E-mail

The eDisccovery process encompasses the seizure, forensic imaging and analysis of digital
media and the production of a report into collected evidence for the benefit of an
employer. Digital forensics can be used to attribute evidence to specific persons, confirm
alibis or statements, determine intent, identify sources, or authenticate documents.

Digital Forensics
Internet
Files
Recovering deleted files including:

  • Documents(txt, doc, xls)
  • Graphics (pictures – jpg, bmp, gif)
  • All electronically stored information (ESI)
  • Including the critical information on all files (when it was Created, Modified, or Last
    Accessed)
Tracing Internet activity including:

  • Websites visited
  • Timelines
  • Downloads
  • Manipulation of data
Recovering E-Mail:

  • Extraction
  • De-duplication
  • Presented in a readable format, including attachments and timelines
Recovering Deleted Files
Tracing Internet Activity
Recovering Email
Legal Support
Contact Us:  info@jrbtech.net  817-683 -4583                                                                                                                                                         
                                                                                                                                                       
Copyright 2009-2011 JRB Technologies, LLC All Rights Reserved.
Legal
Legal support:

  • Intellectual property cases
  • Family law
  • Probate resolution
  • Asset verification
  • Criminal law (prosecution or defense)
Most of the time, a case does not even go to trial once evidence is presented that proves
the illegal actions.  It is never a bad idea to use a computer forensics expert to create a
duplicate copy of a questionable hard drive, just in case a problem should arise in the
future. Once a hard drive is reused, it becomes much harder to retain or recover evidence.
Forensics
Every computer investigation is unique, and can take anywhere from a few hours to a few
months to investigate. The wide variance of time is due in part to the following variables:

  • The expertise of the investigators
  • The amount of storage investigators must sort through (hard drives, CDs, DVDs and
    thumb drives)
  • Whether the suspect attempted to hide or delete information
  • The presence of encrypted files or files that are protected by passwords
You want to make sure you hire a digital forensics team that knows what they are doing,
and are not learning as they go.  With over 20 years experience in IT Security and
Infrastructure, JRB Technologies is the company you are can rely on to perform your digital
forensics investigation.
Procedure
Investigation