Houston, TX (Vocus/PRWEB) March 16, 2011
McCann Global Investigations provides new resources on its websites, http://www.mccannglobal.com and http://www.computerforensicssolutions.com that outline the Computer Forensics Process from imaging through extraction through analysis. McCann Globals new resource pages ensure that clients have a clear understanding of the processes that are involved and their importance in maintaining the integrity of the data.
The Computer Forensics Process: Analysis
When the security of your company has been compromised, it is important to follow the correct procedure for building a case with sound forensic evidence. The right evidence gathered in the wrong way can ruin any chances of presenting the data in court, and since electronic data can be a crucial factor in any case you take up, using the proper procedure is essential. To gather this evidence, you need a specialist with knowledge of hardware architecture and software systems—as well as the legal process.
Experienced computer forensic technicians follow a set process to find and expose the digital fingerprints left behind in emails, Internet histories, files and networks. By having these professionals extract this information, you have evidence that can be used in a courtroom if any legal action needs to be taken. If you suspect that an employee is using private company information for their own personal gain, the first step is to contact a computer forensics expert.
In order for any evidence to be considered forensically sound, the information must be found and analyzed by an experienced professional outside of your company. Evidence can be considered contaminated if the imaging is done within the company. McCann Global Investigations technicians use techniques that abide by both state and federal regulations for civil and criminal cases.
After a technician acquires a forensically sound image of the device in question, the next step is analysis. McCann Global Investigations experts will determine what types of files—documents, images, etc.—can be recovered in the data. We gather information from email servers and their mailboxes, file servers, home directories and shared folders, as well as data pertaining to the type and location of data, electronic storage policies and back-up procedures. Aside from the content of the device, our specialists also extract metadata that identifies the file’s creator. This includes when it was modified and when it was sent.
After the images have been analyzed and the non-essential data discarded, the relevant information is uploaded into the Venio program, which is a very in-depth and forensically sound resource. The client, other counsel that may get involved and professional researchers can then use the same recovered data for analysis.
In addition to computers, our experts also analyze floppy disks, zip disk tapes, USB drives, flash cards and network servers that can contain information that is important to your case. McCann Global Investigations specialists not only retrieve hidden or encrypted data from networks, hard drives and electronic sources, but also document every point of discovery in the process. This information is then compiled into a clearly written report explaining what the data reveals.
If you choose to take legal action, our investigators can testify in court with this forensically sound data as accredited investigators with years of experience and knowledge of the legal process. A third party is essential to establish the validity of your investigation so that the data found is not considered contaminated.
Digital Investigations, Real Results
In a digital world, evidence isn’t as easy to spot as a smudged fingerprint or a smoking gun. McCann Global Investigations employs the most qualified and experienced investigative technicians in the field to find and analyze the electronic fingerprints your employees leave behind. Our local Houston-based investigators can quickly and discreetly undertake any inquiry into harmful activity at your company.
McCann Global Investigations can provide the services your company needs when your security is compromised:
Contact a McCann Investigator to learn more: