Cyber Crime Investigation :

With regards to Cyber Law, Cyber Crime Consultants helps with investigations pertaining to:

Computer Fraud:
  • Account data (online auctions)
  • Digital camera software
  • Credit card data
  • Accounting software/files
  • Databases
  • Address books
  • Calendar
  • Email, notes and letters
  • Chat Logs
  • Financial records
  • Customer information
Child Abuse and Pornography:
  • Chat logs
  • Images
  • Digital camera software
  • Internet logs
  • Emails, notes and letters
  • Movie files
  • Games
  • User directory and file names
  • Graphic editing/ viewing software
Network Intrusion:
  • Address books
  • Internet protocol address/usernames
  • Configuration files
  • Internet relay chat logs
  • Emails, notes and letters
  • Source code
  • Text files/documents
  • Internet activity logs
Homicide:
  • Address books
  • Telephone records
  • Emails, notes and letters
  • Diaries
  • Financial records
  • Internet activity logs
  • Photos of victim/suspect
  • Legal documents and wills
  • Medical records
Financial Fraud and Counterfeiting:
  • Address books
  • Financial records
  • Signature images
  • Currency images
  • Internet activity logs
  • Check and money order images
  • Online banking software
  • Customer information
  • Counterfeit currency images
  • Databases
  • Bank logs
  • Emails, notes and letters
  • Credit card numbers
  • False identification
Email Threats and Stalking:
  • Address books
  • Internet activity logs
  • Diaries
  • Legal documents
  • Emails, notes and letters
  • Telephone records
  • Financial records
  • Victim background research
  • Images
Narcotics:
  • Address books
  • False ID
  • Calendar
  • Financial asset records
  • Databases
  • Internet activity logs
  • Drug recipes
  • Prescription form images
  • Emails, notes and letters
Domestic Violence:
  • Address books
  • Financial records
  • Diaries
  • Telephone records
  • Emails, notes and letters
Software Piracy:
  • Chat logs
  • Software serial numbers
  • Emails, notes and letters
  • Software cracking utilities
  • Image files/software certificates
  • User created directories/file names
  • Internet activity logs which classify copyrighted software
Telecommunication Fraud:
  • Cloning software
  • Emails, notes and letters
  • Customer database records
  • Financial asset records
  • Electronic serial numbers
  • Internet activity logs
  • Mobile identification numbers
Get In Touch