Digital Device Forensics
Vehicle Event Data Recorder and Navigation
Vehicle navigation systems store recent locations and even GPS fixes for later use or as cached data. Often this data can be extracted from a vehicle’s navigation system and used to reconstruct where a vehical was at a given time. Valuable information for sure.
While most vehicles do not have a true Event Data Recorder (EDR), almost all have Electronic Control Units (ECUs) to monitor events, such as airbag deployment, braking and differential slip, among other events. While this device is used by vehicles to monitor and control systems, the data it saves maybe used to reconstruct a vehicle’s operation at the time of a crash or pursuit.
Chip-Off Forensics, JTAG Access and Custom Boards
Chip-off Forensics involves the removal of storage chips from the board within devices and is used when access to storage cannot be accomplished through a connector, or if the device is too damaged to access through conventional means.
GDF has the experts and facilities to extract data directly from many types of memory chips. Our facilities have X-Rays, de-balling equipment, development boards, and more, for the forensic analysis of chips from many types of devices.
Voicemail Systems, VoIP Logs and Fax Servers
Office systems such as copiers, printers and voicemail can contain a wealth of information. VoIP (Voice over Internet Protocol) and PBX use some form of storage for voicemail. Many systems leave messages undeleted when a user’s mailbox is disabled, and even deleted voicemail messages may be retrieved from these systems.
Copiers and copy/fax/scan systems, or All-in-Ones (AIOs), have disk drives that contain images of documents scanned and copied, sometimes for years. The digital evidence these systems can hold may be valuable keys to a case or even the “smoking gun.”
At Global Digital Forensics, our years of experience in computer forensics, and technology in general, have fostered the development of techniques and proprietary software that allows our forensics analysts to probe for and recover data that other commercial companies would consider unrecoverable. When it comes to finding and recovering data from any device, whether the information was intentionally destroyed, or the device was damaged, remember, when others say it is a hopeless cause, you need the computer forensics experts at GDF involved.
We have advanced facilities in Tampa, New York, San Francisco, Los Angeles and 16 other cities in the US, as well as truly global presence in Europe, Asia and South America. So when you need to recover data and all seems hopeless, call GDF – We have your back.
Evidence Exists Beyond The Computer
- Mobile Devices such as mobile phones, smartphones, iPads, Blackberrys and tablets can contain vast amounts of important data.
- Webmail, Social Networking and File Transfer Sites, like Dropbox and YouSendIt, are often used to transport large amounts of data and can hold key evidence.
- GPS Devices in automobiles, mobile phones and fleet management systems can hold clues to where a person or vehicle has been. So much for that alibi.
- Network Attached Storage (NAS) devices are designed to simply be huge data repositories, it goes without saying that the haul could be tremendous from an evidentiary standpoint.
- Cloud storage and cloud applications are also becoming increasingly popular, with services like SkyDrive and iCloud already allowing users to store gigabytes or of data on the Internet.
- Databases, whether small business accounting packages like QuickBooks, or massive Enterprise Resource Planning (ERP) applications like SAP or Oracle Financials, a tremendous wealth of information may be found.
- Hosted Applications or SAS (Software as a Service) Applications come in a multitude of flavors and systems like Salesforce.com, QuickBooks Online, Microsoft Office 360, Zoho, or Via can hold the needle in the haystack that makes your case.