Email Forensics & Social Media Forensics

What is Email Forensics?

Email forensic is the analysis and determination of the source and content of e-mail message for criminal evidence purpose.

Email Forensic Analysis:

Email Forensic Analysis: Over 100 trillion emails are sent a year, making it a crucial evidentiary component in nearly every case litigated today. Deleted emails can often be recovered, even if intentionally erased, and metadata, such as email addresses, time stamps, etc., can all be very useful in an investigation as well. Email clients and servers are often full database applications, complete with document repositories, contact managers, time managers, calendars and many other features, all of which might be accessed forensically.

Recovering Deleted Emails: Erasing or deleting an email doesn’t necessarily mean that it’s gone forever. Often emails can be forensically extracted even after deletion. Additionally, it is common for organizations, like banks or brokerage firms, to have retention policies in place, or even email archiving for regulatory purposes, storing email evidence for years in a searchable, retrievable format.
At EADH, we recovere email evidence from computers, email servers and webmail servers, as well as from smartphones, cellphones, tablets, etc. Email is pervasive these days. Often evidence can be recovered from some device or another.
Emails may reside on servers unknown to the user, or on backup tapes that were created during the normal course of business. EADH has a proven track record of using sound forensic techniques and unparalleled industry experience to recover deleted email, calendars, and more, from user’s email clients and email servers.

Social Media Forensics: Is someone harassing you over the facebook, twitter or at any other platform? Is your email account , fb account, twitter hacked ????
” Don’t Worry!!!! “EADH will help you trace the suspect and bring down to justice.
At EADH we do social media forensics helping people get back their hacked accounts, empowering the security of accounts and much more.

© 2015 East African Data Handlers (K) LTD. All rights reserved.