Computer Forensic Analysis

 

Accessing systemsBosaw & Associates LLC applies superior computer examination and analysis techniques in our office or world-wide, using Guidance Software's FastBloc 3 Field Edition and EnCase Neutrino aquisition hardware for all computer types and personal electronic devices such as cell phones and PDA's. We can:

  • Isolate the target computer or storage media using proper seizure procedures.
  • Make a bit-stream copy of the target storage media using non-invasive write-blocking hardware.
  • Store original target storage media in a secure storage facility.
  • Maintain chain of custody records.
  • Perform all examinations on digital copy.

 

Bosaw & Associates LLC uses a variety of techniques and proprietary forensic applications to examine the target media copy, searching hidden folders, file slack and unallocated disk space for copies of deleted, encrypted, or damaged files. Any evidence found on the digital copy is carefully documented in a "Report of Analysis" and verified with the original target media in preparation for legal proceedings that involve discovery, depositions, or litigation.

 

In addition, Bosaw & Associates LLC offers "Forensic Database Analysis" services to detect:

  • Unathorized data accesses and or manipulations by authorized users
  • Internal fraud relative to "Sarbanes-Oxley" compliance
  • Malfeasance and or external fraud in accounts payable records
  • Errors and inadequacies in Management Information System databases as required for compliance with the "Patriot Act" and "Bank Secrecy Act"