We can recover electronic evidence during a computer forensic investigation from the following types of devices:
- Hard Drives
- Back-up Storage Media
- Email Servers
- Web Servers
- Internet Sites
- Personal Digital Devices (Blackberries and cellular telephones)
- Digital Cameras
- Zip Drives
- Virtually Any Electronic Storage Device
Our computer forensic investigations are conducted in a forensically sound manner, thus preserving the integrity associated with a particular piece of electronic evidence. As licensed private detectives, we are better qualified to find evidence than the average office IT specialist or other IT companies, because we already have the investigative knowledge, training, and mindset. We have a multitude of court-recognized software programs and tools to employ, along with our vast experience in both the technological aspects and generally accepted investigation practices. This combination is vital to preventing any corruption of the evidence. Make no mistake, one does not learn how to conduct this type of investigation and become a computer forensic expert in a classroom alone. Microsoft does not certify people to conduct this type of investigation. We are unique and if you end up encountering us in court, you may learn that the hard way.
When the data storage media is recovered either on location or at our lab facility, an accurate audit trail commences. The media is immediately logged into a tracking system and a log is produced. This log, suitable for all legal proceedings, accompanies the media throughout the recovery process. Computer Evidence Recovery, Inc. employees who handle the media ensure the continuity of evidence by adding their name, signature, date and a detailed description of what was done.
Computer Evidence Recovery’s Computer Forensic Investigations Experts specialize in conducting an exhaustive, detailed and accurate investigation of information derived from computers around the world for attorneys, businesses and individuals. In addition, you can be assured of our qualifications, since our chief agent is one of very few computer forensics specialists to hold the designation of EnCase Certified Examiner, as well as Advanced Microsoft Windows Forensics Specialist.