

Secure acquisition from, and imaging of digital sources:
- Desktop computers
- Laptop computers
- Hard drives
- Flash drives
- Cell phones
- Tablets
- Cloud back-ups
- Emails
- Drop box
- Identify Users
- Find Evidence of Remote Access
- Internet Chat History
- Applications
From computers/hard drives/flash drives we can often collect:
- Emails and deleted emails
- Pictures and videos/deleted pictures and videos
- Files and deleted/erased files
- Internet search history
- Hard disc recovery
- Access and usage data
- Temporary files
- Logs
- Background Activity
- Geo Locations
- Hotspot Connections
- Wi-Fi Connections