Search for:

Digital forensics and time are critical when it comes to computer crimes. The first and most crucial step in this process is to establish a trail.   Makarov will follow the trail of data until we find the truth. Digital forensics and research are crucial to developing your case and solve problems. Your number one priority should be to, protect yourself, your reputation, and your future, and we can help.


What is Digital Forensics? 


Digital ForensicsDigital forensics is the process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events.  Digital evidence features in just about every part of our personal and business lives. Legal and business decisions hinge on having timely data about what people have actually done. 


Digital Forensics feature in the private sector, such as during internal corporate investigations or intrusion investigation, a specialist probe into the nature and extent of an unauthorised network intrusion.


The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics, forensic data analysis and mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence.


As well as identifying direct evidence of a crime, digital forensics can be used to attribute evidence to specific suspects, confirm alibis or statements, determine intent, identify sources (for example, in copyright cases), or authenticate documents. Investigations are much broader in scope than other areas of forensic analysis (where the usual aim is to provide answers to a series of simpler questions) often involving complex time-lines or hypotheses.


Objectives of computer forensics

Here are the essential objectives of using Computer forensics:


  • It helps to recover, analyse, and preserve computer and related materials in such a manner that it helps the investigation agency to present them as evidence in a court of law
  • It helps to postulate the motive behind the crime and identity of the main culprit
  • Designing procedures at a suspected crime scene which helps you to ensure that the digital evidence obtained is not corrupted
  • Data acquisition and duplication: Recovering deleted files and deleted partitions from digital media to extract the evidence and validate them
  • Helps you to identify the evidence quickly, and also allows you to estimate the potential impact of the malicious activity on the victim
  • Producing a computer forensic report which offers a complete report on the investigation process
  • Preserving the evidence by following the chain of custody.


Process of Digital forensics

Digital forensics entails the following steps:


  • Identification of the purpose of the investigation, and the resources required
  • Preservation and isolation of data
  • Analysis of data and interpretation of results
  • Documentation of the crime scene
  • Presentation and explanation of conclusions.


Makarov Covert Digital Forensics

The Computer Forensic Analysis process is the methodical approach to examining digital media to establish factual information for civil or criminal matters. This process relies on the complete integrity of data and a strict adherence to best practice.  Digital devices such as computers, laptops, tablets, external hard drives, storage servers and memory cards can hold a wealth of data which may be of critical importance to any investigation. However, specialist knowledge and techniques are usually required to fully extract all possible data and present it to an evidential standard.


Using forensic tools, key evidential data can be analysed and recovered which may prove critical in investigations. Cases may involve encryption, unusual operating systems and other complex investigations.  By use of industry recognised forensic tools and methods, evidential data can be recovered and analysed, providing key information in investigations.


Types of Digital Forensics

Disk Forensics (Drive Recovery Experts)

It deals with extracting data from storage media by searching active, modified, or deleted files.  


Network Forensics

It is a sub-branch of digital forensics. It is related to monitoring and analysis of computer network traffic to collect important information and legal evidence.  Monitoring, capture, storing and analysis of network activities or events in order to discover the source of security attacks, intrusions or other problem incidents, i.e. worms, virus or malware attacks, abnormal network traffic and security breaches.  Unlike other branches of digital forensics, network data is volatile and dynamic. Once transmitted, it is gone so network forensics is often a proactive investigation.  


Wireless Forensics

It is a division of network forensics. The main aim of wireless forensics is to offers the tools need to collect and analyse the data from wireless network traffic.


Database Forensics

Database forensics is a branch of digital forensics related to databases and their related metadata.  Cached information may also exist in a server’s RAM requiring live analysis techniques. A forensic examination of a database may relate to timestamps that apply to the update time of a row in a relational database that is being inspected and tested for validity to verify the actions of a database user. Alternatively, it may focus on identifying transactions within a database or application that indicate evidence of wrongdoing, such as fraud.  


Malware Forensics

This branch deals with the identification of malicious code, to study their payload, viruses, worms, etc.


Email Forensics

Deals with recovery and analysis of emails, including deleted emails, calendars, and contacts.


Memory Forensics

It deals with collecting data from system memory (system registers, cache, RAM) in raw form and then carving the data from Raw dump.  Recovery of evidence from the RAM of a running computer, also called live acquisition.


Mobile Device Forensics

It mainly deals with the examination and analysis of mobile devices. It helps to retrieve phone and SIM contacts, call logs, incoming, and outgoing SMS/MMS, Audio, videos, etc.  Recovery of electronic evidence from mobile phones, smartphones, SIM cards, PDAs, GPS devices, tablets and game consoles.


Digital Image Forensics

Extraction and analysis of digitally acquired photographic images to validate their authenticity by recovering the metadata of the image file to ascertain its history.


Digital Video/Audio Forensics

Collection, analysis and evaluation of sound and video recordings. The science is the establishment of authenticity as to whether a recording is original and whether it has been tampered with, either maliciously or accidentally. Makarov work with our partner company Zana Audio on audio forensic investigations.


Makarov Digital Forensics experts may be hired as part of a cybersecurity and information security teams to identify the cause of data breaches, data leaks, cyber attacks and other cyber threats. Our forensic analysis may also be part of incident response to help recover or identify any sensitive data or personally identifiable information that was lost or stolen in a cybercrime. 


Have a question? We’re here to help.

You can reach us through our contact form, by email, or by phone.  We will get back to you within 1 business day.



Contact Makarov Intelligence Cyber & Risk Management

Moneta Markets Currencies and Shares