Take advantage of FRONTEO's forensic investigation!
Forensics(Forensic)?
The word ``forensic'' originally refers to forensic investigations carried out by the police in criminal investigations and investigations to find legal evidence, as well as investigations to collect and analyze evidence. In the IT field, forensics refers to collecting information from computers and other terminals and networks, understanding and clarifying the damage situation, and searching for legal evidence and clues.
What is a forensic investigation?
A forensic investigation is an investigation conducted when an incident such as internal fraud or information leakage occurs. In 2006, when it was used in the investigation of the Livedoor incident, the popularity of forensic investigations, especially digital forensics, suddenly rose. Digital forensics is also carried out by third-party committees in cases of scandals that cause public uproar. Digital forensics is indispensable for elucidating crimes that utilize digital methods, such as computer crimes and data falsification.It thoroughly analyzes information obtained from digital devices related to an incident and uncovers the truth. It plays a role in leading to clarification.
Service flow
STEP 1
Hearing
Please tell us the details of your trouble (incident) by phone or using the inquiry form. After hearing your requests such as the target of the survey, the number of vehicles, survey items, deadline, etc., we will create a survey plan and estimate the survey cost.
*If there is a high degree of urgency, we will provide a simple estimate and immediately implement the minimum necessary measures (data protection, etc.) after approval. *We will conclude a non-disclosure agreement (NDA) before conducting a detailed hearing.
STEP 2
data security
We will safely preserve all data, including deleted data, from PCs, smartphones, and tablets to be investigated, including various documents, emails, chat history, etc., in a format that cannot be altered. With the know-how we have cultivated from our experience in over 2,000 digital forensic investigations, we are able to preserve data with "international standards of evidence," which is also useful in U.S. lawsuits.
STEP 3
Research
Investigate and analyze maintenance data using our in-house developed AI "KIBIT." Find relevant evidence in large amounts of data. Even if data is deleted or encrypted to destroy evidence, it is possible to analyze the data in various ways, such as restoring deleted data or decrypting password-protected files. In addition, FRONTEO's advanced technology allows us to replace the original data with irregular character strings so that it cannot be read by third parties, even if the data is located in regions such as the United States or South Korea, where there are strong restrictions on taking information out of the country. It is possible to safely acquire and investigate data by using technology (hashing).
STEP 4
Review
Our reviewers scrutinize highly relevant emails and documents derived by our in-house developed AI "KIBIT" and discover "truly relevant evidence." We have assembled a team of highly skilled reviewers, including those with bar qualifications, law school graduates, law school graduates, and people who are fluent in English, to ensure both speed and high quality even within a limited work schedule. .
STEP 5
report
Based on the findings, we will create an "international standard report" that can be submitted in a U.S. lawsuit. In addition, when reporting, we will hold a results debriefing session and provide detailed verbal explanations.
▼ Example of report content
・Regarding the contents and results of the investigation based on the investigation request, and the process leading to the results
・OS information (version, boot history, account information, etc.)
・List of connected devices such as USB memory
・Internet browsing history, file access history, etc.
FRONTEO investigation case
We would like to introduce some of our more than 2,000 forensic investigation results.
FRONTEO's strengths
Technology
Unlike using other companies' products, the software is developed in-house, so you can flexibly customize your own system or special data.
Security environment
FRONTEO strives to build and maintain a thorough security environment so that customers can entrust their important data with peace of mind.
Correspondence ability
We combine the latest technology, including our proprietary AI engine KIBIT, with the research capabilities we have cultivated over many years. Utilizing our legal and internal control know-how, we provide early detection and resolution of problems to a wide range of companies.