Desktop / Laptop / Server Computer Forensics
We are proven forensic experts in the area of Computer Forensics which involves the 5 following key elements:
These steps will be applied to your evidentiary items as it relates to Hard Disk Drive as well as external media. Whether it be a desktop, laptop or server, we will analyze and extract relevant content beyond the capability of the tools and present it in a meaningful way.
Cloud / Email / Social Media Forensics
Where is your evidentiary data stored? With our busy lives we require access to our data and wish to communicate from several different locations (work / home / travel). Instant access to our information requires local access as well as cloud resources. At Touchstone, we are well versed in accessing and analyzing Cloud repositories. Whether it be email, online storage or popular social media sites, we have proven methodology to gain access and download these resources.
Open Source / Online Resources
Where is your evidentiary data stored? Often the examination of computers and mobile devices would include an assessment of available online accounts / sources that have been accessed by means of these devices, offering further avenues of evidence.
Are you aware of your target’s online footprint? A full open source gathering of information can be incorporated at the front end of the investigation to bolster reasonable and probable grounds (for warrants) that evidence will be found on the target’s devices. After all, if it is online, it got there using a computer or mobile device.
Most forensic tools that acquire and interpret data from mobile devices look for evidence in known locations. At Touchstone, our analysts have a proven track record of digging deeper and uncovering hidden gems of data often overlooked by the tools. Understanding where your data is and how to interpret it often produces valuable pieces of evidence. With access to state of the art equipment, we will take every effort to get the best representation of the data available.
Embedded Device Forensics
Embedded Forensics isn’t a new technology. We’ve been extracting and analyzing data from these devices from day one. Whether it be a credit / debit card skimming device, digital voice recorder or an answering machine, we have the proven methodology to extract, analyze and present this data in a meaningful way.
Today’s examples are more likely to be seen in interconnected devices. These are the devices we commonly interact and control with our mobile devices. This could be your vehicle, your Nest Thermostat, or even your coffee maker. Logs on the handset or device can provide geo location data without any GPS data being present. This evidence is often over looked and can easily be inculpatory or exculpatory. When the computer evidence can’t place the suspect in front of the computer, you need to look out of the box!
With a wealth of forensic and criminal investigative knowledge, as well as significant time testifying, members of Touchstone have the Knowledge, Skills and Ability to be your expert witnesses on the stand. Each member has been qualified at the Superior level of court numerous times and can deliver the information accurately and informatively every time.
Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, cyber bullying and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Touchstone brings together a wealth of knowledge with fresh eyes to analyze these issues.
With forensic data, it often makes sense to organize the data in a time chronology. By assembling the data from multiple exhibits and presenting it in one timeline, a more accurate and defining story evolves. However dates and times are not always presented in a human readable format. At Touchstone, we have the skills and ability to identify and decode many date structures often over looked to construct a more complete timeline.
We can assist investigations including, but not limited to: