Email:
Makarand Wagh
/
Santosh Wagh
+91 9702823777 / +91 9821256993
Email:
[email protected]
[email protected]
Home
About Us
Digital Forensics
Personal / Company Data Protection
Computer Forensics
Mobile Forensics
Cloud Forensics
Email Forensics
Cyber Crime Investigation
Forensic Data Recovery
Audio Visual Forensics
Malware Analysis
E-Discovery
Cyber Security
Patrol DLP
Gap Analysis
Data Flow Structure
SOP's
Vulnerability Assessment
Penetration Testing
Network Penetration Testing
Web Application Penetration Testing
Mobile Application Penetration Testing
System Hardening
Security Audit
Darknet Intelligence
Techno legal Consultancy
POSH
Forensic Audit
Document Analysis & Authentication
Internal Data Theft Investigation
Intellectual property theft
contact
Cyber Crime Investigation
home
Cyber Crime Investigation
Cyber Crime Investigation
Cyber Law Consulting
Carries out further such Crime Investigations:
Computer Fraud Investigations:
Account data from online auctions
Credit card data
Accounting software and files
Databases
Address books
Digital camera software
Calendar
Email, notes and letters
Chat Logs
Financial and asset records
Customer information
Child Abuse and Pornography Investigations:
Chat logs
Images
Digital camera software
Internet activity logs
Emails, notes and letters
Movie files
Games
User created directory and file names
Graphic editing and viewing software which classify images
Network Intrusion Investigations:
Address books
Internet protocol address & usernames
Configuration files
Internet relay chat logs
Emails, notes and letters
Source code
Executable programs
Text files and documents with
Internet activity logs usernames and passwords
Homicide Investigations:
Address books
Telephone records
Emails, notes and letters
Diaries
Financial asset records
Maps
Internet activity logs
Photos of victim / suspect
Legal documents and wills
Trophy photos
Medical records
EMail Threats, Harassment and Stalking Investigations:
Address books
Internet activity logs
Diaries
Legal documents
Emails, notes and letters
Telephone records
Financial asset records
Victim background research
Images
Maps to victim locations
Narcotics Investigations:
Address books
False ID
Calendar
Financial asset records
Databases
Internet activity logs
Drug recipes
Prescription form images
Emails, notes and letters
Software Piracy Investigations:
Chat logs
Software serial numbers
Emails, notes and letters
Software cracking utilities
Image files of software certificates
User created directories and file names
Internet activity logs which classify copyrighted software
Telecommunication Fraud Investigations:
Cloning software
Emails, notes and letters
Customer database records
Financial asset records
Electronic serial numbers
Internet activity logs
Mobile identification numbers
Domestic Violence Investigations:
Address books
Financial asset records
Diaries
Telephone records
Emails, notes and letters
Financial Fraud and Counterfeiting Investigations:
Address books
Financial asset records
Calendar
Images of signatures
Currency images
Internet activity logs
Check and money order images
Online banking software
Customer information
Counterfeit currency images
Databases
Bank logs
Emails, notes and letters
Credit card numbers
False identification