs computer forensics?
+ Computer Investigation for Lawyers
+ Computer Forensics for Private
Investigators
+ Forensics for Business
+ Forensics for Individuals
+ Finding Electronic Evidence
Computer Forensics
What is Computer Forensics Investigation?
How to find evidence of information hidden in computer files or mobile phones?
In the 21st century, e-crime and unfair acts is a fact and common (fraud, concealment of assets, distribution of illegal materials through electronic devices, etc.).
Computer Forensic Science is science, which through thorough investigation of electronic data, manages to present evidence in connection with an offense as a large proportion of civil, criminal and corporate crimes are linked either directly or indirectly through a computer.
These data can be collected from, for example, prints a specific computer, by e-mail, from the Internet as well as from a variety of electronic storage media.
The investigation of a computer crime is a difficult process because the evidence must be preserved intact, analyzed and presented in a legally acceptable way.
Where can Computer Forensics be useful ?
1. Tracking suspicion of corporate assets
2. Breaches of personal data of customers and corporate partnerships.
3. Misuse of the Internet and installing malicious software
4. Falsification of records
5. Workers sabotage and information leakage
6. Sexual harassment by any form of electronic communication
7. Monitoring employee activity
8. Software piracy etc.
Evidence of illegal activities using digital media?
Thai Data Recovery Laboratories undertakes:
1. To satisfy your urgent need for detailed electronic research for punishable acts like: child pornography, sexual harassment, financial crimes, wiretapping issues, falsification of data, rights violations, falsification of contents, privacy violation etc.
2. To protect you by providing advice: for safe web browsing, for protection from malicious software and harassment, but also to make sure that your financial transactions over the internet or ATM is safe.
Who needs computer forensics?
The services of investigating electronic computers and mobile phones may be useful to anyone trying to obtain information and evidence from a computer or a mobile phone.
During this process, multiple parameters are analyzed and items found can even be used in litigation.
Below are some common cases undertaken by the company:
for individuals...
- Do you suspect that your spouse is cheating on you?
- Are you recently divorced and you receive threats and feel observed by your former husband / spouse?
- Do you think we can help in identifying evidence through research on cell phone e-mails, photos, sms and calls that have 'disappeared'
- Do you accept electronic attack and you feel that you are constantly under surveillance
- Did you notice financial transactions for which you never gave your command
- Your passwords have been violated and you found out that your money from your bank account have vanished
- Concerned about your child and think that makes misuse of the Internet, browsing web pages prohibitive for the age of content
- Do you suspect that pornographic sites are often visited by a member of your family and want to cancel this feature
- You are coheir, but have doubts about the integrity of the will and wish to check the online records of the deceased
for lawyers...
- Restore deleted documents carefully, photographs etc.
- Edit hidden files that can be hidden on the computer and not accessible by simple user (Bad sectors, ATA drives, Volume Slack).
- Isolation of important data from hard disk, CD - ROM, zip disk and other storage media.
- Final report which occurs after functional - kinship - time analysis and stratigraphy
- Preparation of testimony through objective findings resulting from the collection of acceptable electronic data with respect to the laws of privacy.
for private detectives...
- Analysis of history
- Finding specific evidence
- Investigation of activity on the internet (msn, skype etc)
- Restore erased files
- Find deleted SMS
- Call history analysis
- Find contacts
- Find deleted files
- Find hidden pictures and video
- Data Recovery from mobile phone (iPhone, Android, Windows Mobile etc)
for businesses...
- Monitoring of corporate assets
- Breaches of personal data of customers and corporate partnerships
- Misuse of the Internet and installation of malicious software
- Falsification of files
- Workers sabotage and information leakage
- Sexual harassment by any form of electronic communication
- Monitoring employee activity
- Software piracy etc.
Computer Investigation for Lawyers
Lawyers and law firms for evidence presentation in court battle.
- Litigation using evidence on computers and mobile phones
- Cooperation of Law and Electronic Research
- Is the digital footprint an exculpatory element?
If you are convinced that in your court case may you can provide information and electronic evidence from the opponent's computer , Tic Tac Laboratories may contribute to the collection of evidence from electronic media. The specialized investigators of the company in Electronic Crime are fully trained and with the use of software and ongoing training, can respond effectively to the demands of research even in a hostile electronic environment and gather critical information about the course of a court case.
The positive outcome of several legal cases depends on the thorough research that provides the criminology (forensics) with the collection and proper preparation of data from computational tools and their presentation in the courtroom.
The cooperation of law firms and Computer Forensics, is not about just a simple data recovery, which may result from an accident, but mainly has to do with the discovery of certain electronic evidence to make an act as criminal. As each case is unique, this procedure may include individual or combined as:
1. Restore carefully deleted documents , photographs etc.
2. Edit hidden files that can be hidden on the computer and not accessible by simple user (Bad sectors, ATA drives, Volume Slack).
3. Isolation of important data from hard disk, CD - ROM, zip disk and other storage media.
4. Final report which occurs after functional - kinship - time analysis and stratigraphy
5. Preparation of testimony through objective findings resulting from the collection of acceptable electronic data with respect to the laws of privacy.
Contact us for quatation.
Computer Forensics for Private Investigators
- Do you need cooperation of physical and electronic surveillance?
- Analysis must be made of a mobile telephone or a computer to find information?
- You suspect that the thorough investigation of records from an electronic means will help you in your research?
In many cases of surveillance and when the computer is a basic tool of everyday life both as individuals and professionals, the goal of e-forensics is to identify data suppressed, erased files and messages, that are potentially incriminating or exculpatory evidence.
For Research in computer files we provide the following services:
- Analysis of history
- Finding specific evidence
- Investigation of activity on the internet (msn, skype etc)
- Restore erased files
For Research on cell phone records we provide the following services:
- Find deleted SMS
- Call history analysis
- Find contacts
- Find deleted files
- Find hidden pictures and video
- Data Recovery from mobile phone (iPhone, Android, Windows Mobile etc)
There is an urgent need for electronic surveillance, particularly in cases of disappeared persons, which is frequent. Many crimes and offenses have been traced by means of encryption or data recovery. Documents in physical form, can be combined with data extracted from computer forensic systems and lead to resolve a complicated case.
It is now a reality that the "electronic document" has taken the place of conventional document forming the core of the "information society" and a key feature of electronic business (e-commerce), electronic communication and electronic commerce (e-commerce).
Therefore, this development is closely connected with what is happening in the area of crime, when changing the basic ingredients of this. Specifically, electronic crime, is committed with new and inventive ways by using high technology and especially the Internet, which reflects the social pathologies and assists in creating new forms of crime.
Therefore, since the commission of a digital crime requires excellent and specialized knowledge because:
1. Is committed in long-distance
2. The identification of criminals is complicated
3. Is yielding big profits with little risk of discovery of the offender
Then, cooperation of traditional monitoring methods, such as private detective with "digital detective" is necessary, that is with the help of Electronic Criminology.
Contact us for quatation.
Forensics for Business
- Is there evidence that corporate information of your company is leaking out?
- Do you suspect that an employee transfers your confidential corporate data?
- Do you have evidence that your partner hides important data from you?
Our company can help you prove the above activities or for personal use or for use in litigation. Thai Data Recovery Laboratories through our technicians, can provide effective services to the electronic research of corporate offenses and breaches in small and large businesses.
If you realize that you need immediate investigation as to whether a computer or mobile phone contains sensitive personal data, then it means that: probably you feel that there should be an extensive electronic research of employees in case that your employees are suspected to transfer corporate data to competitors or you believe you are a victim of some hacker or even cases of theft of intellectual property.
In all these cases and in even more, such as:
1. Monitoring of corporate assets
2. Breaches of personal data of customers and corporate partnerships
3. Misuse of the Internet and installation of malicious software
4. Falsification of files
5. Workers sabotage and information leakage
6. Sexual harassment by any form of electronic communication
7. Monitoring employee activity
8. Software piracy etc.
You need the safety of of your files and Thai Data Recovery Laboratories has specialized engineers: to search, filter and integrate the evidence to the appropriate digital analysis to be able to accurately certify the "HOW, WHERE, WHEN AND BY WHOM? "by acting with precise dates in order to stay satisfied.
This research and filtering regards any form of storage medium and computer systems and usually takes place in e-mail, hidden files and generally to computer files.
Contact us for quatation.
Forensics for Individuals
- Do you suspect that your spouse is cheating on you?
- Worried about the activities of your children on the internet or their telephone conversations?
- Do you have litigation in family and inheritance issues?
When you have a dispute that is going to take the path of justice, please contact Thai Data Recovery Laboratories to pump data from any computer or mobile phone, as evidence of your divorce, research on mobile phone to identify extinct calls and Deleted messages hidden documents and images switched off.
Our company works in close cooperation with you, under the forthcoming legislation on protection of personal data and respecting the obligation to protect individual rights and only if you have the legal right to access to computer and electronic means of others that have "raised" you in some way or have something to hide from you. So :
- Do you suspect that your spouse is cheating on you?
- Are you recently divorced and you receive threats and feel observed by your former husband / spouse?
- Do you think we can help in identifying evidence through research on cell phone e-mails, photos, sms and calls that have 'disappeared'
- Do you accept electronic attack and you feel that you are constantly under surveillance
- Did you notice financial transactions for which you never gave your command
- Your passwords have been violated and you found out that your money from your bank account have vanished
- Are you concerned about your child and think that makes misuse of the Internet, browsing web pages prohibitive for the age of content
- Do you suspect that pornographic sites are often visited by a member of your family and want to cancel this feature
- You are coheir, but have doubts about the integrity of the will and wish to check the online records of the deceased
Contact directly to Thai Data Recovery Laboratories, to give you immediate professional solution, drawing files and data such as documents, messages, photos, and Deleted discussions of all forms of electronic communication by phone, hard drive, laptop or usb flash that you deliver for examination.
You can request the immediate assistance of our technicians either as service at home or by handing them the hard drive or mobile phone for example. from which you think you can be get evidence to present to the appropriate courtroom.
Contact us for quatation.
Finding Electronic Evidence
The Electronic Research of a crime differs significantly from "traditional research" looking for tangible evidence. The electronic researcher is not looking in a drawer or in some space but in electronic folders, files, storage devices, computing systems.
The digital evidence collected are considered particularly sensitive. Therefore, important piece of electronic research is to preserve them and ensure non-alteration.
The Research of a crime must be conducted in accordance with existing law, as many doubts are raised about the adequacy of knowledge of the researcher and whether the analysis and preservation of data follow the procedures. Therefore, many times, we face the phenomenon in a trial to dispute either the investigation, or to confiscate the information because there is no specific legislative framework in the case of research in cyberspace.
During an investigation, it is important to not violate the privacy of individuals. Therefore generally it requires a warrant which should specify precisely the objects that can be searched and even if the researcher believes he could draw data from other than these items, these items do not have probative value to the courtroom .
The researcher of a cybercrime uses specialized tools by following specific steps in the process of research:
- Identification of means of data recording and photographing in order to be able to demonstrate the natural environment and condition of items.
- Creation of security areas for data. Usually a secure cabinet is used.
- List of items that may include: laptop computers, hard disk or external drives, backup recording media, DVD, CD, etc., keys USB, pocket PCs, smart phones, analysis of network activities.
- Creation of a folder for forensic evidence which can not be deleted or removed to ensure data integrity.
- Registration and insurance of the electronic image of the forensic data disk and labor on the working image of the disk by the researcher.
- Search for other sources of data extraction, as indicated by the progress of the case.
- Examination of the data with appropriate software to make the searched data readable and usage of keywords to identify data relevant to the case.
- Aggravating and non data are collected, files are decrypted and security codes get broken.
- Afterwards a report is recorded with each stage of electronic forensic research findings, signed by the customer.
- If considered necessary, the investigator shall attend as a witness in the courtroom.
The electronic forensic investigation should be made with the following principles:
1. No action may alter data held on computer or storage medium, which can be presented in court.
2. Use of originator data by a third party , after authorization .
3. Using original data from third person, delegated powers.
4. The person designated as responsible for the investigation, is charged with overall responsibility for ensuring compliance with forthcoming legislation and principles.
Download and print our Diagnostic form before you send us your media
or contact us for your FREE diagnostics.
In Case of Emergency
+66.2.652.0156