Computer Hard Drive Forensics
NJL uses industry-leading software, FTK® Forensic Toolkit, to collect data from computers and hard drives. FTK is an award-winning, court-cited digital investigations solution. It quickly locates evidence and forensically collects and analyzes any digital device or system producing, transmitting, or storing data by using a single application from multiple devices.
Our Forensic Extraction Process
We must make a forensic copy of the targeted device.
After the target device is copied, we process and collect the data from the copied device. This process includes indexing the entire drive and organizing all of the computer files into an FTK® case database.
The third step of extracting data is searching for the targeted files. FTK® will locate the files and export them in their native format, preserving metadata and file info.
After the device is copied, processed, collected and searched, the final step is to export a customized report or spreadsheet.
Cell Phone Forensics
Forensically extracting data from a cell phone or smartphone is not as easy as you’d think. There are hundreds of makes on the market, some old and some new. Keeping up with the ever-changing technology and encryption on mobile phones is nearly impossible.
NJL depends on Cellebrite, the industry standard for lawfully collecting digital data. Cellebrite is an Israeli digital intelligence company that provides tools for federal, state, and local law enforcement as well as enterprise companies and service providers to collect, review, analyze and manage digital data.
Why Use a Third-Party for Your Collections?
When NJL collects digital files and evidence from computer hard drives and smartphones, we document our entire process. A sound collection process includes a chain-of-custody form, taking pictures of the evidence, documenting model and serial numbers, using write blockers and forensic duplication devices to make copies of the devices, creating hash values (digital fingerprints), and forensic reports that target specific metadata, data and evidence.
How can opposing counsel be sure that your IT department collected the files properly? Using a reputable, third-party company to collect your digital files makes it harder for opposing counsel to dispute claims of a partial or altered collection.
View NJL Facility
Contact NJL Today!
Data Services