At ACS & DYNAMDRE we strive to provide our customers with innovative, yet affordable Digital Forensics and ICT Solutions. Our facilities boast a state-of-the-art digital forensic laboratory, safely and securely situated within the heart of South-Africa’s largest research institute. Our investment in digital forensic technology and highly skilled resources, ensure that we stay ahead of our competitors, and allow us to deliver digital forensic services and results of the highest standard and quality.
Computer Forensics
The preservation, identification, extraction, interpretation, and documentation of computer evidence to include the legal processes, the integrity of evidence, factual reporting of the information found, and the ability to provide an expert opinion in a court of law or other legal proceedings with regards to the findings. Dynamdre guarantees proper management of digital forensic acquisitions regardless of the device that we acquire information from, e.g. computers, laptops, tablets, smartphones, storage devices, and so forth.
We seize the device and place it in a secure environment to prevent any contamination. After that, we create two forensic duplicates of the data on which we perform all analytics and investigations, and we return the original device to its owner. We follow the internationally accepted best practice while collecting, examining, analysis and reporting on any digital evidence. We only make use of the most sophisticated software and hardware. Therefore, having a reliable and experienced forensics team at your side can help your organization avoid unnecessary and costly employment litigation.
For more information, please refer to our associated partner company DYNAMDRE specialising in Cyber Forensics.
Network Forensics
The capture, recording, storage and analysis of network events to discover the source of security attacks or other problem incidents. The purpose of Network forensics is to record every packet of network traffic to a single searchable repository to examine the traffic in great detail. Collecting a complete record of network activity can be invaluable for addressing technical, operational, and organizational issues. Network Forensics can uncover the low-level addresses of the communicating systems, which can be used to trace an action or conversation back to a physical device. The entire content of emails, Instant Messaging conversations, web surfing activities and file transfers can be recovered and reconstructed to reveal the original transaction. Moreover, the protocol data that surrounded each conversation is often treasured.
The following include some of the benefits of Network Forensics
• Finding proof of a security attack
• Troubleshooting Intermittent Performance Issues
• Monitoring User Activity for Compliance with IT and HR Policies
• Identifying the Source of Data Leaks
• Monitoring Business Transactions
• Troubleshooting VoIP and Video over IP
For more information, please refer to our associated partner company DYNAMDRE
Mobile Forensics
Mobile devices are right in the middle of three booming technological trends: Internet of Things, Cloud Computing, and Big Data. The proliferation of mobile technology is perhaps the main reason, or at least one of the main reasons, for these trends to occur in the first place. In 2015, 377.9 million wireless subscriber connections of smartphones, tablets, and feature phones occurred in the United States. Nowadays, mobile device use is as pervasive as it is helpful, especially in the context of digital forensics, because these small-sized machines amass huge quantities of data on a daily basis, which can be extracted to facilitate the investigation. Being something like a digital extension of ourselves, these machines allow digital forensic investigators to glean a lot of information.
Information that resides on mobile devices (a non-exhaustive list):
• Incoming, outgoing, missed call history
• Phonebook or contact lists
• SMS text, application based, and multimedia messaging content
• Pictures, videos, and audio files and sometimes voicemail messages
• Internet browsing history, content, cookies, search history, analytics information
• To-do lists, notes, calendar entries, ringtones
• Documents, spreadsheets, presentation files and other user-created data
• Passwords, passcodes, swipe codes, user account credentials
• Historical geolocation data, cell phone tower related location data, Wi-Fi connection information
• User dictionary content
• Data from various installed apps
• System files, usage logs, error messages
• Deleted data from all of the above
For more information, please refer to our associated partner company DYNAMDRE
We pride ourselves on well-established accreditation and association with the local and international authorities and bodies.