Digitial Forensic Investigation
Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer or cyber crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data.
Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil courts.
Criminal cases involve the alleged breaking of laws that are defined by legislation and that are enforced by the police and prosecuted by the state, such as murder, theft and assault against the person. Civil cases on the other hand deal with protecting the rights and property of individuals (often associated with family disputes) but may also be concerned with contractual disputes between commercial entities where a form of digital forensics referred to as electronic discovery (ediscovery) may be involved.
Digitpol’s team has a combined 35 years of expertise in Digital Forensics & Security. Our team has advanced skills in Data Recovery such as Computer Forensics, Mobile Phone Forensics, eDiscovery, Internet Monitoring, penetration testing, IR Team and Red teams. Digitpol, a Dutch based IT and Cybersecurity company headquartered in The Netherlands provides extensive expertise in Digital Forensics, Cyber Security and Cyber Crime, such experience is gained by global investigation on real-life cyber attacks.
We conduct research for OEMs and government agencies. Digitpol’s offices are equipped with state of the art forensic technology and workshops for research. Our partners have offices in major cities across the world, enabling us to offer our services globally.
Mobile Phone Forensic Investigation
Digitpol utilizes global leading technology, Cellebrite Technology, Cellebrite’s forensic expert technology allows us to carry out forensic acquisition of data from the supported listed devices.
What Data is Recoverable ?
- SMS | IM Chat | WhatsApp | Viber | Skype | Wechat | IRC | Deleted
- Call history | Incoming | Outgoing | Missed | Deleted
- EMAILs | Incoming | Outgoing | Drafts | Deleted
- GPS locations | Waypoints | GEO tagging of pictures
- Photos | Sent | Received | Deleted
- Social Network logs | Activity Time | GEO Login | Deleted
- Internet History | History | Entered Keywords | Searches | Deleted | Cookies
- Wifi Data | SSID | MAC | I.P
- Bluetooth | Paired devices | Timestamp
Forensic Examination of Computers
Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.
Digitpol’s computer forensics experts investigate, analyse and recover forensic data from computers, portable devices and hard disk drives. We ensure that no digital evidence is overlooked and assist at any stage of an investigation, regardless of the size or location of data sources. Claims of leaks, fraud, cyber espionage, financial tampering, computer crime, employee misconduct, and other illegal or wrongdoing actions require corporations, law firms, and government agencies to deploy digital forensic methods to piece together facts that lead to the truth.
Digitpol's Email Fraud Investigation Team are certified digital forensic experts and fraud examiners and can assist to all cases related to Email Scams and Fraud. Digitpol can examine emails in PST format or any raw email format to determine the senders IP address, email server used and metadata to investigate and undercover fraud.
Email fraud investigation is the collection and forensic investigation of evidence into email hacking, phishing attacks, tracing and recovery of stolen funds. Email Fraud is the intentional deception made for personal gain or to damage another individual through email. Almost as soon as email became widely used, it began to be used as a means to defraud people. Email fraud can take the form of a "con game" or scam. Investigating email fraud reaches to all aspect of cyber crime from recovery of funds transferred to a fraudsters bank account to a forensic examination to determine how fraudsters hacked into email accounts.
Email fraud, scams, phishing attacks happens in most cases when cyber criminals find ways to hack into the email servers or accounts of small and medium companies, often targeting those with business in Asia countries. Cyber criminals gain access to email accounts and search through email accounts looking for sensitive information such as outstanding, unpaid invoices or data relating to financial transactions and business between supplier, vendor and clients. When cyber criminals identify a sale or a due invoice, the fraudsters then send various fictitious emails from the hacked email account or an email address replicated to the original purporting to be in charge of the sale or due invoice to be paid, the fraudster is then asking for transfers of funds into a nominated bank account, usually giving an excuse that there is a problem at the bank and an alternative account needs to be used. It is common that the nominated account is in the same name as the company name or with a very slight change such as an extra letter. It is common the bank account to be in the same city as the victim or client.
Email Fraud Investigation
Digitpol's Cyber and Fraud Team are certified fraud and forensic examiners and can deploy to assist with all cases related to email fraud, email spear phishing attacks, email scams and on-line related fraud. Digitpol can deploy forensic examiners to investigate hacking, determine how it took place and report the findings, Digitpol ensures that hackers are not active in your network and ensure your user accounts policies and rules are configured correctly to prevent further attacks.
Data theft and leak investigation
Digitpol’s data breach and leak investigation services, range from identifying the source of the leak, the digital tracing of the problem, forensic investigation and detailed reporting. We can help you protect your brand and re-build trust with the individuals impacted by a breach or data leak. If you suspect that your company’s data has been breached or compromised, you immediately face several time-sensitive and highly technical questions from enforcement bodies and the individuals impacted by a breach or data leak. Digitpol’s digital investigators, digital forensics teams and legal experts can help companies collect evidence to fully understand the scale and the impact of a breach. The evidence discovered can help you protect your business and prevent further breaches.
Digitpol's expert forensic technology to carry out forensic acquisition of data from the supported drones.
- Serial number of the drone aircraft and some internal components such as MAC, IMEI, & IMSI
- Version numbers for firmware
- Metadata from operations such as launching, waypoint logs, GPS available or unavailable during flight.
- Geo location information for critical locations – launching, landing, and home or return location
- Full flight path information
- Wifi Data | SSID | MAC | I.P
- Bluetooth | Paired devices | Timestamp
Digitpol Cyber Crime Team specialise in wireless network analysis, we offer RF site surveying, WiFi network scan and analysis, Secured wireless network installation and Wi-Fi security services for private and public Wi-Fi networks.
Digitpol developed a probe named “Wi-Fi Signal Analysis” to detect Wi-Fi snooping, payload injection, rogue devices and Wi-Fi Spying in seconds, the probe operates on-location and the data is sent to an AI based database for analysis which then alerts CSO and CIO’s. The probe has prevented thousands of hacking attempts on companies networks and prevented spying on devices installed on networks. We perform Surveys to record all Wi-Fi networks on the 2.4GHz and 5GHz spectrum to determine what devices are on your network and if any rogue devices are present.
Digitpol’s Wi-Fi experts are certain Wi-Fi and IOT over-the-air attacks will rise in 2020, Digitpol’s team are conducting Wi-Fi audits for business across Europe, the probe audits details such as the number of connected devices on a network, Wi-Fi traffic, approved Wi-Fi devices, security flaws, unauthorised devices and instant upgrades. The audits have so far discovered out-of-date firmware allowing remote control, hijacked routers, modified firmware, many connected un-authorised devices and active interception. The probe can be deployed as a fixed install to sites to detect Wi-Fi interference within 900ms.
WiFi Network Monitoring
Are you concerned about information loss or business secrets being targeted over WiFi? A small amount of information could be worth millions to the right people or could damage important negotiations. Loss of confidential information such as theft of data, hacking incidents, leaks and executive schedules could even put lives in danger.
WiFi networks are a common focus point for hackers. To ensure all is in order, our forensic team will conduct a forensic audit on your Wi-Fi network to detect any rogue or unauthorised devices. We will detect all connected devices on your network or Wi-Fi, Detection and Intrusion, Malware or unauthorised devices monitoring data traffic. Detection of infected PC's, phones, tablets and digital devices.
Digitpol’s computer forensics experts investigate, analyse and recover forensic data from computers, portable devices and hard disk drives.
We specialize in recovery of data from mobile phones and portable devices. We recover SMS, Calls, Emails, Media, VoIP data, GPS, Internet History, Whatsapp, Viber, Signal, Telegram, Deleted Data, Cloud Sources and all Cell ID Data.
Cloud data sources represent a virtual goldmine of potential evidence for forensic investigators. Together with mobile device data, they often capture the details and critical connections investigators need to solve crimes. Digitpol can access cloud sources and recover data contained in cloud services.