
UZMAN GÖRÜŞÜ RAPORU

Areas of expertise

Servers, Computer Systems Review
There are concepts that we need to classify under the heading (Computer Forensics). Identifying and obtaining the LOG information of the users produced by the computer systems or software used, of all kinds of information objects, consisting of sound , image , data , information or a combination of these, stored in electromagnetic and electrooptical media or transmitted by these media, in a way that will serve as digital evidence in court , It is the whole of the work of keeping, examining and presenting to the court.

Mobile phone
Mobile devices are devices used by almost every individual today. It is becoming an integral part of our lives day by day. Thanks to the applications running on these devices, many actions in our lives become easier, which has pushed us to use mobile phones. Since it is so much a part of our lives, Mobile Phone Examination has become of great importance in litigation processes.
So, how safe are the applications we use? What permissions do we give to the applications we use? What areas can the applications and software we use access on our mobile phones? The answers to many questions like these are reported at the end of the Mobile Phone Review.
With the examinations carried out by our Forensic IT experts, important data in the SIM Card, internal memory and external memory cards are examined and reported.
Located in the device;
SMS messages
Social media applications
whatsapp
Chat applications
Skype
messenger

Social media
We call social media the areas where we can expand our photos, location information, mood, identity information, contact information, and instant status with numerous parameters.
We carry out our investigations by considering the actions taken on the phones, tablets or computers being examined or through different accounts.
Facebook
Instagram
Telegram
twitter
YouTube
linkedin

Camera Recording Review
Image Review is basically like doing a technical autopsy of an image. In today's world, the images obtained are accepted as evidence in courts as forensic images. But of course it is possible for images to be manipulated and distorted. For this reason, analysis in the right hands is critical for the process to proceed correctly.
Proof of the accuracy of the images
Whether any editing or manipulation has occurred on the images.
Image enhancement and repair
Shorthand

Audio Recording Analysis
By recording the sounds and analyzing these records using software and hardware, the process of separating the sounds, that is, Voice Recording Analysis, is carried out.
These processes are carried out as a result of both eliminating the noises in the sound recordings and adjusting the correct frequencies on the sound.
With the human ear, we can hear sounds that are close to each other as if they were the same.
Has editing been done on the sounds we hear?
Does the voice really belong to that person?

Cryptocurrency Analysis
In essence, cryptocurrencies are decentralized digital currencies designed to be used generally over the internet. Launched in 2008, Bitcoin was the first cryptocurrency and remains the largest, most influential, best-known cryptocurrency. In the decade since, other cryptocurrencies such as Bitcoin and Ethereum have offered a digital alternative to money printed by governments.
With the increase of this digital currency, there has been a serious increase in cryptocurrency fraud, depending on the platform used, phishing emails, etc. We work on many different issues, such as the analysis of accounts seized from links such as.