Cyber Crime Investigation

Cyber Law Consulting Carries out further such Crime Investigations

Computer Fraud Investigations:

  • Account data from online auctions
  • Credit card data
  • Accounting software and files
  • Databases
  • Address books
  • Digital camera software
  • Calendar
  • E­mail, notes and letters
  • Chat Logs
  • Financial and asset records
  • Customer information
Child Abuse and Pornography Investigations:
  • Chat logs
  • Images
  • Digital camera software
  • Internet activity logs
  • E­mails, notes and letters
  • Movie files
  • Games
  • User created directory and file names
  • Graphic editing and viewing software which classify images
Network Intrusion Investigations:
  • Address books
  • Internet protocol address & usernames
  • Configuration files
  • Internet relay chat logs
  • E­mails, notes and letters
  • Source code
  • Executable programs
  • Text files and documents with
  • Internet activity logs usernames and passwords
Homicide Investigations:
  • Address books
  • Telephone records
  • E­mails, notes and letters
  • Diaries
  • Financial asset records
  • Maps
  • Internet activity logs
  • Photos of victim / suspect
  • Legal documents and wills
  • Trophy photos
  • Medical records
Domestic Violence Investigations:
  • Address books
  • Financial asset records
  • Diaries
  • Telephone records
  • E­mails, notes and letters
Financial Fraud and Counterfeiting Investigations:
  • Address books
  • Financial asset records
  • Calendar
  • Images of signatures
  • Currency images
  • Internet activity logs
  • Check and money order images
  • Online banking software
  • Customer information
  • Counterfeit currency images
  • Databases
  • Bank logs
  • E­mails, notes and letters
  • Credit card numbers
  • False identification
E­Mail Threats, Harassment and Stalking Investigations:
  • Address books
  • Internet activity logs
  • Diaries
  • Legal documents
  • E­mails, notes and letters
  • Telephone records
  • Financial asset records
  • Victim background research
  • Images
  • Maps to victim locations
Narcotics Investigations:
  • Address books
  • False ID
  • Calendar
  • Financial asset records
  • Databases
  • Internet activity logs
  • Drug recipes
  • Prescription form images
  • E­mails, notes and letters
Software Piracy Investigations:
  • Chat logs
  • Software serial numbers
  • E­mails, notes and letters
  • Software cracking utilities
  • Image files of software certificates
  • User created directories and file names
  • Internet activity logs which classify copyrighted software
Telecommunication Fraud Investigations:
  • Cloning software
  • E­mails, notes and letters
  • Customer database records
  • Financial asset records
  • Electronic serial numbers
  • Internet activity logs
  • Mobile identification numbers