2. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
⢠Burgess Forensics
⢠Center for Computer Forensics (CCF)
⢠Navigant Consulting
⢠ACR Data Recovery
⢠Computer Forensic Services
⢠Cyber Evidence
⢠Data Recon
⢠ADR (American Data Recovery) Computer Forensics
⢠Berryhill Computer Forensics, Inc.
⢠CIA Solutions
⢠Federal Bureau of Investigation (FBI)
⢠Interpol
⢠National Center for Missing and Exploited Children (NCMEC)
⢠Logicube
⢠LJ Forensics
⢠Intelligent Computer Solutions (ICS)
⢠Cy4or
This module will familiarize you with:
3. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective (contâd)
⢠Forensicon
⢠Global Digital Forensics
⢠Integrity Security & Investigation Services, Inc. (ISIS, INC)
⢠Trial Solutions
⢠Digital Detective
⢠Florida Department of Law Enforcement
⢠Northern California Computer Crimes Task Force (NC3TF)
⢠Child Exploitation and Online Protection Centre (CEOP)
⢠eFrauda
⢠International Association of Computer Investigative Specialists (IACIS)
⢠7Safe
⢠Adroit Infotech Consultancy Service
⢠Digital Medix
⢠Hill Schwartz Spilker Keller LLC (HSSK)
⢠IRIS Data Services
⢠Computer Forensic Labs, Inc.
This module will familiarize you with:
4. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Burgess Forensics
Center for Computer
Forensics
Navigant Consulting
ACR Data Recovery
Computer Forensic
Services
Cyber Evidence
Data Recon
American Data Recovery
Computer Forensics
Berryhill Computer
Forensics, Inc.
CIA Solutions
Federal Bureau of
Investigation
Interpol
National Center for Missing
and Exploited Children
Logicube
Contâd
5. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow (contâd)
Contâd
LJ Forensics
Intelligent Computer
Solutions (ICS)
Cy4or
Forensicon
Global Digital Forensics
Integrity Security &
Investigation Services, Inc.
Trial Solutions
Digital Detective
Florida Department
of Law Enforcement
Northern California Computer
Crimes Task Force
Child Exploitation and
Online Protection Centre
eFrauda
International Association of
Computer Investigative Specialists
Contâd
6. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow (contâd)
Contâd
7Safe
Adroit Infotech
Consultancy Service
Digital Medix
Hill Schwartz Spilker
Keller LLC (HSSK)
IRIS Data Services
Computer Forensic Labs, Inc.
7. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Burgess Forensics
⢠Recovering files from damaged operating systems or hardware
⢠Making forensic images or copies of originals, either at our offices or on
site
⢠Preserving the original disk drive or other digital media in its pristine
condition
⢠Recovering data from systems on which there's been an attempt to:
Sabotage, hide, delete, overwrite or steal information
⢠Revealing damage performed on the injured party's computer and files
⢠Giving expert testimony in deposition and trial
⢠Producing declarations, affidavits and other reports
Services it offer:
Burgess Forensics provides Computer Forensics, Electronic Discovery Services,
as well as Expert Witness Testimony
8. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Burgess Forensics: Screenshot
9. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Center for Computer Forensics (CCF)
⢠Computer Forensic Services
⢠Windows forensics
⢠Macintosh (MAC) forensics
⢠Cell phone forensics
⢠Unix Forensics
⢠E-discovery
⢠Scanning and coding services
⢠Data preservation
⢠Tape restoration
It offers:
The Center for Computer Forensics has created an expert services
company that specializes in litigation support for electronically stored
information
10. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Center for Computer Forensics (CCF):
Screenshot
11. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Navigant Consulting
⢠Digital forensics
⢠Corporate fraud investigations
⢠Forensic accounting investigations
⢠Anti-money laundering
⢠Anti-corruption investigations
⢠Business intelligence
⢠White collar crime
Investigation services involves:
Navigant consulting is the organization that provides investigations
and discovery services to its clients
12. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Navigant Consulting (contâd)
⢠Electronic disclosure
⢠Evidential preservation
⢠Expert witness
⢠Forensic IT investigation
⢠Incident response
⢠Misuse of IT systems investigations
⢠Re-creation of deleted material
⢠Search orders
⢠Theft of intellectual property
investigations
Digital forensics
service include:
13. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Navigant Consulting (contâd)
⢠Procurement & Inventory Fraud
⢠Identification of Secret Commissions & Kickbacks
⢠Bribery & Corruption Investigations
⢠Asset Tracing & Recovery
⢠Civil and Criminal Fraud
⢠Employee Fraud and Theft
⢠Management Fraud and Theft
⢠Training on Fraud Awareness, Prevention and Related Topics
Corporate fraud investigation service helps
the clients address:
14. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Navigant Consulting: Screenshot
15. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ACR Data Recovery
ACR Data Recovery provides software and services for recovering
data of the system
16. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Forensic Services
⢠Electronic Data Discovery (EDD)
⢠Cyber forensic investigative services
⢠Hostile workplace allegations
⢠Theft of trade secrets/intellectual property
⢠Employee Fraud
⢠Incident Response and Forensics
⢠Copyright Infringement
Services it offer:
⢠California SB 1386
⢠Gramm-Leach-Bliley Act
⢠Sarbanes-Oxley Act
It makes use of laws:
Computer Forensic Services support corporate counsel, outside counsel and
audit committees respond to employee complaints, suspicions, etc
17. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Forensic Services:
Screenshot
18. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cyber Evidence Inc.
⢠Providing clients with a range of digital data incident response,
investigative and consulting services
⢠Providing industry leading training to individuals and
organizations involved in digital forensics
⢠Developing partnerships with institutions of higher learning to
help move the digital forensics industry into the academic
mainstream
It addresses the needs in three primary
ways:
Cyber Evidence Inc. is the provider of computer forensics
19. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cyber Evidence: Screenshot
20. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Data Recon
Data Recon Computer Forensic Services is provided to attorneys,
employers and government agencies
It acts upon employee actions and civil suits in which computer data
needs to be examined and turned over during the discovery process
21. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Data Recon: Screenshot
22. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ADR (American Data Recovery)
Computer Forensics
⢠Intellectual Property Theft
⢠Sexual / Racial Harassment
⢠Inappropriate Computer Use
⢠Electronic Discovery / Disclosure
⢠Compliance Issues
⢠Terrorism
⢠Pedophile
⢠Murder
⢠Financial Fraud
It provides litigation support for the cases:
ADR Computer Forensics provides expert data recovery and computer
forensics services for businesses and organizations
23. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ADR (American Data Recovery)
Computer Forensics: Screenshot
24. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Berryhill Computer Forensics, Inc.
⢠Electronic evidence recovery
⢠Analysis and expert witness testimony
Berryhill Computer Forensics, Inc. provides:
⢠Attorneys
⢠Private investigators
⢠Litigation support firms
⢠Law enforcement/government agencies
⢠Corporations and small businesses
It provides services to:
25. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Berryhill Computer Forensics, Inc.:
Screenshot
26. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CIA Solutions
⢠Computer forensics
⢠Computer Fraud Investigations
⢠Computer Hacking Investigations
⢠Computer Security Consulting
⢠Data Recovery
⢠Basel, SOX and APRA computer forensic compliance requirements
⢠Expert witness or courtroom assistance
⢠Staff investigation of inappropriate or misuse of computers
⢠Email, chat room, staff sexual harassment investigations
⢠The creation and implementation of an entire computer forensic
corporate capability including education of staff
⢠Wireless or wired network security and evidentiary collection validation
⢠Computer Forensic and security education and training
⢠Forensic sanitization of old computer equipment
CIA Solutions offer Computer Investigations and
Analysis Solutions which includes:
27. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CIA Solutions (contâd)
⢠Email investigations
⢠Hacking investigations
⢠Disputed transactions
⢠Theft of intellectual property investigations
⢠Allegations of employee misbehavior or conduct
⢠Show compliance with legal and regulatory rules
⢠Avoid charges of negligence or breach of
contract
⢠Fraud or identity theft investigations
⢠Meet disclosure requirements in civil claims
⢠Support insurance claims after a loss
⢠Expert due diligence investigations
⢠Sexual or harassment of staff investigations via
email or the internet
Computer
investigations
involve:
28. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CIA Solutions: Screenshot
29. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Federal Bureau of Investigation (FBI)
⢠Counter terrorism
⢠Counter intelligence
⢠Cyber crime
⢠Public corruption
⢠Civil rights
⢠Organized crime
⢠White collar crime
⢠Major thefts/violent crime
It investigates:
Federal Bureau of Investigation is an official site for US government
Mission of FBI is to protect people, their communities, and businesses
from threats
30. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Federal Bureau of Investigation
(FBI): Screenshot
31. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Interpol
Interpol is an international police organization
It aims to facilitate international police co-operation even where diplomatic
relations do not exist between particular countries
32. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
National Center for Missing and
Exploited Children (NCMEC)
NCMEC is a non-profit organization that intake reports and investigates against
missing child and child exploitation issues
It offers reporting 24/7 through cyber tipline
33. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Logicube
⢠FBI, CIA
⢠Secret Service
⢠IRS, INS
⢠NSA, DEA
⢠ATF, Military Intelligence
⢠NATO, Scotland Yard
⢠Private Investigators, other law enforcement agencies
⢠corporate security and IT personnel
Customers of it include:
Logicube offers sophisticated computer forensic hard disk data
recovery system
34. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Logicube: Screenshot
35. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
LJ Forensics
LJ Forensic services include on-site collection, analysis and final presentation
of computer based evidence
It offers data recovery, and expert witness
36. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Intelligent Computer Solutions (ICS)
ICS offers Computer Forensic
Data Acquisition
It offers forensic tools for
capturing data at high speeds, to
fight the surging computer-
based crimes such as identity
theft, child pornography, etc
37. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Intelligent Computer Solutions
(ICS): Screenshot
38. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cy4or
⢠Computer forensic analysis
⢠Mobile phone/ PDA analysis
⢠E-Discovery/ Litigation support
⢠Audio visual forensic analysis
⢠Document analysis
⢠Computer fraud investigations
⢠Search and seize orders/ Incident response
⢠Expert witness service
It offers forensic services such as:
Cy4or is a UK based professional forensic service providing
organization
39. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cy4or: Screenshot
40. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Forensicon
⢠Litigation consulting
⢠Chain of custody
⢠Preservation of evidence
⢠Analysis of evidence
⢠Expert testimony and reports
⢠Data removal and certification
⢠Forensic vault service
Services it offer:
Forensicon is a Computer forensics specialist organization
It offers forensic services to Intellectual property matters such as trade
secrets
41. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Forensicon: Screenshot
42. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Global Digital Forensics
⢠Computer forensics
⢠Email forensics, incident response, server forensics, mainframe
forensics, corporate services, Back Tape Extraction and Forensics etc.,
⢠Electronic discovery
⢠E-discovery services, discovery consulting, expert witnesses, e-discovery
laws, etc.
Services it offer:
Global Digital Forensics specializes in the Forensic Analysis of
various digital assets and media (Computer Forensics) for corporate
clients, law firms and government agencies
43. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Global Digital Forensics:
Screenshot
44. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Integrity Security & Investigation
Services, Inc. (ISIS)
⢠Computer forensics
⢠Electronic discovery
⢠Fraud investigations
Services it offer:
Integrity Security & Investigation Services, Inc. (ISIS, INC) is a professional
investigation agency serving an international clientele of law firms,
insurance companies, law enforcement, US Government, corporations,
Department of Defense, and private individuals
45. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Integrity Security & Investigation
Services, Inc. (ISIS): Screenshot
46. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Trial Solutions
⢠Litigation support
⢠Computer forensics
⢠Electronic discovery
⢠Electronic data conversion
Services it offer:
Trial solutions is a computer forensic consulting service
47. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Trial Solutions: Screenshot
48. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Digital Detective
Digital Detective providing Forensic examiners with quality software
and resources
49. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Florida Department of Law
Enforcement
⢠http://www.fdle.state.fl.us/Fc3/report.html
User can report a computer crime at:
⢠Cyberstalking
⢠Internet hoaxes
⢠Identity theft
⢠Spyware
⢠Spam
⢠Child pornography
⢠Fraud
⢠Phishing
⢠Malware
It provides forensic services to:
The Florida Department of Law Enforcement (FDLE) recognizes the need for
action against computer crime being committed every day in the state of
Florida
50. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Florida Department of Law
Enforcement: Screenshot
51. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Northern California Computer
Crimes Task Force (NC3TF)
⢠Computer related crimes which include major thefts, robberies and
embezzlements of technology hardware, software, and intellectual property
⢠Telecommunications fraud
⢠Child pornography
⢠Gray market manufacturing, sales and possession of counterfeit technology
products
⢠Money laundering when accomplished with the use of a computer or
electronic banking transfer
⢠Unlawful access, destruction of, or unauthorized entry into use of private,
corporate or government computers and networks
⢠Identity theft
NC3TF is responsible for the investigation, apprehension of the
responsible, and the recovery of stolen property for the
following offenses:
52. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Northern California Computer Crimes
Task Force (NC3TF): Screenshot
53. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Child Exploitation and Online
Protection Centre (CEOP)
The Child Exploitation and Online Protection (CEOP)
Centre is part of UK police and is dedicated to protect
children from sexual abuse
It intakes reports from the users and process the
reports to their best ability with the help of
government officials
54. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Child Exploitation and Online
Protection Centre (CEOP): Screenshot
55. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
eFrauda
eFraudaâs mission is to address fraud committed over the Internet
For victims of Internet fraud, eFrauda provides a convenient and easy-to-use
reporting mechanism that alerts authorities of a suspected internet fraud
It offers a method for romanian citizens to communicate their complaints to
Romanian government agencies that are interested in investigating and taking
action against internet fraud that is reported
56. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
eFrauda: Screenshot
57. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
International Association of Computer
Investigative Specialists (IACIS)
IACIS is an international volunteer non-profit corporation composed of law
enforcement professionals dedicated to education in the field of forensic
computer science
Members of it represent Federal, state, local and International law
enforcement professionals
Regular IACIS members have been trained in the forensic science of seizing
and processing computer systems
58. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
International Association of Computer
Investigative Specialists: Screenshot
59. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
7Safe
⢠Computer forensics
⢠Payment card industry data security standard (PCI DSS)
⢠E-discovery and litigation report
⢠Penetration testing
⢠Information security consulting
It offers services such as:
7Safe provides a whole range of data security services
60. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
7Safe: Screenshot
61. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Adroit Infotech Consultancy
Service
⢠Cyber crime consulting and cyber forensics
⢠Corporate Fraud Investigation
⢠Penetration Testing
⢠Intrusion Detection
⢠Firewall Installation
⢠Incident Handling
⢠Virtual Private Networks
The services, it offers:
Adroit is an independent company offering services in IT security
and computer crime detection, investigation and prevention
62. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Adroit Infotech Consultancy
Service: Screenshot
63. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Digital Medix
⢠Hard drives
⢠RAID Arrays
⢠Digital camera cards
⢠All removable media such as CD/DVDs, pen drives, etc
It offers data recovery services for:
Digital Medix is a data integrity company
64. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Digital Medix: Screenshot
65. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hill Schwartz Spilker Keller LLC
(HSSK)
⢠Image and analyze computers of terminated, soon to be terminated or
potentially litigious employees
⢠Search for evidence of:
⢠Intellectual property theft
⢠Fraud or embezzlement
⢠Inappropriate computer use or other
unauthorized activity
⢠Data recovery
⢠Password override
Businesses and law firms use its computer
forensics service in a number of sensitive areas
such as:
Hill Schwartz Spilker Keller LLC is a business valuation, computer
forensics and litigation Consulting organizaton
66. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hill Schwartz Spilker Keller LLC
(HSSK): Screenshot
67. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
IRIS Data Services
⢠Collection Planning
⢠Computer User Profiling
⢠Link Analysis
⢠Data imaging and evidence custody
⢠Advanced forensic analysis
⢠Password decryption techniques
⢠Cellular phone analysis
⢠Advanced e-mail investigation
⢠PDA seizure and data acquisition
⢠Digital investigation reporting
⢠Expert Testimony
⢠Exhibit Production
Computer forensic services, it offer:
IRIS Data Services is a provider of electronic discovery services, including
data preservation, collection, processing, and online review
68. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
IRIS Data Services: Screenshot
69. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Forensic Labs, Inc.
⢠Employee or Employer Misconduct
⢠Use of E-Mail, Instant Messaging, & Chat
⢠Computer Hacking & Network Intrusion
⢠Copyright Infringement
⢠Software Piracy
⢠Intellectual Property Theft
⢠Identity Theft
⢠Online Auction Fraud
⢠Credit Card Fraud
⢠Child Pornography & Sexual Exploitation
It conducts computer forensic investigations upon:
Computer forensic labs, Inc. offers electronic data discovery and digital
forensics
70. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Forensic Labs, Inc.:
Screenshot
71. EC-Council
Copyright Š by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Burgess Forensics provides Computer Forensics, Electronic Discovery Services, as well
as Expert Witness Testimony
Navigant consulting is the organization that provides investigations and discovery
services to its clients
ADR Computer Forensics provides expert data recovery and computer forensics
services for businesses and organizations
CIA Solutions offer Computer Investigations and Analysis Solutions
Federal Bureau of Investigation offers computer forensics
The Child Exploitation and Online Protection (CEOP) Centre is part of UK police and is
dedicated to protect children from sexual abuse
eFrauda mission is to address fraud committed over the Internet