Lie Detection
- 1. Truth Verification
- 2. Extraction of repressed / Hidden knowledge about a fact
- 3. Statement analysis
- 4. Loyalty Check
Documents and Signature Verification
- 1. Authenticity of the handwriting and signatures
- 2. Examination of Anonymous / abuse letters
- 3. Detection of forgery
- 4. Fixing Authorship of handwriting on unusual surfaces
- 5. Document Alterations / Obliterations / Fraudalences
- 6. Training
Fraud Investigation
- 1. Financial fraud investigation
- 2. Theft investigation
- 3. Fingerprint investigation
- 4. Crime scene investigation
Network Related
- 1. E-mail Tracking
- 2. IP Tracking
- 3. E-mail Authentication
- 4. Web Security Audit
- 5. Server analysis
- 6. Router analysis
- 7. Network packet sniffing
Forensic Auditing
- 1. Credit Decisions
- 2. Investigation Decisions
- 3. Income & Expenditures
- 4. Violation of Regulator's Guidelines and prescriptions
- 5. Unlawful activities
Device Related
- 1. HDD data recovery
- 2. Examination of computer data tampering
- 3. Extraction of deleted data mobile forensic
- 4. Physical and deleted data
- 5. Pictures, Screenshots
- 6. GPS data Password
- 7. Audio and Video files
- 8. E-mail / SMS / Whatsapp
- 9. All application related data, Installation and uninstallation logs