OUR SERVICES

BERRY B GROUP CO., LTD. | เราคือผู้บริการเก็บหลักฐาน และ ตรวจพิสูจน์หลักฐานพยานดิจิทัล

บริการตรวจพิสูจน์หลักฐานพยานดิจิทัล พร้อมให้คำปรึกษาในชั้นศาล

         หากต้องรวบรวมหลักฐานหาผู้กระทำความผิดในการดำเนินคดี เพื่อนำไปใช้เป็นหลักฐานในชั้นศาลตาม Chain of custody โดยผู้มีประสบการณ์และเชี่ยวชาญด้านการตรวจพิสูจน์หลักฐานดิจิทัล

        หากเกิดเหตุขัดข้องด้านความมั่นคงปลอดภัย และต้องหาผู้กระทำความผิดอย่างชัดแจ้ง คงมีแต่การพิสูจน์หลักฐานพยานดิจิทัล พร้อมรวบรวม ตรวจสอบ วิเคราะห์และออกรายงาน เพื่อนำไปใช้ระบุผู้กระทำความผิดด้านความมั่นคงปลอดภัยสารสนเทศ รวมถึงการเป็นพยานในการทำงานเพื่อนำไปใช้เป็นหลักฐานในชั้นศาล ตาม Chain of custody โดยผู้มีประสบการณ์และเชี่ยวชาญด้านการตรวจพิสูจน์หลักฐานดิจิทัล

โดยผู้เชี่ยวชาญ และ เป็นไปตามมาตราฐานสากล

COMPUTER | MOBILE FORENSICS

Data Analysis

  • Forensic image analysis
  • Malware analysis
  • Email analysis

Data Collection

  • Mobile devices
  • Computer (Windows, Mac, Linux, Server)
  • Custom Image (Email, Specific Files)
  • Extract data on Cloud
  • CCTV data extraction

Digital Forensic report for Legal Process

  • Statement report
  • Expert witness
  • Legal assistant

Other Service

  • Digital Forensics Consultation
  • Social Investigations (New)
  • Digital Forensics Training
  • Cryptocurrency Investigations 
  • Restores the chronology of an event for information systems
  • Sweeps for any indication that unauthorized access has been gained
  • Extracts and analyses communications (email and instant messaging)
  • Conducts searches according to pre-defined criteria
  • Initiates forensic investigation of mobile devices
  • Explores databases
  • Investigates skimming devices
  • Probes network and RAM dumps
  • Searches for evidence of malware
  • Inspects the contents of encrypted archives
  • Compares software for any indication of plagiarism
  • Guarantees the integrity of digital data media and its contents after seizure

COMPUTER | Mobile FORENSICS

       Forensic investigations are a core component of efforts to tackle a breach of security. These investigations yield results by examining data media that can provide clues about the circumstances of an incident and the culprits. Findings derived from forensic investigations by experienced independent specialists can be submitted as evidence.

ปรึกษาฟรี | CLICK ME!

DIGITAL EVIDENCE RECOVERY

       Evidence is collected by means of digital data. This ensures that the process is legally relevant and conducted in an appropriate manner, while providing a copy of the information for future investigation. Not only is this necessary in order to adequately analyze the incident but it will also assist with any future criminal case.

ปรึกษาฟรี | CLICK ME!

DIGITAL EVIDENCE RECOVERY

  • Preliminary consultation
  • Assessment of the incident scene by a specialist in a timely manner
  • Accumulation of information relating to the incident and identification of storage sources for evidentiary data pertinent to the attack
  • Accumulating evidence in the form of digital data and documenting it in accordance with the requirements of Russian law
  • Preparing the necessary paperwork
  • Consulting with suitably qualified personnel in order to agree appropriate measures for incident counteraction and damage mitigation
  • Forensic specialists working on an incident collect the necessary digital evidence by seizing and copying the data. At the end of the investigation, the client is issued with the following:

    • Sealed digital data media in a format that is suitable for use in a criminal prosecution
    • Relevant data obtained from the forensic investigation which can then be used as the basis for an internal inquiry of the incident
    • A set of documents confirming that the digital data media was seized and copied

OUR SERVICES

      The purpose of this service is to restore deleted or corrupted data stored on various media (hard drives, flash drives, and others). Loss of important information and its inaccessibility via digital media can either occur because of an accident (the result of damage, flaw, or improper usage), or a deliberate move by criminals to destroy certain data which can be used as digital evidence of a crime. 

Terms

       We and its staff operate in accordance to the agreed contract terms and guarantee never to disclose confidential information to any third-party. Before data recovery is begun, the specialist conducts a complimentary device diagnostics service. The results of this test provide an indication as to how much data may be successfully recovered as well as the likely costs that will be incurred.

Results

      The client receives the recovered files on suitable media. Access to the latest equipment means that We is well equipped to recover data, carry out an investigation, identify the causes of media failure and compile a report summarizing the work undertaken.

Performs

  • Expert consultants are on hand in order to recovery data
  • Any type of deleted files can be restored (documents, photos, videos, etc.)
  • This includes data corrupted as a result of a virus infection and logical damage of the file system
  • Data stored on non-functioning devices can also be recovered, as can files damaged due to a software error
        Malware is one of the key threats deployed by cyber criminals. These programs are able to either copy vital information from computers or even assume remote control of computers. If it is suspected that malware is present, we conducts an investigation in order to determine the algorithms, functionalities and network interactions of software.

Results

Following the investigation conducted, the client receives formal notification of what has been detected in accordance with the prevailing legislation, including:

  • Depiction of the malware’s algorithm, its functional capabilities and interactions with the network
  • An account of additional software modules and configuration files loaded by the malware from the Internet
  • Advice on how best to use this information for the purposes of investigating the security breach

Performs

  • Determines malware’s algorithms
  • Deriving the list of control servers from the malware
  • Documenting the functional characteristics of the malware (for example, its interaction with online banking systems)
  • Exposing and documenting the malware’s capabilities forpreventing forensic investigation and detection
  • Making a log of amendments introduced to the system registry and the overall file system by the malware
  • Noting other malware informational activities that may be of relevance in a criminal case
  • Analysis of configuration files as well as other software modules loaded by the malware from the Internet (if necessary)
  • Correlating the information that is obtained with samples obtained for other malware

       Shortly after the investigation begins, the client is provided with details of the botnet including the geographical location of the perpetrator of the DDoS attack. Based on this information, the client will then be able to assess the feasibility of pursuing legal action or criminal prosecution. In the event that the attacker seeks to extort from the client, We will compile the necessary information so as to pursue a legal prosecution. Compiling the appropriate documentation in a professional manner will make it easier to track down the offender.

  • DDoS Attack Investigate
  • Gauges the territorial distribution of the botnet
  • Pinpoints the control centre of the botnet
  • Amasses evidence to confirm which botnet was responsible for the attack
  • Locates and identifies the person responsible for the botnet
  • Composes the relevant data and evidence for presentation to the police or legal authorities

Description

    We determines the identities and physical locations of the persons controlling the botnet or servers used in the DDoS attack. The identity of the attack’s initiator may only be determined after the successful identification of the executor. At the conclusion of all activities, the client is presented with a comprehensive report.

Results

       Only once the details of the executor have been revealed is it possible to then expose the identity and geographical location of the offender controlling the botnet or servers used in the DDoS attack. Not only is We able to identify these persons, the company then presents an wide-ranging report to the client which details the restored event timeline; analysis of each stage of the investigation along with the relevant documentary evidence; the identity and geographical location of the executor of the DDoS attack; as well as advice regarding the possibility of further legal proceedings.

Because each attack is unique, the incident response must be tailored accordingly. Therefore, we provide a suitable cyber intelligence platform to focus on data acquisition for each case.

  • Actionable Terror Intelligence Gathering
  • Theft of electronic funds
  • Enhanced Due Diligence & Risk Management
  • Criminal Investigations & Forensics
  • Confidential data leaks
  • National Security
  • Targeted virus attacks
  • Solution for Government against profanity and obscenity
  • Social Network Surveillance
  • Online Application Interception
  • Email Interception
  • Lawful Interception Systems
  • DDoS Attack Investigate
  • Gauges the territorial distribution of the botnet
  • Pinpoints the control centre of the botnet
  • Amasses evidence to confirm which botnet was responsible for the attack
  • Locates and identifies the person responsible for the botnet
  • Composes the relevant data and evidence for presentation to the police or legal authorities

Performs

  • Provide training and solution to all organization
  • Rapid response to fashion a suitable action plan and supervise its implementation
  • On-site visit from qualified expert if deemed necessary
  • Timely removal of critical vulnerabilities
  • Forensics analysis
  • Analysis of malicious software
  • Data Source Integration
  • Development of cyber intelligence center scheme and other recommendations

     We can said it from one to one phone call to SMS text messages, social media, and unlimited of internet applications available online, Government organization are often being espionage or spying, making each government agency difficult to indentify threat. We offer an intelligence system for Government or law enforcement agency to collect, monitor and identify all threats and target ahead in advance.

  • Identified Location: Time/Date/Relative being at which point of location.
  • Movement Logged History: Day and time that already happened recall back.
  • Ring Leaders: Main key of mastermind, partners, roles of crime associations, present in connection chart
  • Mix Protocol: Support all forms of communication Technology
  • Contact List: People they use to contact and real time monitoring call
  • Website Logging: Website they visited
  • Email: Email content, Password, FTP, Server and many more credential.
  • Device Identified: Separate modem device, smart phone, mobile phone, tablet, laptops, pc
  • Filtration: Filter unwanted application, website, downloads movie, file, emails, and more
  • Keywords alert: To identified targeted keyword.
  • Voice Alert: identify voices of male/female/keywords they speak, numbers and caller.

Results

  • Evidence of threats is collected in a manner conducive defense
  • Real time Threat alert through incident report
  • Advice offered for improving information security protection in future
  • Accelerating deep-dive investigations and forensics lifecycle
  • Perform enhanced due diligence of subjects of interest using the repositories with targeted terror intelligence
    There are two distinct components to auditing and consulting: the preventive element and the post-incident division. ‘Preventive’ is concerned with analysis of a company’s potential exposure to security breaches and aims to ensure that incidents do not occur. Meanwhile, ‘post-incident’ is concerned with assessing realized security incidents and revealing flaws in the existing security system. Companies use this information to reinforce their IT security provision.

Financial services workers and IT security.

  • In response to increased concerns about the threat posed by online banking fraud, we consultants have designed an IT security architecture specifically for those working in financial services. Many of the threats in this area stem from ill-suited security systems and a lack of awareness of the problem among employees. we architecture can be deployed either in isolation or as part of a pre-existing security system. Crucially, this package incorporates an educational element, teaching finance employees about the nature of online fraud. This is important because it improves employees’ abilities to detect threats and respond accordingly.

Performs

  • Intense auditing of IT security
  • Audit of  IT security control systems
  • Ensures compliance with IT security standards
  • Reveals any vulnerabilities to fraud via the online banking system
  • Assesses the security capabilities of the IT infrastructure and the processes by which financial services workers operate
  • Evaluation of vulnerabilities and undertaking penetration tests
  • Implementing systems for IT security control and business continuity:
    • IT security monitoring and maintenance systems
    • Computer security incident control systems
    • Design of logging system

IT security is also a pressing concern for small and medium sized enterprises (SMEs).

DATA RECOVERY

      We and its staff operate in accordance to the agreed contract terms and guarantee never to disclose confidential information to any third-party. Before data recovery is begun, the specialist conducts a complimentary device diagnostics service. The results of this test provide an indication as to how much data may be successfully recovered as well as the likely costs that will be incurred.

ปรึกษาฟรี | CLICK ME!

Hotline: 095-789-8287