IT Forensics

How does IT help forensic analysis in providing evidence?

In IT forensics, digital evidence is secured, read, evaluated and put into context with other information. Therefore, IT forensic analysis helps in evaluating digital traces. IT reports are usually commissioned by one of the following 4 parties: court, plaintiff, defendant or the investigating authority. The analysis of digital traces not only serves to understand the content, but also to clarify other aspects (e.g. authenticity, manipulated data, forgeries, false traces). However, there are also situations in which IT forensic experts are called in to resolve disputes out of court. The neutral expert can provide clarity here.

Only the right arguments and evidence win in court

Many companies have to deal with white-collar crime, defamation, defamation, balance sheet manipulation or false accusations. Economic and political disputes are also played out in courts every day.

Evidence from the plaintiff is quickly presented as evidence by the defendant or vice versa as fake or wrongly presented. In the many national and international cases, our IT forensics experts have convincingly supported the clients’ interests through forensic reports and statements.

Even in long-term criminal proceedings in Turkey and Canada, clients have been successfully freed from the unfair burden.

With our certified expertise, we support companies and authorities in securing evidence from cell phones, smartphones, tablets, computers and servers. The data stored in the device is extracted using the best possible method and made available to the client. An evaluation of the secured information and in-depth analysis can be carried out if necessary. For this purpose, defective mail files, databases, hard drives and flash-based data carriers can be read and the secured information can be provided in a readable form. A link analysis also allows several seized data carriers to be checked for connections that could possibly lead to backers or the hiding place of the “loot”. A cloud analysis can also be carried out from confiscated smartphones and MacBooks so that evidence from cloud services (e.g. Amazon cloud, Whatsup, Dropbox, Facebook, …) can be extracted and added to the evidence.

In some cases, cell phones and smartphones must be unlocked to secure evidence. The lab has equipment to unlock Android and iOS devices of different versions. Pattern locks and pin codes (length 1 … n) can be identified by the system. If unlocking is not possible, work can be done at chip level. Wires (thinner than human hair) are soldered to the chips and the function of the controller is simulated. Our equipment and expertise is used by the various LKAs in Germany. Our experts exchange knowledge across national borders with other specialists.

Despite these many possibilities, there is always a need to look at things from a data protection perspective. The “Leading Agents” are therefore trained in dealing with German data protection and are certified as data protection experts by TÜV Süd. The specialist knowledge of our team members is regularly expanded through internal and external training. In addition, our teams have various internationally recognized certifications that document the necessary knowledge during a special examination of documents and digital evidence. All incoming cases are treated by our laboratory staff with the best possible care and confidentiality. For each case, a contract is concluded in English or German so that all rights and obligations as well as the hourly rate are agreed.