Evidence Recovery

Cyber criminals use a variety of techniques to protect themselves and their own data. Therefore, any time evidence in a criminal matter is handled it must be done so with the utmost caution. Over-handling and/or improper adherence to procedure of evidence can taint that evidence, making it inadmissible in court.

It takes a skilled, experience professional to handle evidence for a cyber crime. Any mishandling of evidence can ruin it.

The Input Output Unlimited, Inc. team of experts utilize the same procedures, equipment and software employed by law enforcement agencies of the federal government. We follow strict guidelines when handling evidence, including:

  • Maintaining the chain of custody.
  • Documentation of everything done with the evidence while in our custody.
  • Handling the evidence as little as possible, and only when necessary, so as not to taint the evidence.

Our staff is experienced at interpreting recovered data, including deleted files, reformatted disks, computer tapes, downloaded files, e-mails, computer generated faxes, and internet activity to find the "smoking gun". They avoid the traps that criminals may have setup during the crime, including viruses and booby-traps.

Data Recovery:

Computer crime encompasses not just the theft of data, but also the erasure and destruction of data. Data lost due to mechanical or electronic failure, accidental or intentional erasure, fdisk utility, formatting, file corruption, virus/worm attack, or system malfunctions are commonly recoverable.

Dedicated to providing the best service available, recovery can often be accomplished on-site, or if necessary, at our secure facility.

To assure the confidentiality and security of client hard drives during the recovery process, client hard drives are secured utilizing the same procedures applicable to evidence recovery. When not in use, client hard drives are secured in a container (safe) exceeding U.S. government standards.