Remote Forensics

Binary Intelligence provides remote response services over an Internet connection for many common computer forensic, investigative and data recovery tasks. These remote response capabilities allow our expert digital forensic examiners to provide many common digital evidence collection and triage services in a more efficient and expeditious manner. When remote response services are employed, clients will realize significant savings to both time and money as examiner travel costs and inactive time are eliminated. Urgent situations can often be addressed immediately – regardless of geographic location. Instead of waiting days or weeks for service, our forensic examiners can begin work within minutes of recieving a service call. Note that remote service is not suited for all cases. You are encouraged to call 1-866-246-2794 to discuss your situation with one of our expert computer forensic specialists.
[space height=”10″]
Common tasks that can be performed or initiated remotely include:

[list type=”arrow2″]

  • Internet History Reconstruction

    Identify what websites a user has visited, determine what searches where performed, recover pictures and videos viewed online and rebuild web pages.

  • Chat and Messaging Recovery

    Search the computer hard drive and recover conversations (including deleted or encrypted messages) that occured over many common chat services such as Yahoo! Messenger, Windows Live Messenger, AIM, Google Talk, Facebook chat, MySpace chat, Bebo Chat and QQ.

  • Forensic Imaging

    Collect full forensic images of the subject system, connected media and/or other remote systems on the destination network. Acquisitions may be “live” (capture of a running system) or “static”.

  • Logical Evidence Collection

    Forensically collect and authenticate specific files and/or folders residing on, or accessible to, the subject system. This type of targeted collection is often used to preserve digital evidence in employment matters, domestic situations, or for electronic discovery requests.

  • Data Scrubbing/Secure Erasure

    Securely remove sensitive or confidential data by overwriting storage areas with specific data patterns. Sanitization can be performed on entire devices or can be limited to specific files, folders or areas.

  • Data Recovery

    Recover deleted or lost files on the subject system. The target device must be operational and must not have suffered a physical failure.

  • Email Recovery and Analysis

    Recover, collect and search email stored on the target system. Exchange servers can also be remotely accessed for the extraction of specific email custodians (in PST format) or the forensic collection of entire EDB files.

  • Keyword Searching

    Search the remote system and connected media at the physical sector level for specific key terms or phrases.

  • Meta-data Extraction

    Forensically collect files, preserve external file system meta-data and extract internal embedded meta-data. Identify document author, dates, settings, GPS coordinates, etc.