Cyber laboratory deals with all types of forensics services related to any sort of cyber-crime, digital devices (such as computers, laptops, android devices, smart and basic phones, hard disks, CCTV cameras, etc.), and all sort of digital media. The major tasks performed are identification of forgeries and authentication of audio, video, and image files, enhancement of audio recordings and video files, extraction of video from CCTV devices, transcription of the audio of different languages, speaker identification, data recovery from different storage devices, recovery of calls, contacts, messages and media files from mobile phones, WhatsApp recovery, cloning of hard drives, and other cyber services, etc.
Our well-qualified and experienced experts work for the completion of the tasks with utmost dedication. With their expertise, following standard protocols, our experts analyze cases carefully and provide their unbiased opinion and forensic report.
We at Sherlock institute of forensic science retrieve, enhance and investigate numerous digital evidence such as audio, video, messages, and images. The investigation process starts with the extraction of data from a given device, if the data is already available, a direct examination or analysis is done.
Unlike other kinds of evidence, this digital evidence provides a real-time witness account of the crime. As in today’s world digital devices are everywhere which usually brings out a clear picture of what has occurred. This helps investigators, lawyers, and jurors a clear view of how to conduct their duties.
Our lab aims at attaining the best of results by performing various examinations for law enforcement and for private clients. In order to do so, we have equipped our lab with the latest software and the best of experts from all across- the country. Enabling our laboratory with the best of minds, to get the result quickly and efficiently.
Our organization provides services of Audio Verification which includes an examination of the audio recordings for the presence of tampering or addition or deletion from the original file with audio enhancement (if required). Audio may be recorded in mobile phones, sound recorders, microphones, etc. Experts examine the recordings thoroughly by using scientific tools and techniques and give an opinion on whether the recordings are genuine or tampered with. The exact timings where the tampering is present are also mentioned in the report.
Our organization provides services of Video Verification which includes an examination of the video recordings for the presence of tampering or addition or deletion from the original file with video enhancement (if required). Video may be recorded in CCTV cameras, Spy cameras, mobile phones, etc. Experts examine the recordings thoroughly by using scientific tools and techniques and give an opinion on whether the recordings are genuine or tampered. The exact timings where the tampering is present are also mentioned in the report.
Our Organization deals with the transcription of audio and video file which include the dialogue along with stutters, false starts, and sounds. Experts listen to the audio and video samples carefully at different levels and write exactly what they listen.
Speaker Identification/Voice Matching Analysis
Our organization provides the services of Speaker Identification which includes a comparison between the Questioned and Specimen Voice sample, identification of the person’s voice, comparison between two unknown voice samples, etc. Experts examine the questioned voice sample with the specimen voice sample of a suspected person by using voice analysis tool, spectrographic analysis and also provide opinions on the basis of analysis performed.
The organization provides the service of Photograph Verification which includes the examination/verification for the presence of doctoring/tampering and any manipulation from the original one. They play an important role in many cases like the Extra Marital Affair cases, document verification, Fraud Case, Manipulation in ID cards, and other digital evidence. Our Experts examine the photographs by using scientific methods and techniques. The photograph samples are examined by finding out the exact pixel to pixel formation of the photograph and finding that the submitted photograph sample is genuine.
Photograph Recognition/Face Matching
SIFS provides the service of Photograph Recognition/Photograph Matching including the various cases like property will, Fraud cases, ID Cards, etc. Our expert is analyze thoroughly and verifies whether the provided photograph samples are of the same person or not.
Mobile Forensic Investigation
Services of Mobile Forensics include mobile data extraction, deleted data recovery, WhatsApp data extraction, mobile data indexing, and much more. Expert extract the data from the electronic evidence like Mobile Phones, Computer, Optical Media, Hard Disk, USB Flash Drive, Digital Camera, etc. Our experts use leading mobile forensic tools for data extraction and recovery and provide a detailed report of analysis. They also provide opinions if any link can be established between the crime and the accused. The extracted/deleted data is provided in storage media.
Our organization provides the service of Email verification which includes the verification for the presence of legitimate/modified from the original one. It can be very helpful in civil or criminal cases. Our organization can help you to prove the authenticity of the emails. Expert analyzes the submitted emails by using scientific parameters and give an opinion the provided emails are genuine or fake.
Encase: Encase is a computer forensics tool provided by the Guidance Software, which is traditionally used for recovering evidence from seized hard drives. It allows in-depth analysis to collect evidence such as search history, pictures, windows registry, and documents, etc. It is also used for forensic Imaging.
Cellebrite UFED: Universal Forensic Extraction Device (UFED) is a data extraction tool provided by an Israeli company Cellebrite. It uses an integrated SIM and directly extracts data onto an SD card or flash drive. It can break codes, decipher encrypted information, and can also acquire hidden and deleted data. It maintains the integrity of digital evidence.
Write Blocker: Wright Blocker is a tool give gives read-only access to data storage devices without compromising their integrity. It may be a hardware or software tool. We can extract, analyze and control data from the storage device without altering and destroying data present in the device. It denies writing to the storage devices.
Data Recovery Tool: Data recovery tools are used to recover lost, corrupted, damaged, or deleted data from the devices. Most often the data is retrieved from USB drives, HHDs, SSDs, CDs, DVDs, and other such electronic systems. For this process, various data recovery tools are used such as Recuva, Stellar Recovery, MiniTool Partition Recovery, etc.
Mobile Forensic Tools: Mobile forensic tools are used for data acquisition from mobile devices and their associated media. Data can be gathered through Logical extraction as well as Physical extraction. Data collected from a mobile device includes calling records, contacts, images, audio, videos, WhatsApp chats, emails, etc. Some of the tools most commonly used tools include MobiKin, MOBILedit, Oxygen Forensic, etc.