UPDATE

AS OF JANUARY 1, 2013 - POSTING ON THIS BLOG WILL NO LONGER BE 'DAILY'. SWITCHING TO 'OCCASIONAL' POSTING.

Friday, October 27, 2006

Computer Evidence Recovery - It Can Be Done!




(This is an advertisement however, I felt it useful to post it here to show cyberpaths, cheaters, and those hurt by them - that NOTHING you put online is lost EVER!! Don't assume it's gone just because you/they erased it! - Fighter)

People use computers for everything, many of which are very negative, including cheating you, hiding money, having an affair and just about every other thing you can imagine.

Frequently, these same people clean out the computer before they depart by deleting “everything” or “reformatting” the computer. The reality is THE EVIDENCE IS STILL THERE, waiting to be found. Often we can even prove what steps they took to try and destroy the evidence! The only question is do you want it or not.

Why would a Private Investigator be involved in this work? Simply put, the art of computer data recovery by private investigators came from more traditional assignments, like e-mail tracing, locating web site owners, identifying computers on the internet, etc. The handful of Private Investigators who focused in this area became more and more involved in recovering information from computers and they spent almost countless hours working in this area. We at A.S.G. are pleased to have access to the very specialized and talented private investigators who can get the evidence you need off of a computer that has been cleaned.

Forensic Data Recovery
Forensic Data Recovery is the science of recovering information from a computer that may have been deleted or otherwise damaged or hidden.

One of the key elements in every data forensics procedure is time. .Users may unintentionally or inadvertently overwrite evidence simply by continuing to complete their daily tasks. Our specialists will quickly and cost- effectively collect and preserve data or evidence that may have been deleted or become inaccessible through normal computing methods. Our specialists can determine if certain information exists and, if so, where it might be located.

When the data storage media is recovered either on location or at our lab facility, an accurate audit trail commences. The media is immediately logged into a tracking system and a log is produced. This log, suitable for all legal proceedings, accompanies the media throughout the recovery process. A.S.G. will then ensure the continuity of evidence by adding the investigator’s name, signature, date and a detailed description of what was done.

At this stage of the process, Federal Rules of Evidence apply. Our company’s expertise in magnetic media storage devices begins to play a crucial role. First - the media is replicated exactly through a bit-by-bit acquisition process, ensuring the integrity of the subject media is intact, and evidence preserved. Our specialists then work only with duplicate copies ensuring that no contamination of the original data takes place.

Our services include electronic discovery consultation; onsite seizure of the evidence; thorough processing of the evidence; interpretation of the results; reporting the results in an understandable manner; and court recognized expert testimony.In this preliminary examination, Advanced Surveillance Group provides the client a detailed report outlining file structures, media integrity, and the recoverability of deleted files. This report may be used to determine if the files present will be of assistance in the investigation. Our specialists will then make recommendations on how to proceed if further information needs to be retrieved. This report allows our clients to make an informed decision on the various options that may be available to them. The client’s needs augmented with our recommendations assure that the time spent on the analysis is focused at all times.

Here is a brief list of what is possible:
Recovery of deleted computer files

Data recovery even after a hard drive has been reformatted or repartitioned

In many cases encrypted files can be decrypted

Determination of web sites that have been visited

Determination of what files have been downloaded

Determination of when files were last accessed

Determination of when files were deleted

Discovery of attempts to conceal or destroy evidence

Discovery of attempts to fabricate evidence

Discovery of hidden text that was removed from the final printed version of a document

Discovery of faxes sent or received on a computer

Discovery of email messages and attachments even if previously deleted

Recovery of financial records and other documents

We Provide:
Analysis of Computers and Data in Criminal Investigations

Onsite Seizure of Computer Data in Criminal Investigations

Analysis of Computers and Data in Civil Litigation

Onsite seizure of Computer Data in Civil Litigation

Analysis of Company Computers to Determine Employee Activity

Assistance in Preparing Electronic Discovery Requests

Reporting in a Comprehensive and Readily Understandable Manner

Computer Forensics on Both PC and Mac Platforms

DATA RECOVERY
We are one of a mere handful of companies worldwide that specialize in the restoration and retrieval of computer data. Our specialists can recover data from virtually any medium including:

Desktop Computers
Laptop Computers
PDAs
Compact Disks
Floppy Disks
Zip Disks
Thumb Drives
Portable Storage Devices
All Manner of Digital Camera Storage Cards
Tape Backup
RAID Sets

from: http://www.cheatingspousepi.com

(NOTE: Don't ever assume because you deleted it or got it erased its gone! If you or the cyberpath posted it on a message board, dating site, database site, or so on - sometimes searching a site like - http://www.archive.org will retrieve it for you! Also, deleted files and files on reformatted drives can be recovered!! This site owner has seen it done. The computer world makes you think you are anonymous and invisible and anything can be erased & forgotten.... WRONG! - Fighter)

No comments: