You have a sinking feeling in the pit of your stomach
Your spouse has become distant, he/she is working late on a regular basis or, maybe your spouse has moved out of the house with no explanation. You suspect marital infidelity but you don’t have any proof.
The legal process of divorce may also involve issues of alimony (spousal support), child custody, child support, distribution of property, and division of debt.
99% of the time, that ‘gut’ feeling turns out to be true. Now it’s time to protect your assets. Financial, Material and the most important, your children. Computer Forensics Investigations can obtain the data that you need to cover all of these areas. Our reports may include actual files, and will include the necessary hash values that will allow this data to be admissible in court. Often the metadata can be used to establish whereabouts, time/date information and communications between parties that can prove or dis-prove statements made in affidavits, court testimony etc. This is especially critical when attempting to establish relationships between people and the nature of those relationships.
Child Custody Cases can get very ugly. Take the ‘he said, she said’ out of the conversation by allowing Computer Forensics Resources to perform digital forensic analysis on all of the data sources involved in your case, including your child’s iPod, iPad, iPhone and other smart phones. Computer Forensics Resources can perform a forensic analysis on all of these data types and give you the forensic evidence you need to establish your case for litigation.
Computer Forensics Investigators use specialized software to identify and restore formatted, corrupted, deleted or hidden files from computers or other electronic media while maintaining crucial data trails, time & date stamps using accurate chain of custody & controls. They also obtain access to protected or encrypted data by using specialized software. They are able to untangle the web of data and analyze emails, Internet searches, file transfers, online account transactions and anything else a computer is used to do over the Internet.
Preserve Your Evidence
We will most certainly assist you in determining what devices could potentially contain evidence. Here is a list of the major data collectors.
- Servers
- Computers
- External Hard Drives
- Laptops
- iPads
- Cell Phone/Smart Phones
- USB Memory devices
- Cell Phone Tracking and Historical Data
- Cell phone tracking data can at times provide very powerful hard evidence. When the data points to a geographic area, this can be very compelling information.
- User History and Timeline Analysis
- Frequently in case that are of a domestic, civil, and/or criminal nature a timeline of user activity and timeline analysis can be critical. Who did what when on a computer or cell phone, and combined with other evidence to produce a sequence of user activity.
Now it is imperative to preserve the integrity of the evidence, prevent further manipulation, deleting or modifying of important evidence. A forensic image, will preserve the integrity of the evidence and prevent tampering, deleting or modifying of important evidence.
Please note!
There are protocols that every court requires for evidence. Please know that viewing evidence will change time and dates. This could result in the evidence being inadmissible in court. It is unadvisable for you or anyone other than a Digital Forensics Professional to view, save, copy or try to find evidence. Strict protocols and procedures must be followed in order to use the evidence in court. That’s why it is vital to hire a company like Computer Forensics Associates to perform the evidence collection and analysis.
Once the information is collected and analyzed you’ll receive a report of our findings so you can go over the information and evidence with your client or attorney and determine how to proceed.