INVESTIGATION OF INFORMATION CRIMES AND FORENSIC INFORMATION TECHNOLOGIES;
İLTEK TEKNOLOJİ; Our laboratory which is equipped with up-to-date hardware and software used in the field of Forensic IT “Information Crimes Investigation and Forensic Information Laboratory” in case of any information crime or abuse case to be moved to the scene to serve as mobile.
It is capable of providing the fastest service with enough disk copy device (disk duplicator) and writeblocker to answer the need no matter how many disk and other data storage device to be copied.
By laboratory that has the workstations and servers with high processing power and inspection, analysis are completed in a reasonable time.
Information on laboratory facilities and services provided below: For more information, please contact with our company.
- Forensic copy of all kinds of data storage devices (images)
- Review, analyze and perform data recovery operations on forensic copies (image)
- Review, analysis and data recovery process on Mobile devices (mobile phone, tablet computer, navigation, GPS, MP4 player etc.)by reporting,
- Malware analysis on mobile phones,
- CD / DVD / BlueRAY, forensic copying, scratch repair, review and analysis process by reporting,
- Reporting by investigation, analyzing and data recovery on USB sticks and memory cards,
- Analysis the forgotten password for MS Office files and archive files (* ZIP, * RAR),
- Reporting by data analysis and data recovery process on file system crashed, virus damaged,data storage devices that are not accessed data analysis
- Calculating the digital signature of the files (hashing) and comparing the digital signatures of the files,
- Determining and reporting the chronological order of the computer on the time axis on the hard disk,
- Investigation of the contents of e-mail files; detecting when the e-mail was sent by which IP address, detecting whether the e-mail was sent by a real user or by a fake user,
- Computer network traffic is recorded for a reasonable period of time and analysing in the recorded traffic in the computer crime and abuse analysis,
- Identify malware detection and source on computer network.