Showing posts with label data recovery. Show all posts
Showing posts with label data recovery. Show all posts

Tuesday, 7 January 2020

Professional, Affordable Digital Forensics Services in South Africa

Digital Forensics is a lot more complex than using a range of well-developed forensic software that can be bought online to investigate something – it is a skilled understanding of all things digital (this includes cellular and computer based forensics), the investigative process, and criminal as well as civil investigations. 

Image result for digital forensics


The TCG Digital Forensics division came to be in the year 2006 when it separated from The Computer Guyz and began offering Digital Forensic services including digital fraud investigations, service of summons, data recovery and CFE in South Africa.

With over 18 years of experience in trading in South Africa, we know exactly where we should be when it comes to our customers market needs as well as the Digital Forensics field. Our incident response team is trained with a broad background of skills ranging from IT intelligence and data investigation to network security and so much more.

At TCG Digital Forensics, we use the latest software and a system of techniques to collect, research, investigate, and uncover the digital evidence that you require. Our digital forensics services are designed around the requirements of a specific set of clients which includes investigative firms, attorneys, investigators, forensic auditors and blue chip customers, however we do cover a wider scope should you need our assistance.

Image result for digital forensic services llc

Do you have a particular set of requirements? Please do not hesitate to contact us at any time. Our main digital forensic investigation offices are in Cape Town, but we do have offices in the Pretoria area and a presence in the coastal area of Durban.

We are proud to offer all our customers clean, professional and methodical digital forensic services supplied by our professional incident response team. Here are some of the Digital Forensic services, including cellular forensics services and computer forensics services that we provide in Cape Town, Pretoria, Durban and nationally…

Incident Response Team
Business Continuity Planning
Cyber Penetration Testing
Hacking Recovery
Cyber Investigations
Cellular Phone Analysis
Hard Disk Drive Analysis
Device Acquisition
Testimony
Due Diligence Investigations
Image Enhancement
Certified Fraud Examiner Services
Service of Summons

Image result for hacking

Learn more about our Digital Forensics services by visiting our website www.tcgforensics.co.za

Thursday, 27 June 2019

What do you know about our OSINT Services?

What is OsInt?

Open Source Intelligence refers to the use of publicly accessible information as well as databases to collect information in a structured manner. Information is gained from Public and Private Databases, the surface web, the deep web and the dark web



Who uses OsInt?


OsInt is used by private and forensic investigators, attorneys, law enforcement, intelligence organisations, fraud investigators, human resources professionals, tracing agents and commercial enterprises. It is a key component of performing due diligence studies on persons and businesses.

What is SmInt?


Social Media Intelligence is the use of information stored within social media platforms to further the knowledge of a person, group or incident. Often this information is available unbeknownst to the user. While the information is not accessible at the click of a button it can be uncovered with queries and structured data calls.



Is OsInt software?

No, OsInt and SmInt are processes. These processes often use software for recording the process or information uncovered but they remain human processes. Analysis of data still vests with a human being and not an algorithm.

How technical is it?

There are different levels of OsInt ability, from a basic researcher to programmers and analysts. A good degree of computer literacy is essential as is an understanding of the internet and investigative methodology.



Can't someone just share their tools with me?

They could, but that would only provide a tool. Much like giving someone who can drive a 250 ton crane driver won't make them a crane operator. OsInt requires a structured investigative approach and an understanding of how the results and pivots meet. This requires hands-on training.

Is this training available online?

We don't provide online training. OsInt as a skill/ ability requires hands-on practice and lab environments in order to develop best practices. Each countries level of data availability differs substantially as do privacy laws between jurisdictions. As such, you need someone experienced to guide you.



Is this training expensive?

Comparatively, no. A level 1 OsInt/SmInt course will cost around R2000-2500 per delegate, per day. This is well priced in the commercial training sector as the skills required for teaching OsInt are scarce and in high demand.

Do you actively practice or only teach?

Our company is an active Digital Forensics practice and as such all trainers are experienced and use their skills daily in the furtherance of their job functions. We train from a perspective of experience coupled with theoretical knowledge.



What can you DO with OsInt?

Our practice is a Digital Forensics lab environment. As such we use OsInt for profiling suspects in civil and criminal matters, tracing people, locating digital evidence, analysing and verifying digital information, providing expert witness testimony in court and of course Due Diligence investigations.

Is group training available?

Yes, we do provide group training on request (minimum 5 people). Costs are dependent on the location, travel expenses, etc.



Is one-on-one training possible?

At this stage we do not provide one-on-one training but are always open to discussion.

Is OsInt legal?

Absolutely, it's key to learn the laws around data privacy and to ensure that you're working within them at all times.



Is this course SAQA Accredited?

At this point no, we are however in the process of accrediting our training material with SAQA and will advise once this is complete. As a 40 hour course curriculum with specific outcomes we do not anticipate too many glitches with achieving this.

Who are your course instructors?

Our course instructors are chosen based on their proven OsInt/SmInt experience as well as their ability to present and impart knowledge. The majority of our instructors have a policing background as well as commercial experience. Some of the instructor crew are chosen for presentation of specific modules in which they hold strong credentials and expertise.



Do you employ OsInt Analysts and Researchers?

Yes, we certainly do. Positions are advertised on this site as well as on our Facebook page as they become available.

Please note that our next OSINT seminar is being held on Tuesday the 9th of July in Midrand.
During this session, you will learn about the available information and tools to use, to assist with your case, or to let you know what is possible. Please note that due to limited available space, bookings are essential! Cost is R650 excl VAT. 

Please feel free to contact us on +27 21 110 0422 | +27 10 110 0904 or email contact@tcgforensics.co.za. Take a look at our website here www.osint.co.za

Thursday, 13 December 2018

What is the Difference Between Digital Forensics and Information Security


Before we get into the differences between digital forensics and information security, let’s stop and take a look at how they are alike.

Image result for digital forensics

Both digital forensics and information security are aimed at protecting your digital data, goods and valuables as well as digital resources. People who are involved in digital forensics or information security can work in a range of industries, including private businesses and organisations. Why can people in the digital forensics and information security work in so many different industries? Because, companies know that as the world becomes more digitally dependant so does the need to keep their technology and systems properly secured. Digital forensics and information security specialists are becoming more and more popular as the demand for their skillset grows.

But, just because digital forensics and information security are both focused on digital goods and resources doesn’t mean the two are both closely associated with each other doesn’t mean they are the same.

It is best to think of digital forensics and information security as two different sides of the same thing, so the services and work that is done is very much the same, but it does have differences.

So what is the difference between digital forensics and information security? To put it into simple terms that everyone can understand, information security is about preventing and protecting against online and digital threats. On the other hand digital forensics is about the response that comes after.

Related image

Let’s look at it like this – information security is the team that executes and supports the information security system with the aim being to protect individuals and businesses against cyber threats. If information security fails to protect the users and the systems are broken, then this is where the digital forensics experts come into the picture – they will put their skills to use by singling out the threat, understanding it and trying to recover all the data that was lost and/or stolen.

At TCG Digital Forensics, we offer all our clients clean, professional and affordable digital forensics services as well as information security – all supplied by our team of skilled digital forensics experts. Do not hesitate to contact us to discuss your requirements; simply give us a call on 021 110 0422 or email contact@tcgforensics.co.za

Tuesday, 4 December 2018

Let us recover your Digital Evidence quickly and easily!


People use their computers for almost everything; many of these things can be used against you. Hiding money, illegal activities, inappropriate emails and just about anything you can think of.

Image result for digital evidence

Often, if you are trying to hide something, you’ll make an effort to completely clean out your computer by deleting “everything” and reformatting. The problem is, when you contact IT support and you are told that all is lost, they probably have no idea what a digital forensic investigator can do!

The harsh truth is that the evidence is still there waiting to be found you just can’t see it. The only question is – do you want it recovered or not?

Many businesses that have a disgruntled employee, or feel that an employee is involved in unacceptable activities at work, may want to acquire some digital evidence, they can use a digital forensic investigator to recover all the evidence that they need.

We at TCG Digital Forensics are pleased to provide all the evidence that you need off of a computer, cellular device, laptop or tablet. The obvious advantage that we have here is that we recover digital evidence that few others could and keep all affairs private.

Need something recovered? Don’t hesitate to give us a call on 087 001 0523 or email contact@tcgforensics.co.za

Wednesday, 10 October 2018

What to do when your Hard Drive eventually gives in


Has your hard drive been giving you trouble recently? Has it been acting strange – making noises, moving extra slow and making it almost impossible to find your files? Don’t worry you’re not alone, every hard drive eventually gives in, so it might be time to say goodbye!

Image result for hard drive fail

When your hard drive is close to giving in, always look out for these signs…

- Strange noises
- Files becoming corrupted
- Crashing
- Slow speeds

These are the most common signs you’ll see, especially if your hard drive is a few years old. If you have an old spinning hard drive, the moving parts can deteriorate over the years causing it to break.

New hard drives, such as solid state drives (SSD) do not have any moving parts, however they too will eventually break when the storage cells have degraded. Although, keep in mind that solid state hard drives are much more reliable and last a lot longer.

Image result for hard drive failOver the years your hard drive may fail gradually, unless it is exposed to excessive heat or physical trauma. So, it is best to always keep a watchful eye on your hard drive’s health, this way you can make sure you are prepared and avoid losing all your precious data. However sometimes the inevitable happens and your hard drive does fail, this is when it is time to call in the professionals.

We offer detailed drive analysis and recovery of artefacts and data all in one. Using a physical image of the hard disk drive, we are able to provide a deep scan of deleted items and trace elements from a hard disk drive.

We use world leader Magnet Axiom for hard disk drive analysis along with a handful of proprietary tools and industry accepted technologies. While we are able to offer on-site triage and acquisition, data analysis is best done within our lab as it is a time consuming and resource intensive operation. We run the latest i7 processing units to minimise analysis time and deliver fast results in the form of a portable case file that you may interrogate at your convenience.

We follow a full secure chain of custody from device acquisition through to analysis and return of exhibits. Our digital forensics lab facility is based in Cape Town – please feel free to contact us on 087 001 0523 or email contact@tcgforensics.co.za

Wednesday, 3 October 2018

Cellular Best Practices for At-Risk Individuals

Image result for using computer

Email


· Register a unique email address to use when setting up your phone. Do not use your usual email address. You can add that later as a functional email account.

· Use a totally unique password for the email account with which you setup your phone.

· NEVER give anyone the above email address or password and do not use that email address for anything else.

· iPhone is safer than Android – provided that you follow these guidelines – specifically around using an anonymous email address.

· Always use solid, complex passcodes.

Data

· Enable encryption to secure your data if your phone ever gets lost.

· NEVER migrate data between phones. Rather back the data up and transfer it separately.

· NEVER hand your phone to anyone. Keep it in your hands if you need to show them something.

· Avoid linking your phone to any computer you do not have control of.

· KNOW what data you are backing up to Google, WhatsApp etc. be sure it is the minimum required information and no more.

General

· Keep apps to a bare minimum – if you don’t use it or need it, take it off!

· Never jailbreak an iPhone or root an Android device – only load apps from the relevant app store.

· Avoid using Wi-Fi. Only use Wi-Fi that is manually configured with a hidden SSID and Mac Addressing linking your phone to it. Outside of this, leave Wi-Fi OFF completely.

· Unless you absolutely must use Bluetooth – disable it

· Ensure that Kaspersky or Bitdefender are loaded on your device.

· Make sure that your handset is configured to automatically update your operating system – security vulnerabilities are exposed regularly and fixed. You need them!

For a wide range of digital forensics services including fraud investigations, CFE in South Africa, cellular forensics, service of summons, penetration testing, data recovery and so much more - give us a call now on 087 001 0523 / 021 110 0422 or email contact@tcgforensics.co.za. For more information visit our website here... www.tcgforensics.co.za

Wednesday, 25 April 2018

What can you do to keep your Broken Phone’s Data Safe?


Only you know how valuable the data on your mobile phone is, what you do with the information is up to you. So, do you know how to keep your personal data safe on your phone when it suddenly breaks?

Image result for cracked phone

The answer isn’t a simple one – how do you use your phone when the screen is cracked? It happens a lot more often than you think. The question is what do you do to protect your data when you can’t use your phone properly?

Here are a few things you can do to make it difficult for anyone without professional forensic skills to get to your stuff…

      1.       Use a secure lock screen – Swiping to unlock is easy enough for a monkey to do, so make sure you always lock it properly!

      2.       Set up Find My Device – Install Find My iPhone on your iPhone or Find My Device on your Android from Google Play Protect. Even if you can’t use the phone you can still access the data.

      3.       Change your Password – Use another device to change your Google password, this extra step will stop anyone from accessing your data and ensuring damage is minimal.

      4.       You may need to speak to a Professional – If you feel your data is precious enough to stress over, then you need to hire someone such as a professional digital forensic expert to assist you in retrieving or destroying it.

Related image

Looking for both cellular and computer forensics services? TCG Forensics is a digital forensics company in South Africa that is always at your service. We generally work directly for private investigators, polygraph examiners, attorneys and similar parties although we can accept a direct brief from a corporate entity that requires our services. We are able to assist bona fide law enforcement agencies with the procurement of forensic software and hardware once credentials have been verified.

Wednesday, 30 August 2017

What being a Digital Forensic Expert is all about

As technology advances, those in the criminal justice and criminology fields have to learn to change with it. More people conduct business online, and more occupations require at least some use of a computer or cellular phone.

Related image

To fight crimes involving computers and mobile phones, new career opportunities for digital forensic experts have started to become more popular.

What do digital forensic experts do? Well, as the name implies, they reconstruct and analyze digital information to aid in investigations and solve computer-related crimes. They can look into incidents of hacking, recover chat history and even recover lost or stolen data.

Some of the services of a digital forensic expert often include:

- Recovering data from damaged or erased hard drives

- Gathering and maintaining evidence

- Working with cellular devices, computers and other electronic equipment

-  Digital image enhancement

- Recovering SMS or chat history

Private companies and government organisations may employ digital forensic investigators full time, or they may contract for their services. Investigators will likely be involved in looking for violations of company policies regarding computer use as much as they will be involved in crime solving.

In addition to computer skills and related education and certifications, digital forensic investigators and digital forensic experts must also possess strong analytical and investigative skills. They need to be able to read and interpret data and to formulate conclusions, and they must be able to present their findings and conclusions in a format that can be easily understood.

A digital forensic expert’s job is both stimulating and rewarding. It allows you to put your unique skills and knowledge to work in a field that is truly helpful to others.

Wednesday, 2 August 2017

Recovering your Data Quickly and Easily

People use their computers for almost everything; many of these things can be used against you. Hiding money, illegal activities, inappropriate emails and just about anything you can think of.

Image result for forensics

Often, if you are trying to hide something, you’ll make an effort to completely clean out your computer by deleting “everything” and reformatting. The problem is, when you contact some IT support companies and you are told that all is lost, they probably have no idea what a digital forensic investigator can do!

The harsh truth is that the evidence is still there, waiting to be found, you just can’t see it. The only question is, do you want it recovered or not.

Many businesses that have a disgruntled employee, or feel that an employee is involved in unacceptable activities at work, may want to acquire some digital evidence, they can use a digital forensic investigator to recover all the evidence that they need.

At the TCG Forensic Division we can supply you with cellular, hard disk drive forensics and digital suspect profiling.

Need something recovered? Don’t hesitate to contact us today to discuss your requirements - call 079 691 0138 or email craig@tcgforensics.co.za

Wednesday, 19 July 2017

Data Loss and Recovery

Losing your data can happen in a number of ways. From accidentally deleting your files and your hard drive failing to hacking or even power failure! All these things can cause your data to be seemingly lost forever…

Image result for data loss

However, it is possible for some data recovery specialists to retrieve your precious data even if it has almost completely been destroyed. Should there be data on your hard drive, flash drive or other storage device that you would like to salvage – contact the TCG Forensic Division to discuss your requirements.

The bad news is that sometimes it is not possible to recover the data you have lost; sometimes the system is too damaged to get any data back.

There are certain methods that are used to get your lost data back, however the methods used depend on the way your data was lost in the first place. Here are some of the most common forms of data recovery:

~ File deletion recovery

~ File corruption recovery

~ File system format or damage

~ Physical drive damage

~ Solid state drive data recovery

The one best method that should always be used to protect your data – Make lots of backups on a regular basis!


Wednesday, 30 November 2016

How to Keep your Smartphone Secure

Your smartphone is no different to your property or house when it comes to safety – you have to use common sense!

Image result

Here are eight easy tips on how to keep your smartphone safe and secure:

      1.       Use a password
Always set up a password, pin or pattern to be able to access your phone. For Android: go to Location & Security. For iOS: go to Settings -> Touch ID & Passcode.

      2.       Only download from trusted stores
Use places like Google Play and the App Store to download your games and apps. Also make sure to always read the ratings and reviews if they’re available.

      3.       Back up your data
Protect your information in case an attack happens by backing up your data. If your data ever gets lost, we can recover it. Contact the experts at DLA to get your data back!

      4.       Update your OS and apps
Most updates are just for new features, but sometimes they are also to up the security.

      5.       Log out!
If you do your banking or online shopping on your cellular device, always make sure to log out afterwards. Never keep your passwords and usernames on your phone and try to avoid using public Wi-Fi.

      6.       Turn off Wi-Fi and Bluetooth
You may think it’s just a way to connect to free Wi-Fi, but hackers can also use it to access your device and data.

      7.       Don’t give out personal info
That email you received that looks like it’s from your bank may be spam. If you get SMS’s or emails asking you to fill in your private info and login, always contact the business and confirm it is actually legit. 

Wednesday, 23 November 2016

6 Easy Steps to Keep your Data Safe

These simple steps can keep your data safe, whether it is on your work computer, personal laptop or smartphone. Malfunctions, cyber attacks and viruses can happen to anyone – if you’ve lost your precious data, we can recover it! Contact the experts at DLA today!

>> Use the right software to protect your data. Anti-malware is a must if you want to protect your computer!

>> Prevent viruses from attacking your PC and destroying your data by installing virus and spyware protection.

>> Stop viruses and malware from getting into your system by using a firewall to block dangerous programs.

>> Be wary when you receive emails from unknown sources. Never open an email attachment or clink on a link if you don’t know where the email came from.

>> Stay away from dodgy websites that might contain viruses.

>> Always keep your operating system up to date by installing any recent updates or fixes.

Related image


Wednesday, 12 October 2016

The Importance of a Strong Password

Too many people come to us in a frenzy complaining that either their data has been lost or stolen OR they simply cannot remember their password. When you don’t have a password you cant access or protect your files, on the other hand even if you do have a password you need to ensure it is 100% foolproof so you don’t end up being the victim!

Image result

DLA offers password recovery services for businesses and personal computer users, using only the latest technologies to achieve the password recovery results you need. Our forensic recovery service includes recovering passwords from zipped files, word documents, excel files and of course logon profiles on computers.

We are able to access what cannot be seen using the latest forensic technology. Using state of the art cellular forensics tools we are also able to bypass 98% of device passwords to read the device directly without needing to know the handsets logon or password. 

We can also perform cellular forensics as well as data recovery from laptops, computers, cell phones and media devices such as tablets.

Do not hesitate to contact DLA for professional and affordable services in Cape Town and the surrounding areas!


Wednesday, 8 June 2016

Four ways to protect your PC data

A modern PC leads a kind of dual life. On the one hand, it serves as an entertainment centre, offering access to games, online videos, and the entire Internet. On the other hand, it acts as a tool for collecting, creating, and storing important information of all kinds.

If your computer is lost, broken, or stolen, switching to a new one has little effect on the entertainment side. But unless you've properly protected the personal data on that system, a theft or loss could become a data disaster.

The digital forensic experts at DLA use state-of-the-art techniques and software to recover your precious data, whether it was accidentally deleted or even stolen.

But, how can you head off such a disaster? Here are some hot ideas:


1. Hide Your Valuables
If a burglar breaks into your house, will she find your valuables lying around in plain sight? Or have you hidden them away safely? By the same token, even though your security suite or antivirus really should fend off data-stealing Trojans, protecting your personal data on the chance one might get through is just common sense. Having your data locked down will also help if that burglar makes off with your laptop.


2. Skip the Recycle Bin
When you need to dispose of papers that contain private information, you don't toss them in the recycling bin with the newspapers. Rather, you put them through the shredder. When deleting sensitive files, you should likewise avoid Windows's Recycle Bin.


3. Encrypt It!
A data-stealing Trojan will grab what it can get easily. Unless you're the target of a personally directed hack attack, you can figure that even simple encryption will defeat the Trojan. Got a sensitive file you need to keep, rather than shred? At the very least, copy it into an encrypted ZIP file and then shred the original.


4. Keep It Offsite
PCs break down, laptops get stolen, files get lost. A backup copy is the ultimate security for your data, but if you keep the backup with the computer a single disaster can take out both at once. A hosted online backup service encrypts your data and keeps it in a safe location far, far away.

Unless your PC functions as nothing but an entertainment centre, its loss or theft will have an impact far beyond the cost of a replacement. By taking steps to protect the important data on the PC you can keep that impact to a minimum.

Hide personal data, securely delete outdated sensitive files, and encrypt sensitive files that you're still using. That will keep a thief from stealing both your PC and your identity. Maintaining an offsite backup copy will ensure you don't lose access to the data files you really need to keep. A little effort now can save a huge headache later.

Wednesday, 1 June 2016

How to protect the private data on your phone

Your mobile phone carries all sorts of details that could damage you in the wrong hands. Here's how you can protect it from prying eyes.


  • Register your IMEI number

The International Mobile Equipment Identity is used by police to trace a lost phone. Network providers use it to block a stolen phone. It's usually found under the battery, or via the phone's settings. Register it at a site such as immobilise.com.

  • Remotely wipe all data

If you have lost your phone, you can clear the data before thieves download it. Android devices can use Google Sync along with Google Apps Device Policy to clear data remotely. Have you cleared your data and you want to get it back? Contact the digital experts at DLA and you can get your precious data back quickly and easily!

  • Get antivirus protection

Now is the time to protect against malware and viruses, particularly on Android phones. There are subtle ways for developers and fraudsters to get to your data. Most computer antivirus-software companies provide apps to keep out malware and viruses that grab data.

  • Download a phone-Finder app

Most smartphones now have GPS tracking -- which you can use to locate a lost phone. Apple's Find My iPhone app has been free since the introduction of iOS 4.2. Android users should try Theft Aware.


Wednesday, 18 May 2016

Never forget the victim (and their device)!

Regardless if your case involves computers, tablets, iPhones, Android devices or all of the above, one thing the investigative community can agree on is, every case is different.  

Sure, certain cases will follow a workflow pattern, but the circumstances of every case, the suspects/targets, investigators and victims all take on different faces, which can alter your approach to conducting digital forensic analysis in the case slightly or dramatically.  We’ve all seen a surge in criminal (and civil) cases involving smart phones and other mobile devices and with that comes the mountain of evidence that is contained on a those powerful pocket computers that can store up to 128 GB of data (or more).

But consider this: You may only be getting half of the story if the only device you seize and analyze is that belonging to the target of your investigation.

The digital forensic experts at DLA encourage anyone who needs data, SMS, WhatsApp, password recovery, and so much more, to contact them today!  

  • Case Application 

The best case example we can use to illustrate this point is the investigation of a rape allegation.  Rape doesn’t happen in a bubble, it takes two people (or more) for a rape to occur.  And virtually everyone involved in these incidents owns & uses a smart phone on a daily basis.  Frequently, rape occurs when the alleged perpetrator knows the victim, either in some sort of early-stage relationship, a family friend, relative, etc.  Because experienced investigators know this to be true and many reports will validate this, it is your investigative responsibility to prove or disprove the claim.  In order to help do that, you need to seize not only the target’s phone data, but also the alleged victim’s phone data – all as soon as possible.

The best (and sometimes worst) thing about mobile device forensics is, once the data is extracted, it belongs to the digital forensic examiners. It is a digital snapshot of whatever was present on the device at the time the extraction took place and, depending on the device, may also give us access to deleted information.  So in the interest of conducting a thorough investigation, I put forth that when an alleged rape victim makes the report, investigators should make it a regular and common practice to ask for consent to perform a data extraction on his/her phone.  It is simply the easiest way to get a 360-degree view of the case.

  • A More Holistic View of the Data

Consider also what happens in the mind of the target after they know they may have committed a crime.  Text and chat messages are deleted.  Pictures of the alleged victim get erased from the device.  They may even dispose of the device altogether and replace it with a new, fresh phone that has virtually no useful evidence contained on it.  

Wouldn’t it be nice if the other side of those conversations still existed on another device?  What’s more, by grabbing the data from the alleged victim’s phone, you work toward a more complete investigation of the allegation.  It is an unfortunate reality that there are often false reports of serious crimes.  This certainly doesn’t mean that we automatically assume the victim may be lying, but it is our responsibility to fully investigate the case to determine what actually happened.  Victims and eye witnesses are notoriously unreliable for different reasons.  When victims are subjected to trauma, their accurate recollection of the incident can suffer to a degree, so that puts even more oneness on the investigator to try and piece the puzzle together.

The best part about the data is it doesn’t lie.  It has a perfect memory and it’s all documented, complete with date and time stamps, GPS coordinates, network activity and other great pieces of evidence that are very hard to spoof or fake, if not nearly impossible for most mobile device users. 



Never forget there is always more than one person involved in the investigation. Grabbing the alleged victim’s cell phone data in this circumstance could mean the difference between an innocent person being convicted of a serious crime or being exonerated fully.  When all the facts have been completely uncovered, the truth must remain and will have to hold up in a court of law. 

Wednesday, 11 May 2016

The Anatomy of a Mobile Attack

A mobile attack can involve the device layer, the network layer, the data centre, or a combination of these. Inherent platform vulnerabilities and social engineering continue to pose major opportunities for cyber thieves and thus significant challenges for those looking protect user data.


If you’ve been the victim of a mobile attack, don’t hesitate – contact the digital forensic experts at DLA and we can help you recover your precious cellular data quickly and effectively.

ATTACK SURFACE: DEVICE

Browser
- Phishing
- Framing
- Clickjacking
- Man-in-the-middle
- Buffer Overflow
- Data Caching

System
- No Passcode / Weak Passcode
- iOS Jailbreaking
- Android Rooting
- OS Data Caching
- Passwords & Data Accessible
- Carrier-Loaded Software
- No Encryption / Weak Encryption
- User-Initiated Code

Phone / SMS
- Baseband Attacks
- SMishing

Apps
- Sensitive Data Storage
- No Encryption / Weak Encryption
- Improper SSL Validation
- Config Manipulation
- Dynamic Runtime Injection
- Unintended Permissions
- Escalated Privileges

Malware

ATTACK SURFACE: NETWORK

- Wi-Fi (No Encryption / Weak Encryption)
- Rogue Access Point
- Packet Sniffing
- Man-In-The-Middle (MITM)
- Session Hijacking
- DNS Poisoning
- SSL Strip
- Fake SSL Certificate

ATTACK SURFACE: DATA CENTRE

Web Server
- Platform Vulnerabilities
- Server Misconfiguration
- Cross-site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Weak Input Validation
- Brute Force Attacks

Database
- SQL Injection
- Privilege Escalation
- Data Dumping
- OS Command Execution

Monday, 30 November 2015

What is Forensic Data Recovery?


Forensic data recovery is not magic; in fact it is actually very technical. People always wonder how the forensic experts can conjure up stuff from smartphones, tablets or hard drives that the owners thought were gone. So, how does forensics data recovery work?

Sometimes forensic data recovery is as simple as trying to reconstruct the information on a damaged hard drive, disc or memory card. At other times, it may include the resurrection of data that was thought to be lost or deleted, the bypassing of security systems or the study of a smartphone for traces of certain activity.

Because specialists in forensic data recovery may be working with computers which have been seeded with safety measures to prevent legal investigations, they must use special procedures to avoid compromising or erasing data.

Forensic data recovery is not magic at all. It is highly sophisticated and in order to be admissible in court, must be completed by professionals using complex tools and protocols.


DLA digital and cellular forensics can find the data that you need! DLA knows forensics inside and out, so if you need a professional when it comes to any forensic data recovery - Contact DLA now!  

Friday, 14 August 2015

What Is Data Recovery And How Does It Work?

We’ve all dealt with data loss, whether it was from a hard drive failure, data corruption or accidentally deleting a file. If you’ve ever experienced a major loss of data, you’ve probably wondered about data recovery — how does it work? How effective is it? How much does it cost?


Data Loss and Data Recovery

Data loss can take many forms — accidental deletion, hard drive failure, software bugs, data corruption, hacking, even a simple power failure can cause you to lose data. And, of course, there are more extreme cases, like when a hard drive is recovered from a plane crash; amazingly, some data recovery specialists can retrieve data from storage media that’s been almost completely destroyed.

If a piece of data used to be on your hard drive, USB stick or other storage media, you might be able to hire someone (or purchase some software) to perform data recovery. Data recovery is, simply, the salvaging and repair of data that has been lost.

DLA can recover your data quickly and easily, by combing the experience of two seasoned investigators with both criminal and civil backgrounds with the latest technologies to achieve the results that you require.

Of course, data recovery won’t always be possible; sometimes a system can be too corrupted or damaged to get much of the data back. However, data-recovery technology has become extremely advanced.

How Does Data Recovery Work?

The methods used to recover lost data depend on how the data was lost in the first place; let’s take a look at some of the most common forms here.

- File Deletion

- File Corruption

- File System Format or Damage

- Physical Drive Damage

- Solid State Drive Data Recovery


DLA can do a great job of getting your data back, but the best measure you can take to prevent long-term data loss is the one we’ve been advocating for a long time: make lots of backups!