Cyber Crime Investigation
Cyber Law Consulting Carries out further such Crime Investigations
Computer Fraud Investigations:
- Account data from online auctions
- Credit card data
- Accounting software and files
- Databases
- Address books
- Digital camera software
- Calendar
- Email, notes and letters
- Chat Logs
- Financial and asset records
- Customer information
Child Abuse and Pornography Investigations:
- Chat logs
- Images
- Digital camera software
- Internet activity logs
- Emails, notes and letters
- Movie files
- Games
- User created directory and file names
- Graphic editing and viewing software which classify images
Network Intrusion Investigations:
- Address books
- Internet protocol address & usernames
- Configuration files
- Internet relay chat logs
- Emails, notes and letters
- Source code
- Executable programs
- Text files and documents with
- Internet activity logs usernames and passwords
Homicide Investigations:
- Address books
- Telephone records
- Emails, notes and letters
- Diaries
- Financial asset records
- Maps
- Internet activity logs
- Photos of victim / suspect
- Legal documents and wills
- Trophy photos
- Medical records
Domestic Violence Investigations:
- Address books
- Financial asset records
- Diaries
- Telephone records
- Emails, notes and letters
Financial Fraud and Counterfeiting Investigations:
- Address books
- Financial asset records
- Calendar
- Images of signatures
- Currency images
- Internet activity logs
- Check and money order images
- Online banking software
- Customer information
- Counterfeit currency images
- Databases
- Bank logs
- Emails, notes and letters
- Credit card numbers
- False identification
EMail Threats, Harassment and Stalking Investigations:
- Address books
- Internet activity logs
- Diaries
- Legal documents
- Emails, notes and letters
- Telephone records
- Financial asset records
- Victim background research
- Images
- Maps to victim locations
Narcotics Investigations:
- Address books
- False ID
- Calendar
- Financial asset records
- Databases
- Internet activity logs
- Drug recipes
- Prescription form images
- Emails, notes and letters
Software Piracy Investigations:
- Chat logs
- Software serial numbers
- Emails, notes and letters
- Software cracking utilities
- Image files of software certificates
- User created directories and file names
- Internet activity logs which classify copyrighted software
Telecommunication Fraud Investigations:
- Cloning software
- Emails, notes and letters
- Customer database records
- Financial asset records
- Electronic serial numbers
- Internet activity logs
- Mobile identification numbers