Digital forensics refers to the process of collecting, recovering, analyzing, and preserving digital devices for an investigative or evidentiary purpose. The field of digital forensics includes use of specific methods and tools, designed to preserve the original evidence and ensure that all changes are conducted in a controlled environment. Digital forensics encompasses analysis of a wide range of digital devices, beyond just computers and cell phones. Digital forensics includes computer and cell phone forensics, which could be described subcategories of digital forensics.
Then your suspicions are incorrect. We are finders of fact. Some text below from our Exam Tasking Clarity Affirmation document (which you will be asked to sign) is worth our offering for your review here;
Client understands, acknowledges, and fully accepts that the examination being funded during this engagement does not have the purpose of explaining phenomena, observations, or problems they have encountered with their cell phone or computer device. Regardless of any list of complaints, observations, or device behaviors, this engagement is in no way undertaken with the purpose of explaining those observations/behaviors. Client fully acknowledges those would be an engagement appropriate for a technology troubleshooting entity and not an element of the tasking related to this engagement.
The client understands, acknowledges, and fully accepts that their engagement with Prudential Associates is for the sole purpose of determining whether the device is compromised. The term ‘compromised’ pertains to being affected by the implementation of spyware, malware, remote access enabling processes, keylogging software, or other security-compromising method(s).
Given the above, the client understands and fully accepts that the resulting report/findings will answer the question of whether the device is compromised (assuming that a sufficiently thorough exam is funded) and will not address any client-generated list of complaints, observations, or abnormal behaviors relating to the examined device.
The client understands, acknowledges, and fully accepts that this document clarifying tasking and expectations is necessary to apprise the client that Prudential Associate not is going to, as part of this exam, explain or resolve computer-related problems/observations the client has experienced. The client affirms that he/she completely agrees to the above terms and has not been promised any other service or service outcome.
Computer forensics and mobile forensics require both a technical and investigative skill set. Every step in the forensic examination process is designed to preserve evidence and maximize recovery of data. Generally, during a computer or cell phone forensic exam, the examiner will first create a forensic image or extraction from the device.
The examiner will then process the forensic image with tools designed to carve and recover data from the forensic image, including items that have been deleted. The examiner will then conduct analysis based upon the search/tasking criteria provided by the client and will provide a detailed report outlining all items that have been recovered.
Frequently Asked Questions
Would you want the cheapest doctor, lawyer, or other professional you could find? If the answer is yes, then you should go ahead with the cheapest investigator. Otherwise, consider this: Almost one-third of our business is and has always been from clients who have gone to the cheapest first, found out why they were the cheapest, and then come to us to rescue their cases.
Unfortunately, at that point they are spending twice as much as they originally needed to. Logic dictates that, no matter the profession, a firm must charge an amount sufficient to employ the very best individuals in their industry, and that amount will necessarily be more than other firms to retain those highly skilled staff persons.
Yes, all of the time and quite effectively.
Yes. We can recommend attorneys with whom we have worked who specialize in your specific needs.