Use of Electronic Evidence Analysis by a Private Investigator

Electronic Evidence Analysis is referred to as computer forensic analysis, digital discovery, electronic digital discovery, computer analysis, and computer examinations. It is the process of identification, preservation, interpretation and documentation of evidence recovered for presentation in civil or criminal court.

Electronic Evidence Analysis helps in recovering deleted files and searching the slack and unallocated space on a hard drive, places where valuable hard to find evidence frequently resides. It will trace on windows artifacts, for clues of what the computer has been used for, and, more importantly, knowing how to look for the artifacts, and evaluating the importance of the information. A good analyst knows how to process those hidden files that contain past usage information for use in court.

Professionally trained, highly skilled forensic technicians and specialists can recover data from a floppy disk, USB keys, hard drive, CF cards or SD cards, smart phone or cell telephone or even flash card memory stick. Data recovery can be performed with a digital forensic solution using the latest technology while recovering your data. Electronic Evidence Analysis has advanced significantly which makes forensic technicians or specialists work, analyzing evidence a bit easier and more reliable compared to past methods. Electronic digital evidence acquirement, search, filter and consolidation of data, electronic mail’s and files can be performed on virtually any type of media including hard drives, backup tapes, CD-ROM, Zip disks and floppy disks.

Computer forensics is also capable of running a string-search for electronic mail with an analysis revealing the computers internet usage, to recover data, and accomplish a full analysis even after computer files have been deleted and, or formatted.
Here are few examples on how Electronic Evidence Analysis provides assistance to a private investigator in specific tasks and scenarios:

  1. Marital Infidelity Cases: where the forensic recovery or analysis of evidence was used to find evidence, trail of an unfaithful husband or wife.
  2. Tailing the suspect: By the use of a GPS (Global Positioning System)
  3. Evidence Acquisition: Deleted mails erased SMS Text messages, cellular phone messages archives and others.
  4. Harassment cases: victims receiving harassment via phone, and, or email.

Evidence Aquisition:
Preserve the computer logs, cell phone calls received from other cell phones or electronic mail sent from a given source and show them as evidence; by strictly maintaining a chain of custody. A forensic examiner can analyze the electronic mail header and trace it for the beginning of the IP address from which it has been sent.

Surveillance cases:
Continual observation of a person closely who is suspected of doing something illegal.

Tailing the suspect:
Latest devices such as spy-ware programs and keystroke loggers are capable to capture and provide real time info about what, where and when those things have occurred on a suspected computer.
As economy and society evolved, the competition in every private investigation field gets intense. Therefore, it is vital to always stay up with the most modern technology and its latest devices, in order to provide not just quality but the best professional and valued services to our clients.


Call Computer Forensics Associates