Cyber Crime Investigation :
With regards to Cyber Law, Cyber Crime Consultants helps with investigations pertaining to:
Computer Fraud:
- Account data (online auctions)
- Digital camera software
- Credit card data
- Accounting software/files
- Databases
- Address books
- Calendar
- Email, notes and letters
- Chat Logs
- Financial records
- Customer information
Child Abuse and Pornography:
- Chat logs
- Images
- Digital camera software
- Internet logs
- Emails, notes and letters
- Movie files
- Games
- User directory and file names
- Graphic editing/ viewing software
Network Intrusion:
- Address books
- Internet protocol address/usernames
- Configuration files
- Internet relay chat logs
- Emails, notes and letters
- Source code
- Text files/documents
- Internet activity logs
Homicide:
- Address books
- Telephone records
- Emails, notes and letters
- Diaries
- Financial records
- Internet activity logs
- Photos of victim/suspect
- Legal documents and wills
- Medical records
Financial Fraud and Counterfeiting:
- Address books
- Financial records
- Signature images
- Currency images
- Internet activity logs
- Check and money order images
- Online banking software
- Customer information
- Counterfeit currency images
- Databases
- Bank logs
- Emails, notes and letters
- Credit card numbers
- False identification
Email Threats and Stalking:
- Address books
- Internet activity logs
- Diaries
- Legal documents
- Emails, notes and letters
- Telephone records
- Financial records
- Victim background research
- Images
Narcotics:
- Address books
- False ID
- Calendar
- Financial asset records
- Databases
- Internet activity logs
- Drug recipes
- Prescription form images
- Emails, notes and letters
Domestic Violence:
- Address books
- Financial records
- Diaries
- Telephone records
- Emails, notes and letters
Software Piracy:
- Chat logs
- Software serial numbers
- Emails, notes and letters
- Software cracking utilities
- Image files/software certificates
- User created directories/file names
- Internet activity logs which classify copyrighted software
Telecommunication Fraud:
- Cloning software
- Emails, notes and letters
- Customer database records
- Financial asset records
- Electronic serial numbers
- Internet activity logs
- Mobile identification numbers