Computer Forensics Expert Note: In the field of computer forensics, The preserving and authentication phase is critical to ensure the admissibility of evidence, should that become necessary. Perhaps, the most important consideration is that the original evidence must not change the during the acquisition process. For this reason, the forensic examiner must use forensically sterile new media. The examiner must also ensure that the forensic copy is an bit-by-bit copy. To authenticate properly, the examiner must perform three hashes: First hash the original evidence.
Recently, we discussed the malware tracking algorithm. Although this algorithm still has not been implemented to track real malware authors, it presents intriguing possibilities. We had an opportunity to discuss this algorithm on NBC 12. Here is the video.
We also have a separate blog post discussing some specifics of how the algorithm works.
This is the model used for assigning likelihood to a source. The image on the left shows the method for locating a cellphone on network. The method is based on signal travel time. The image on the right shows two observers measuring the arrival time of information. The measurements are combined to generate a likelihood for each potential so...
Computer forensics or digital forensics refers to the collection of evidence from digital computers, laptops, smart phones, storage media (such as portable drives, SD cards, memory sticks, etc). This collection process must be performed utilizing a sound methodology so that the evidence could be admissible in a legal setting. Therefore, the e
AVM Technology is a premiere provider of computer forensics analysis, incident response, and trial consulting. With over 20 years experience in forensics, DOD (Navy and Marine Corps) cyber forensics experience, and trial experience, AVM Technology is uniquely positioned to provide candid and innovative trial advice and strategy.
We are not only geeks, we also have law degrees and trial experience. We are uniquely positioned to understand the challenges faced by counsel when presenting digital evidence at trial. We speak forensics... and law, we know the rules of evidence and can assist counsel as a trusted partner in preparation for trial.
We have a presence throughout all of Virginia and have appeared in trials throughout the United States, including New York, Florida, South Carolina, Maryland, Arkansas, Texas and more!
Virginia clients may contact us at our various locations:
Computer Forensics in the Richmond, Virginia Area : 11357 Nuckols Rd Ste. 1034, Glen Allen, VA 23059 - Phone: (804) 332-5752
Computer Forensics in the Hampton Roads, Norfolk Virginia Beach Area: 20th Street, Virginia Beach VA 23451 - Phone: (757) 716-7135
Computer Forensics in the Northern Virginia/DC Area: 2201 Cooperative Way Suite 600 Herndon, VA 20171 Phone (571) 732-2803
AVM Technology has performed hundreds of computer forensics analysis since 2007, and keeps websites and businesses secure! Personalized services, cyber security consulting, DDOS Mitigation and more!!
AVM Technology, LLC - Experts in Computer Forensics, E-Discovery, and Cyber Security
Businesses, attorneys and individuals seeking the assistance of a computer forensics consultant or expert witness may find many computer forensics or cyber security firms. How can you differentiate a computer forensics expert firm from the others? We, at AVM Technology, LLC have unique qualifications. From our computer forensics experts with successful law experience, such as Domingo J Rivera, to our computer forensics experts with advanced technology degrees and computer industry experience, we are not just one of the "computer forensics experts" bunch. Are there any computer forensics experts who, as attorneys, successfully took the Department of Justice to trial in defending computer crimes... and actually won? Are there any computer forensics experts that have advanced degrees and sufficient industry experience to qualify as trial experts in civil or criminal cases where digital evidence will be presented? Will the computer forensics experts be believable to the jury?
Some of our computer forensics and cybersecurity certifications:
The answer to these questions is a resounding yes, you can find such proven computer forensics experts at AVM Technology, where we only employ the most qualified and effective computer forensics experts. From our Richmond Virginia principal office to New York, NY to Fairfax or Virginia Beach, VA, we provide our clients with excellence in computer forensics, digital evidence, trial expert testimony, electronic discovery consulting and trial expert witness testimony.
Should you have a local computer expert or the best computer forensics expert? We structure our fees to be reasonable in comparison to local computer forensics experts, who may lack our qualifications. Having the wrong expert on your side not only will not help your case but may hurt your chances and believability in the eyes of the jury, the judge, and the opposing attorney. When obtaining the services of a computer forensics expert, the "expert" part should come first, location should be a distant second. AVM Technology, LLC is located in Richmond, VA but provides services throughout the United States. Virginia businesses and attorneys may also find us through our Virginia computer forensics expert website.
As computer forensics experts, we assist in the investigation of unauthorized access to computer systems, business fraud, employee computer fraud and theft, employee theft, Intellectual Property disputes, recovery of digital data, wrongful termination cases, criminal cases involving computer crimes or digital evidence (such as hacking, child pornography cases and Internet solicitation), divorce and other domestic disputes, and uncovering of illegal activity.
Our computer forensics expert team utilizes advanced computer forensics techniques to find evidence. We can do this regardless of whether the files have been previously deleted. We can also assist you or your attorney in determining whether additional investigation is necessary and guide you through the discovery of digital evidence. As a computer forensics company, our interaction with attorneys sets us apart from other computer forensics expert. The reason is that one of the principals of our company is a licensed attorney with experience in Internet law issues. This know-how can prove to be critical in assisting attorneys in navigating through the computer evidence world in a successful manner.
A thorough forensic analysis by a computer forensics expert may also assist you in determining whether evidence has been modified, sabotaged, or otherwise tampered. Also, a well qualified computer forensics expert can testify in court as an expert witness.
We offer expert Information Security consulting testing including Internet security and penetration testing, intrusion detection, wireless security evaluation, social engineering security, and computer forensics services. We assist individuals and businesses in all aspects of cyber security, including IT audits and computer forensics analysis. Our information security and computer forensics expertise can be applied to transactional matters or litigation.
From a transactional perspective, an IT audit including intrusion and penetration testing can assist an organization in having a solid IT infrastructure. On the other hand, our computer forensics experts can assist in analyzing computer systems and retrieve digital information in a forensically sound manner. We can assist businesses and individuals during civil or criminal litigation involving computer evidence.
Electronic Data Discovery, also known as e-Discovery or EDD, involves locating certain documents, often responsive to case related discovery requests. These documents are usually in the form of electronically stored information (ESI). An e-discovery or electronic discovery expert assists attorneys and law firms in understanding the technology issues related to electronic evidence.
Under the current version of the Federal Rules of Civil Procedure (FRCP), discovery includes the production of electronically stored records, also known as e-discovery. This change was a recognition that most businesses now maintain records in electronic format. Even personal computer users now maintain their most important records in electronic storage in their computer. Therefore, electronic discovery should be a paramount consideration to any legal case. AVM Technology assists attorneys and law forms with Electronic Discovery matters before and during litigation.
We are frequently called as experts to discuss computer forensics and information security subjects with members of the media. One of our recent interviews (this one explains Android malware issues, we performed a mobile forensic analysis of these malicious apps and tracked their data traffic).
Richmond, Virginia Area : 11357 Nuckols Rd Ste. 1034, Glen Allen, VA 23059 - Phone: (804) 332-5752
Hampton Roads, Norfolk Virginia Beach Area: 20th Street, Virginia Beach VA 23451 - Phone: (757) 716-7135
Northern Virginia/DC Area: 2201 Cooperative Way, Suite 600, Herndon, VA 20171 – Phone: (571) 732-2803
We provide computer forensics expert witness services throughout the United States including Virginia, New York, Texas, Maryland, Washington D.C., Arizona, Florida, and more.
For Virginia residents, we serve most of Virginia's jurisdictions, including but not limited to: Henrico County VA, Richmond City, Chesterfield County VA, Hanover County VA, Petersburg County VA, Fairfax County, Prince William County, Hopewell, Petersburg, Dinwiddie, Quantico, Virginia Beach VA, Norfolk, Chesapeake, Fredericksburg, Stafford, Spotsylvania VA, Hampton Roads, Newport News, Hampton, Williamsburg, Amelia, Powhatan, Goochland, Louisa, Manassas VA, Woodbridge, Charles City, James City, Gloucester, Tidewater, Portsmouth, Shenandoah, Prince George, Sussex, New Kent, West End of Richmond, Glen Allen, Federal Court for the Eastern District of Virginia (Richmond, Alexandria, Norfolk, and Newport News Divisions)
Evidence contained in smartphones, such as iPhone, Android, iPad and others is often essential for civil or criminal cases. Text messages, e-mails, photos, and other similar evidence is often of extreme importance during criminal cases, divorce cases, employment cases, breach of contract, and many other matters.
At AVM Technology, we provide mobile device computer forensics expert services throughout Virginia and throughout the United States.
Computer forensics are often important in determining the extent of data theft. Data theft not always comes in the form of a computer being attacked by a hacker in a far away location. Data theft many times comes from within, from employees taking the company's data and selling it to competitors or taking it themselves so that they can start their own competing business. In a recent case in Virginia, a company claimed certain damages for purposes of the Computer Fraud and Abuse Act (CFAA).
We have been made aware of a new wave of the pizza phishing scam. The email informs you that you were apparentl very hungry and ordered some pizza. Only, if you try to cancel this "mistaken" order, you get, free of charge, a side of malware for your computer. The link goes through kontrollmedia.hu (only one of many domain names used, and begins a sequence of downloading malware to your computer.
These emails can be traced to various IP addresses, mostly associated with spam and various attacks. Some of these IP addresses include:
As discussed in our Pizza With a Side of Malware post, there are a large number of Internet schemes and scams trying to get legitimate users to click on certain links. Many believe that the creators of these scams are after private information stored in your computer. While rue, the scenario is a bit more complicated. They are also after your computer resources. When the "payload" contained in a file of Internet website is downloaded to your computer and the malicious software executes, they control (or own) your computer.
In our computer forensics and Information Security practice, we frequently encounter the need to examine Apple computers. Although tools, such as Encase and FTK can be effective in analyzing HFS+ systems (this is the Mac file system), the examiner has to take other steps. For example, things such as recovering deleted files and creating an image that can be effectively analyzed can be done very effectively by a computer forensics examiner who is familiar with Macs. Why is using a Mac important for examining other Macs? Is a FireWire acquisition useful to cost the imaging time?