Technical Resource Center is a full-service Computer Forensics Investigation Lab.
We assist attorneys, corporations, and individuals with computer evidence collection, investigations, and data recovery. We have locations in Los Angeles, California and Orlando, Florida and provide services throughout the United States.
Computer Forensics is the use of specialized techniques for the preservation, identification, extraction, authentication, examination, analysis, interpretation and documentation of digital information. Computer forensics comes into play when a case involves issues relating to the reconstruction of computer system usage, examination of residual data, authentication of data by technical analysis or explanation of technical features of data and computer usage. Computer Forensics requires specialized expertise that generally goes beyond normal data collection and preservation techniques available to end-users or system support personnel.
Chain of custody is the record of the custodial history of evidence.
Chain of Evidence or authentication is the record of the collection, processing and analysis of digital evidence. It proves that the presented evidence is unequivocally derived from the acquired digital information.
A forensic image (sometimes called a forensic copy) is an exact bit-by-bit copy of a digital device (hard drive, USB device, cell phone, etc.) including active data, slack space, unallocated space (or unused space). We use court approved, forensic tools for making these images. Our tools produce authentication information, called a hash value, to ensure the integrity of the image.
A hash value, commonly referred to as an MD5, SHA-1, or SHA-256 hash (based on the algorithm used to produce the hash) is used to authenticate digital evidence.
MD5 Hash Example: e6196e1b4f0d1535244eaab534428542
A hash value is a mathematical algorithm produced against digital information (i.e. a file, a physical disk, or a forensics image) thereby creating a digital fingerprint for that information. It is by purpose a one-way algorithm and thus it is not possible to change digital evidence, without changing the corresponding hash values. In other words, if the hash value of a file has not changed, the file itself has not changed.
CCE - Certified Computer Examiner - International Society of Forensic Computer Examiners (ISFCE)
CISSP - Certified Information Systems Security Professional - International Information System Security Certification Consortium (ISC)²
CFE - Certified Fraud Examiner - Association of Certified Fraud Examiners (ACFE)
CHFI - Computer Hacking Forensic Investigator - EC Council
CEH - Certified Ethical Hacker - EC Council
EnCE - EnCase Certified Examiner - Guidance Software
ACE - AccessData Certified Examiner - AccessData Group
Certified ProDiscover Examiner Instructor - Technology Pathways
Certified XRY Physical Mobile Phone Examiner - MSAB
Licensed CA Private Investigator #28170
Licensed GA Private Detective Agency #PDC002261
Licensed GA Private Detective #PDE047488