Digital Forensics involving Unique Devices
Our engineers have the experience and knowledge of nearly every electronic component and can help you determine what you’re dealing with. We can often learn how a device was used, when it was used, and who used it.
Drone Forensics (UAVs)
Drones, or unmanned aerial vehicles (UAVs) are frequently used by the military, aerial photography, racing, surveillance, or simply entertainment.
As with just about any digital forensics case, it’s important to understand the types of data and where they may be before you start. Drones house a complex combination of systems with firmware, software, operating systems, and file systems, possibly a camera, the radio controller, and sometimes even an attached mobile device. Whatever question you are trying to answer, please contact us so we can help.
GPS devices can be very useful to criminal and civil cases. With time-stamped location data, user data, and often times a connection to other devices such as mobile phones, there is a wealth of information to be gained from these devices with the help of experienced forensic examiners. These devices can also be of great value for accident reconstruction, search and rescue, and more.
Smart Camera Systems
Though typically shown in movies as tools for state espionage, spy cameras and “nanny cameras” have at least as large of a presence in the consumer and business world, with a multitude of potential uses. As hidden video and audio recorders, they are useful devices full of potential evidence to be used in criminal or civil litigation.
Alternatively, these devices are sometimes used illegally and enter a court of law as evidence of illegal monitoring or spying, something our forensic examiners can investigate in a spy camera forensics case.
Magnetic Stripe and Card Skimmer Forensics
Magnetic stripe readers are devices that read the magnetic information contained on cards with data, such as credit cards and ID badges. As you can probably guess, these devices are typically used for secure entry access and credit card transaction processing.
In recent years, card skimmers have seen an uptick in activity, with many being installed discreetly on ATMs and gas station pumps. An example of how we can help is to investigate the devices recovered from the location of the crime to identify if and to what extent financial or personally identifiable information was stolen. This allows authorities to notify victims and their banking institutions faster than normal, as it isn’t always simple to disassemble and analyze these devices.