Cyber Forensics/ Computer Crime Analysis (CF)
Crimes committed using computers/computer devices such as desktops, laptops, mobile phones or even major insulations on offices, government, industry, factories, etc. where multiple hard-disks for processing a large amount of information has to be computed which also includes satellite systems that process huge amounts of data highlighting to billions of mobile phones interconnected to the entire world and the airplanes and satellite launch vehicles which carry passengers to the destinations within the globe are to the moon, mars or saturn and not excluding the recent trips to the moon by a few adventurers and billionaires like Elon Musk, Richard Branson and Jeff Bezoz reached the spaceX as a part of space tourism in 2021 making it possible that computers can do wonders which a man has not imagined 6 decades ago. All this became possible with a power of computing devices which can revolutionize the life on the Earth as well as other planets.
Today the miniature computer systems in the form of microchips and sensors are working in servers, pen-drives, mobile phones and host of other devices enabling people to send communications, pictures, texts, videos, audio messages, and conversations connecting the whole world with billions of devices. While a majority of 7 billion people are using these devices for productive purposes, a few million people are using the computer technologies for destructive purposes causing personal loss to the people and property damage to the society across the world by violating the laws of the land for transmitting obscene messages, offensive E-mails, data manipulation, image manipulation, fake messages, hacking, human trafficking, false websites, data theft, video manipulation, speech/voice manipulation and several other offences committed through sending communications in the cyber space.
Such violations caused applying internet as a source of technology and using any kind of computed device that can be operated with fingers or voices or other commands from any place to any place through the space are known as cybercrimes.
To trace, track and trail behind the criminals, Truth Labs Cyber Forensic & Audio Video division have several technologies in the form of audio authentication/voice identification/speaker identification/video authentication/image authentication/facial recognition/facial reconstruction/fake video analysis/video enhancement/CC TV footage analysis/photographic verification/all record authentication/email analysis or authentication/data theft analysis/intellectual property (IT theft)/message authentication/whatsapp message authentication/email sender tracing/text message recovery/hard-disk recovery/data back-up/mobile phone data recovery/cloud forensic authentication/illegal data transfer/mobile hacking/identity theft and so on as well as issuing 65B certificate for the primary data contained in the host of devices that are brought to Truth Labs for verification.
The types of cases that can be handled by the Cyber Forensics & Audio Video division includecheating, theft, infidelity, family disputes, business litigation, slow squad theft, unauthorized access, illegal trade, money laundering, blackmailing, harassment, murder, rape, kidnaping, extortion, dating services, digital gambling and etc.