Here, you’ll find some of the most common Computer Forensics frequently asked questions we receive about our law firm and our services. To read more about a particular service area, see the Frequently Asked Question.
Computer Forensics FAQs
Yes, we apply deeper forensics when someone needs to recover deleted data, whether it was done intentionally or inadvertently. When someone deletes, for example, a text message, it will remain recoverable on their phone until it is overwritten. How quickly it is overwritten is often a function of: how much free space exists; how much new data is being added; and how much time has passed.
Typically, the best source of email evidence is the email server. While emails may be found in multiple locations such as on a phone, tablet, or computer, those locations tend to hold fewer emails than the server. For example, many phone users have their emails synced for only 30 days, and maybe only six months on their computer. Whereas the email server may have three years or more worth of email. Therefore, frequently the email server is the preferred source of evidence.
Computer forensics is the examination and analysis of computers and other digital media to collect, preserve, and produce evidence. It is widely used in both criminal and civil procedures.
A computer forensic investigator has special training and uses a wide variety of tools depending on the type of computer, phone, or account that they are examining. The forensic analysis varies and may involve basic information retrieval (including deleted data recovery) or a deeper analysis to reconstruct events.
We forensically collect smartphone, tablet, and computer evidence wherever FedEx and UPS deliver by sending you our remote collection unit, Black Box. Once the unit arrives at your doorstep, you just give us a call. At that time, we will give you the combination to unlock the black box. Next, you will plug in the power, and your phone or computer. Then, we do the rest.