Showing posts with label digital forensic investigators. Show all posts
Showing posts with label digital forensic investigators. Show all posts

Wednesday, 2 August 2017

Recovering your Data Quickly and Easily

People use their computers for almost everything; many of these things can be used against you. Hiding money, illegal activities, inappropriate emails and just about anything you can think of.

Image result for forensics

Often, if you are trying to hide something, you’ll make an effort to completely clean out your computer by deleting “everything” and reformatting. The problem is, when you contact some IT support companies and you are told that all is lost, they probably have no idea what a digital forensic investigator can do!

The harsh truth is that the evidence is still there, waiting to be found, you just can’t see it. The only question is, do you want it recovered or not.

Many businesses that have a disgruntled employee, or feel that an employee is involved in unacceptable activities at work, may want to acquire some digital evidence, they can use a digital forensic investigator to recover all the evidence that they need.

At the TCG Forensic Division we can supply you with cellular, hard disk drive forensics and digital suspect profiling.

Need something recovered? Don’t hesitate to contact us today to discuss your requirements - call 079 691 0138 or email craig@tcgforensics.co.za

Wednesday, 20 July 2016

What Exactly is Computer Forensics?

The field of computer forensics has grown to become a science in itself. Computer forensics is also known as cyber forensics. It involves applying computer investigation and analysis techniques to solve a crime and provide evidence to support a case. Investigators often use proprietary forensic applications and software programs to examine computer hard drives, extract certain types of data from files and folders, and also to recover information from encrypted files. This digital information must be organized and documented into an official report form to be presented in a court of law.

Computer Forensics Defined

The computer forensics definition can be broken down into several technical aspects of the actual science of computer forensics. The general definition of computer forensics is the processes and investigative methods used to find digital evidence and prepare it for legal proceedings. The more in-depth definition includes the preservation of media and data, identification of computer-related evidence, extraction of the data and interpretation. Interpretation is perhaps the most important element of the computer forensics definition because this is where forensics experts must draw conclusions from a formal forensic analysis.

Throughout the process of data gathering and interpretation, the computer forensics specialist must document everything in a structured fashion. They must report exactly what types of investigations were performed and document all of the steps taken to retrieve various files, folders and data. The courts can then apply various types of methodology and testimonies in order to determine whether evidence presented can actually be used in the legal proceedings. This is why computer forensics specialists must learn about the different legal processes involved in an investigation and make sure that there is always a high level of integrity of evidence.

Why the Computer Forensics Definition Can Change

It's important to recognize that there are two main types of computer forensics investigations so the computer forensics definition can change. The first involves investigations where a computer or digital technologies were used to perform the crime (cybercrime). The second is when a computer is used as the target of a crime, such as when a hacker retrieves sensitive information or someone has their identity stolen online. In both of these situations, the computer forensics definition may change slightly because the investigator uses different techniques and methodologies to solve the crime.



The digital forensic experts from DLA use their knowledge of investigation and forensic software to find and reveal the computer or mobile forensic evidence that your require.

Wednesday, 22 June 2016

How Computer Forensics Works - Phases of a Computer Forensics Investigation

The experts at DLA listed the following steps every digital forensic investigators should follow to retrieve digital evidence:


1. Secure the computer system to ensure that the equipment and data are safe. This means the detectives must make sure that no unauthorized individual can access the computers or storage devices involved in the search. If the computer system connects to the Internet, detectives must sever the connection.

2. Find every file on the computer system, including files that are encrypted, protected by passwords, hidden or deleted, but not yet overwritten. Investigators should make a copy of all the files on the system. This includes files on the computer's hard drive or in other storage devices. Since accessing a file can alter it, it's important that investigators only work from copies of files while searching for evidence. The original system should remain preserved and intact.

3. Recover as much deleted information as possible using applications that can detect and retrieve deleted data.

4. Reveal the contents of all hidden files with programs designed to detect the presence of hidden data.

5. Decrypt and access protected files.

6. Analyse special areas of the computer's disks, including parts that are normally inaccessible. (In computer terms, unused space on a computer's drive is called unallocated space. That space could contain files or parts of files that are relevant to the case.)

7. Document every step of the procedure. It's important for detectives to provide proof that their investigations preserved all the information on the computer system without changing or damaging it. Years can pass between an investigation and a trial, and without proper documentation, evidence may not be admissible.

8. Be prepared to testify in court as an expert witness in computer forensics. Even when an investigation is complete, the detectives' job may not be done.

All of these steps are important, but the first step is critical. If investigators can't prove that they secured the computer system, the evidence they find may not be admissible. It's also a big job. In the early days of computing, the system might have included a PC and a few floppy disks. Today, it could include multiple computers, disks, thumb drives, external drives, peripherals and Web servers.

Wednesday, 16 March 2016

3 important reasons why you need a digital forensic examiner

I bet you haven’t seen the top 3 reasons you need to hire a digital forensic investigator!  Not to be outdone, we’ll try to keep it to only five:

1)  Data is everywhere

Think about all the digital devices you own and use.  Chances are, you probably use your handheld portable device in the morning, transition to laptop/desktop computer during work hours, then go back to mobile with heavy use of tablets during the evening hours (probably because you and your partner don’t want to watch the same TV shows).

So the bottom line is, virtually everything you do during the day will involve a digital device on some level and leave a digital footprint.  That data is stored on those devices and if you’re involved in some sort of dispute, accident, encounter, etc. that may lead to legal action down the road, you’re going to want a trained digital forensic expert to acquire, analyse and report that data for you. 

2)  Data breaches affect everyone

In the past year or so, there have been dozens of high-profile data breaches occur in the private commercial and government sectors.  For everyday consumers like us, it means that our personal information could be shared with unsavoury types, so whether you’re hiring a digital forensic examiner yourself or your bank is hiring one to help find out what happened and by whom, it does affect you.

3)  Chances are, you’ll be involved in litigation at some point

Not all legal matters are contested, but when they are, you want the data to show the truth.  And if you believe #1 (data is everywhere), the likelihood that you will not only be involved in some sort of contested litigation, but that the litigation will likely involve retrieving & reporting data that is critical to your case in a verifiable, forensically sound manner is very real.  From divorces to child custody to distracted driving personal injury to criminal cases, the universal nature of the devices we carry and the data they store cannot be denied.


So there’s the list.  If nothing else, we hope this serves to educate just some of the reasons why you may need a digital forensic examiner on speed-dial.  Is a digital forensic examiner someone you need every day?  No.  But much like your car mechanic, your exterminator and your lawyer, you sure want to know how to contact a good one when the time comes! Contact DLA Digital Forensics today – we can’t wait to be of service to you.

Wednesday, 9 September 2015

Recover computer evidence quickly and easily!

People use their computers for almost everything; many of these things can be used against you. Hiding money, illegal activities, inappropriate emails and just about anything you can think of.

Often, if you are trying to hide something, you’ll make an effort to completely clean out your computer by deleting “everything” and reformatting. The problem is, when you contact IT support and you are told that all is lost, they probably have no idea what a digital forensic investigator can do!

The harsh truth is that the evidence is still there, waiting to be found, you just can’t see it. The only question is, do you want it recovered or not.


Many businesses that have a disgruntled employee, or feel that an employee is involved in unacceptable activities at work, may want to acquire some digital evidence, they can use a digital forensic investigator to recover all the evidence that they need.

We at DLA are pleased to provide all the evidence that you need off of a computer, cellular device, laptop or tablet. The obvious advantage that we have here at DLA is that we recover digital evidence that few others could and keep all affairs private.

Need something recovered? Don’t hesitate to give DLA a call.

Thursday, 27 August 2015

How to become a Digital Forensic Expert

As technology advances, those in the criminal justice and criminology fields have to learn to change with it. More people conduct business online, and more occupations require at least some use of a computer or cellular phone.

To combat and investigate crimes involving computers and mobile phones, new career opportunities for digital forensic experts have sprung up.

What do digital forensic experts do? Well, as the name implies, they reconstruct and analyze digital information to aid in investigations and solve computer-related crimes. They can look into incidents of hacking, recover chat history and even recover lost or stolen data.

Some of the services of a digital forensic expert often include:

- Recovering data from damaged or erased hard drives

- Gathering and maintaining evidence

- Working with cellular devices, computers and other electronic equipment

-  Digital image enhancement

- Recovering SMS or chat history

Private companies and government organisations may employ digital forensic investigators full time, or they may contract for their services. Investigators will likely be involved in looking for violations of company policies regarding computer use as much as they will be involved in crime solving.

What are the education and skill requirements for a digital forensic investigator? Well, of course you will need a wide variety of knowledge regarding the investigative process, the law of evidence, computer operating systems, mobile devices and different types of hardware and software.

In addition to computer skills and related education and certifications, digital forensic investigators and digital forensic experts must also possess strong analytical and investigative skills. They need to be able to read and interpret data and to formulate conclusions, and they must be able to present their findings and conclusions in a format that can be easily understood.



A digital forensic expert’s job is both stimulating and rewarding. It allows you to put your unique skills and knowledge to work in a field that is truly helpful to others. 

Friday, 21 August 2015

Computer Forensics vs. Cellular Forensics

Although these two may seem very similar, computer forensics and cellular forensics are different in many ways.

Any type of criminal case may use computer and cellular forensics as evidence, including drug dealing cases, theft of intellectual property or trade secrets, murder cases and even less serious cases like a disgruntled employee.

While a computer is indeed a storage unit for data, cell phones differ by make and model and what type of data they contain, how it is stored, deleted data or how GPS is monitored.

When you contact a digital forensics investigator, make sure you are prepared with all the information…

- Make and model of the computer or cell phone

- The owner or account holder

- Whether or not the device is password protected

- Whether or not you know the password

It is also essential to explain exactly what information you would like to collect or what you suspect has happening and how the data will be used.

So, do you need a computer or cellular forensics investigator?

Unfortunately, as more people are affected by cybercrime and technology plays a bigger role in criminal and civil matters, you may need one of the following investigators:

- Computer forensics investigator
A computer forensics investigator will recover data from a computer. If you need evidence of activity on your computer, a qualified computer forensics investigator can get you all the proof you need. These investigators even have the ability to find hidden or deleted data and emails.

- Cellular forensics investigator
Depending on the make and model of a cell phone, a cellular forensics investigator will recover data, passwords, chat history, SMSs, photographs, GPS and other information from a cell phone. They even have the ability to access deleted or hidden information from a device.


Would you like the help of experienced investigators? Contact DLA today and they will use the latest technologies to achieve the digital evidence that you need!

Thursday, 20 August 2015

How digital forensic investigators use social networking for evidence

Social media is much more than it may seem. It’s not just “likes” and posting photos and sharing statuses. Important evidence and even corporate business records have become integrated into social media sites such as Twitter, Facebook and LinkedIn.

Most of the time, the content investigators are looking for on these social media sites are in relation to:

- Conducting a background check or making an accusation against a witness

- Determining a corporate position on an issue, fact or circumstance

- Proving whether a person was cyber-bullied or threatened

- Establishing whether someone associated with another person of interest

- Evidencing intent, weakness or motive

- Challenging an individual’s physical location alibi

However, over the years people have argued about whether using social networking site content violates their rights, whether the site itself infringes the privacy of its users or even whether illegal activity occurs with actual knowledge of it happening.


In light of this, make sure the evidence is preserved and acquired properly is critical, which can be hard given its dynamic and multi-format nature. To properly collect and authenticate social networking content, the correct tools and programs need to be used at all times. Significant digital forensics skills are needed to analyze the preserved data to answer questions like:

- Who posted the offending content?

- Can the offending content even be attributed by convincing evidence to a real, live person?

- When was the offending content posted on the social media site?

- How much of it exists across the entire social networking platform?

- What other related evidence is there?

- How accurate is the reported physical location


We use social networking constantly; it is basically a part of our everyday lives. So, because people choose to broadcast their personal lives to the public, digital forensic investigators can use it to get current and accurate evidence.

DLA can provide you with a wide variety of services, from data and WhatsApp history recovery to digital suspect profiling and image verification.