CSS Cascade Menu by Css3Menu.com

CSS Cascade Menu by Css3Menu.com


Cyber Diligence investigators can obtain electronic data in a forensically-sound manner from computers, email and file servers, phones, backup tapes, archives and, if necessary, from the network wire, to perform analysis and/or identify smoking gun evidence to solve a case. Cyber Diligence Inc., owns and operates one of the most sophisticated and best equipped computer forensic labs in the world. Leveraging state-of-the-art technology with years of investigative experience and technical knowhow, we are able to offer a full range of “deep dive” computer forensics services to our clients at any level.  The Cyber Diligence lab is equipped with highly sophisticated computer forensic hardware and software that allow our investigators to handle any digital forensics assignment. Unfortunately, every single computer forensic software on the market has weaknesses that would make it ill-suited for certain types of analysis. Having been in the field [conducting thousands of forensic analysis] for twenty years, we have learned the weaknesses and shortcomings of all our tools. We always cross-validate our critical findings with a second tool in order to ensure the validity of our findings. We have seen the most reputable forensic software fail to display existing directories, for instance, or recover certain types of deleted content.  This is precisely why we utilize every major computer forensic tool in our lab.

Please refer to our ‘Resources’ section for a listing of some of the technology we employ at our lab.

Computer Forensics

The study of computer forensics examines the actions performed by and on a computer. Not only can this type of investigation reveal what was done on a computer, but also who was behind the keyboard. As investigators, we are often met with incredibly vast amounts of data, requiring effective methods of sorting by relevance, hashing values, performing keyword searches, and more. Advanced software is an indispensable tool for the purpose of extracting the most information accurately, and making sense of it all. Our team of specialists at Cyber Diligence can apply years of expertise in forensically-sound tactics to identify, preserve, recover, analyze, and present digital evidence. The level of examination we offer can provide insight into everything about a computer user from their personal preferences and daily habits, to just how much confidential information left the company with them during their departure.

Network Forensics

Network Forensics specializes in live data traveling over the network wire; this information is collected, preserved, and analyzed for relevant evidence. Many a time, certain types of computer crime, especially those involving theft of intellectual property or leakage of information, cannot be investigated without the use of network forensic tools and methodologies. Cases of this type generally involve insider abuse of IT resources, industrial espionage, theft of intellectual property, leaked information, and general malicious activity. It is nearly impossible to detect intrusions from APTs (Advanced Persistent Threats) without the use of network forensic collectors. Critical networks found in businesses, as well as other institutions, are at risk of being compromised due to their importance. Our network forensic collectors analyze network traffic to discover any unauthorized penetration of your system.

Mobile Forensics

Mobile Forensics is a division of digital forensics which pertains to recovering digital evidence or data from mobile devices, including mobile phones, tablets, GPS devices, PDA devices, etc. Mobile devices have become an essential part of our daily lives. These devices go everywhere we go, giving us the benefits of a handheld computer with ever-increasing capabilities.
During a mobile forensic investigation, forensic examiners will conduct a thorough examination of the data found on the cell phone's SIM/USIM, the cell phone body itself, and any optional memory cards. We can recover data from all types of mobile devices including smartphones, older cell phones, and tablets. Android, Apple, Windows, and Blackberry devices can all be handled by our forensic experts.