BTB Security conducts analysis of digital evidence using special software, techniques, and procedures. We can deploy resources to capture evidence or seized evidence may be shipped to us for examination. We will conduct a thorough analysis and provide a detailed report outlining the process that was followed and evidence found. Analyses of this type often support investigations that rely on evidence surrounding the following activities:
- Web sites that have been visited
- Files that have been downloaded
- When files were created, modified, and last accessed
- Whether attempts have been made to conceal or destroy evidence
- Whether attempts have been made to fabricate evidence
We conduct forensic analysis of evidence for civil and criminal cases, investigation of company computers to determine employee activity, and preparation of electronic discovery requests.
Click here to download our Forensic Examination overview (PDF)
BTB Security was hired by an individual whose spouse identified inappropriate graphics and visited web sites on the household computer. BTB was asked to determine if the graphics were the result of “normal” web surfing, or the result of malware or some other malicious software. BTB was able to analyze the computer using forensic techniques and create a time-line of events that indicated the graphics and visited web sites could not have been performed by a human. Our customer was able to regain the trust of their spouse.