Cyber Crime Investigation

  • Home
  • Cyber Forensics
  • Forensic Investigation
  • Cyber Crime Investigation
pattern

Cyber Crime Investigation

Cyber Law Consulting Carries out further such Crime Investigations:

Computer Fraud Investigations:

  • Account data from online auctions
  • Credit card data
  • Accounting software and files
  • Databases
  • Address books
  • Digital camera software
  • Calendar
  • E­mail, notes and letters
  • Chat Logs
  • Financial and asset records
  • Customer information

Child Abuse and Pornography Investigations:

  • Chat logs
  • Images
  • Digital camera software
  • Internet activity logs
  • E­mails, notes and letters
  • Movie files
  • Games
  • User created directory and file names
  • Graphic editing and viewing software which classify images

Network Intrusion Investigations:

  • Address books
  • Internet protocol address & usernames
  • Configuration files
  • Internet relay chat logs
  • E­mails, notes and letters
  • Source code
  • Executable programs
  • Text files and documents with
  • Internet activity logs usernames and passwords

Homicide Investigations:

  • Address books
  • Telephone records
  • E­mails, notes and letters
  • Diaries
  • Financial asset records
  • Maps
  • Internet activity logs
  • Photos of victim / suspect
  • Legal documents and wills
  • Trophy photos
  • Medical records

E­Mail Threats, Harassment and Stalking Investigations:

  • Address books
  • Internet activity logs
  • Diaries
  • Legal documents
  • E­mails, notes and letters
  • Telephone records
  • Financial asset records
  • Victim background research
  • Images
  • Maps to victim locations

Narcotics Investigations:

  • Address books
  • False ID
  • Calendar
  • Financial asset records
  • Databases
  • Internet activity logs
  • Drug recipes
  • Prescription form images
  • E­mails, notes and letters

Software Piracy Investigations:

  • Chat logs
  • Software serial numbers
  • E­mails, notes and letters
  • Software cracking utilities
  • Image files of software certificates
  • User created directories and file names
  • Internet activity logs which classify copyrighted software

Telecommunication Fraud Investigations:

  • Cloning software
  • E­mails, notes and letters
  • Customer database records
  • Financial asset records
  • Electronic serial numbers
  • Internet activity logs
  • Mobile identification numbers

Domestic Violence Investigations:

  • Address books
  • Financial asset records
  • Diaries
  • Telephone records
  • E­mails, notes and letters

Financial Fraud and Counterfeiting Investigations:

  • Address books
  • Financial asset records
  • Calendar
  • Images of signatures
  • Currency images
  • Internet activity logs
  • Check and money order images
  • Online banking software
  • Customer information
  • Counterfeit currency images
  • Databases
  • Bank logs
  • E­mails, notes and letters
  • Credit card numbers
  • False identification