Cyber Crime Investigation

Cyber Law Consulting Carries out further such Crime Investigations:

Computer Fraud Investigations:

Account data from online auctions

Credit card data

Accounting software and files

Databases

Address books

Digital camera software

Calendar

E­mail, notes and letters

Chat Logs

Financial and asset records

Customer information

Child Abuse and Pornography Investigations:

Chat logs

Images

Digital camera software

Internet activity logs

E­mails, notes and letters

Movie files

Games

User created directory and file names

Graphic editing and viewing software which classify images

Network Intrusion Investigations:

Address books

Internet protocol address & usernames

Configuration files

Internet relay chat logs

E­mails, notes and letters

Source code

Executable programs

Text files and documents with

Internet activity logs usernames and passwords

Homicide Investigations:

Address books

Telephone records

E­mails, notes and letters

Diaries

Financial asset records

Maps

Internet activity logs

Photos of victim / suspect

Legal documents and wills

Trophy photos

Medical records

Domestic Violence Investigations:

Address books

Financial asset records

Diaries

Telephone records

E­mails, notes and letters

Financial Fraud and Counterfeiting Investigations:

Address books

Financial asset records

Calendar

Images of signatures

Currency images

Internet activity logs

Check and money order images

Online banking software

Customer information

Counterfeit currency images

Databases

Bank logs

E­mails, notes and letters

Credit card numbers

False identification

E­Mail Threats, Harassment and Stalking Investigations:

Address books

Internet activity logs

Diaries

Legal documents

E­mails, notes and letters

Telephone records

Financial asset records

Victim background research

Images

Maps to victim locations

Narcotics Investigations:

Address books

False ID

Calendar

Financial asset records

Databases

Internet activity logs

Drug recipes

Prescription form images

E­mails, notes and letters

Software Piracy Investigations:

Chat logs

Software serial numbers

E­mails, notes, and letters

Software cracking utilities

Image files of software certificates

User-created directories and file names

Internet activity logs which classify copyrighted software

Telecommunication Fraud Investigations:

Cloning software

E­mails, notes and letters

Customer database records

Financial asset records

Electronic serial numbers

Internet activity logs

Mobile identification numbers

Leave a Comment

Your email address will not be published. Required fields are marked *