Digital Forensics and Cyber Security

Computer and Mobile Forensics

Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.

The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

Can you really erase all the information from your old smart phone? Before you upgrade to a new device, be careful what you do with the old one. Even if you think you’ve erased it, it could still come back to haunt you.

computer forensics Kenya

Computer/Disk Drive Forensics

The analysis of computer hard drives (workstations, servers, laptops etc.). We look for everything from ex-filtration of company data and intellectual property, to child pornography. East Africa Recovery Experts also has an excellent track record when it comes to retrieving data that is deleted or otherwise destroyed by a user.

Email and Social Media Forensics

Tracking email and/or authenticating that messages are not tampered with or forged, recovering deleted messages from servers , laptops, desktops, etc.

Cell/Smartphone/Tablet Forensics
We offer the forensic analysis of smartphones, tablets and other portable devices, retrieval of deleted text messages, call logs, documents, mobile browser history, etc.

Database Forensics and eDiscovery
Examination and recovery of data from mainframe and networked database systems.

Digital Device Forensics
Retrieval of data from GPS units, phone system, car computer systems, game consoles, iPods, MP3 players, USB sticks and flash drives, SD cards, etc.

Computer Forensic Readiness Assessments
Complete assessment of your organization’s state of forensic readiness, procedural planning and improvement recommendations.

Computer forensics is often necessary to understand what events recently transpired on a computer. Sometimes computer users will attempt to hide or conceal illicit use of their computer while working on company time.
Free Diagnosis

WHY DIGITAL FORENSICS IS IMPORTANT

Computer forensics differs from data recovery, which is, recovery of data after an event affecting the physical data, such as a hard drive crash. Computer forensics goes much further. Computer forensics is a complete computer examination with intricate analysis of digital information being the ultimate goal.

It is well known, and consistently proven, that computer or digital evidence is often the “smoking gun” in many high profile cases. Today, in businesses of all sizes, the majority of new information is being created and stored in digital form on computer systems and devices of all sizes.

It is indisputable that digital evidence, be it documents, databases or the omnipresent email, should always be considered a primary source of evidence. While malpractice is a harsh word, it certainly is not in any client’s best interest to ignore potentially relevant sources of evidence, especially digital evidence

NB: As an attorney in some countries, you may be liable for malpractice if I don’t consider digital evidence.

Famous Cases Involving Digital Forensics

2008 Brad Cooper

Brad Cooper was arrested for the murder of his wife Nancy Cooper. At Cooper’s murder trial, Det. Jim Young described how he had attempted to access text messages on the phone but instead wiped the phone’s memory by repeatedly entering incorrect SIM lock codes and PUK codes. The defense team argued that an “inept” police investigation ignored and destroyed important evidence that would have shown Cooper’s innocence.

2009 James M. Cameron

On February 17, 2009, James M. Cameron was indicated on 16 charges of trafficking in child pornography. Prosecutors alleged that between July 2006 and January 2008 Cameron had uploaded child pornography to a Yahoo photo album using five different aliases. According to an order by a federal judge dated Sept. 28, 2009, “”It begins with two referrals from the (National Center for Missing and Exploited Children) to the Maine State Police on August 3, 2007, and September 6, 2007, which itself had been triggered by a report from the Internet Service Provider Yahoo. Yahoo reported locating numerous images of child pornography in the photos section of a Yahoo! account.

2005 Dennis Rader — The “BTK” Serial Killer

After eluding police for more than 30 years, a serial killer in Kansas re-emerged, took another victim, and then sent police a floppy disk with a letter on it. On the disk forensic investigators found a deleted Microsoft Word file. Inside that file’s metadata was metadata containing the name “Dennis” as the last person to modify the deleted file and a link to the Lutheran Church, where Rader was a Deacon. (Ironically, Rader had sent a floppy disk to the police because he had been previously told, by the police themselves, that letters on floppy disks could not be traced.)

One comment

  1. Lillian says:

    Am Lilian my daughter Tracy at her 3rd year is doing Bsc Computer security and Fornsics in Kabarak university. She is scheduled to do her 3month attachment starting may 2018.Am enquiring if you people do offer attachment to continuing students and if so what is the procedure. Thanking you in advance. Regards Lillian

Leave a Reply

Scroll to top
shares