Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. We use specialized tools and techniques to recover data or investigate various forms of computer-oriented crime including fraud, illicit use such as child pornography, and outside computer intrusions. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.
Cellular technology is what mobile phone networks are based on, and it’s the technology that gave mobile phones the name “cell phones”. Cellular technology basically refers to having many small interconnected transmitters as opposed to one big one. Think: LTE, 2G, 4G, wi-fi calling. Our mobile phones talk to towers and leave a record of where they have been ...ish. Cellular geolocation data stored on personal devices is less precise than by GPS, but has been used as a tool to prosecute on wobbly analysis. Having an expert to rebut the government's presentation of this data can be the difference between winning and losing. Cell tower data analysis is the service that is most utilized by criminal defense attorneys.
Cloud forensics is the application of digital forensic science in cloud computing environments. Technically, it consists of a hybrid forensic approach (e.g., remote, virtual, network, live) towards the generation of digital evidence. With the rapid growth of global cloud adoption in private and public sectors, cloud computing environments is becoming a new battlefield for cyber crime. Businesses often rely on cloud storage to store and protect their documents and data. Many individuals have cloud storage and are completely naive of its contents or capabilities.
Social media forensics involves the application of cyber investigation and digital analysis techniques for: Collecting information from social networking platforms such as Facebook, Twitter, Snapchat, Instagram, etc. ... analyzing, and preserving the information for your case. They may think they've deleted it.... but have they?
Unlike other forms of forensic evidence, audio and video recordings can provide a real-time, eyewitness account of a crime so lawyers and investigators can watch or hear what transpired. For instance, a surveillance video captures a bank robbery in progress, or a hidden camera records an undercover sting operation. Sources of recorded audio and video can be found in businesses, at traffic intersections, parking lots, bank machines, on police-vehicle dashboards and of course, in cell phones. For large-scale events or crimes, the sheer amount of recorded audio and video evidence can be massive. For most crimes, however, high-quality audio and/or video recordings are often not available. This is where forensic audio and video expertise can help. We have techniques to enhance recordings that can bring out details and provide a clearer picture of what occurred, or make an audio recording more audible. To assist in an investigation, we may be able to repair, recover, enhance and analyze audio and video recordings using an array of tools and techniques.