Cookie Policy This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.

Continue Learn more

Reality Net System Solutions

Digital Forensics

Digital Forensics is the discipline that deals with the identification, preservation, analysis and documentation of digital data in order to present evidence applicable both in civil and criminal proceedings.

Digital Forensics has assumed a prominent role, not only in the presence of crimes, but also in civil, commercial, tax and labor law, between a client and lenders and between customers and operators of e-commerce services.

Digital data are the most valuable asset and the most strategic resource of each company, whether private or public. Digital Forensics is the correct solution to be able to identify data theft, industrial espionage, unauthorized access to corporate information systems, information damages and respond to all potential litigation.

The digital forensics analyst must guarantee a highly skilled and specialized level of technical and legal aspects, in order to analyze digital systems, ensuring procedures compliant with both European and International best practices.

  • Expert Advice during the seizure, inspection and recording evidence
  • Acquisition of data using forensic techniques and methods, hash and chain of custody
  • Extraction of deleted or hidden information, timeline reconstruction, indexing and keyword searching
  • Analysis of Windows, Apple and Linux computer and server, mobile devices (i.e. Android, iOS, Windows Phone, BlackBerry), network dump and log files
  • Documentation and final reporting, conservation on protected dedicated servers, expert reports and presence in front of civil or criminal court

 

The working methodology followed conforms to the procedures and international best practices in the field of Digital Forensics (ISO 27037, SWGDE, NIST, UDOJ, UK Acpo, IACIS, ISFCE) and has as its main objective to guarantee the integrity, the accuracy and validity of the original data.

Identification: digital investigation starts with the planning of the work and the identification of potential containers of information. Our team, working together with the client, identifies the objectives of the analysis, obtains information related to the case and apply the appropriate and specific procedures

Acquisition: access to digital data without using adequate tools and procedures can make a valuable information inadmissible in court. Digital evidence is by nature fragile and can be easily altered even only by turning on the device that contains it. Our process ensures that the data is acquired without changing them or damage them, making a forensic copy and checking the integrity with hash functions in order to ensure a proper chain of custody

Extraction: working on the acquired forensic copy acquired our consultants extract the data and information in the analyzed media. Our extraction process aims to recover deleted files, hidden files, temporary files, file fragments and records

Analysis: the information, once extracted, are analyzed to reconstruct the activities carried out by the digital device. Our experts are able to analyze data from different devices: personal computers, servers, mobile phones, smart phones, navigation systems, network traffic, log files, cloud data

Report: at the end of the analysis a written report is produced that can be used for assessments within the company or in court

 

  • tools
    Arsenal Image Mounter

    Computer Analysis

  • tools
    Talino Forensic Workstation

    Computer and Mobile Acquisition and Analysis

  • tools
    Cellebrite Digital Collector

    Computer Acquisition

  • tools
    USB Detective

    Computer Analysis

  • tools
    SQLite Forensic Toolkit

    SQLite Database Analysis

  • tools
    Elcomsoft Explorer for WhatsApp

    Mobile Analysis

  • tools
    Elcomsoft Forensic Disk Decryptor

    Password decryption

  • tools
    LegalEye

    Cloud acquisition

  • tools
    Magnet AXIOM

    Computer and Mobile Analysis

  • tools
    Passware Kit Mobile

    Mobile Acquisition

  • tools
    Passware Kit Forensic

    Password decryption

  • tools
    MSAB XRY

    Mobile Acquisition and Analysis

  • tools
    Elcomsoft Cloud eXplorer

    Cloud Acquisition

  • tools
    Oxygen Forensic Detective

    Mobile Acquisition and Analysis

  • tools
    Logicube Forensic Falcon Neo

    Hard Disk Acquisition

  • tools
    Wiebetech Forensic UltraDock v5.5

    Hard Disk Acquisition

  • tools
    Elcomsoft Phone Breaker

    Mobile Acquisition

  • tools
    Elcomsoft Phone Viewer

    Mobile Analysis

  • tools
    Elcomsoft iOS Forensic Toolkit

    Mobile Acquisition

  • tools
    Cellebrite Physical Analyzer

    Mobile Analysis

  • tools
    F-Response TACTICAL

    Remote and Cloud Acquisition

  • tools
    Magnet Internet Evidence Finder

    Computer and Mobile Analysis

  • tools
    X-ways Forensics

    Computer and Mobile Analysis

  • tools
    Cellebrite UFED

    Mobile Acquisition

  • tools
    Logicube Forensic Falcon

    Hard Disk Acquisition

  • tools
    AccessData Forensics Toolkit

    Computer and Mobile Analysis

  • tools
    Wiebetech USB WriteBlocker

    USB Devices Acquisition

  • tools
    Guidance Tableau TD2 Forensic 1:2 Duplicator

    Hard Disk Acquisition