JW Cyber Forensics, LLC

Data Forensics and Retrieval

Home | Data Forensics | Data Retrieval | About Us | Why Use Us?

JW Cyber Forensics focuses on collecting and analyzing data from computer systems to track user-based activity that can be used internally or in civil/criminal litigation. We posses a firm understanding of computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. Forensic investigators must master a variety of operating systems, investigation techniques, incident response tactics, and even legal issues in order to solve challenging cases. To this end, we have been exposed to critical forensic analysis techniques and tools in a hands-on setting for both Windows- and Linux-based investigations. WMF has examined various investigation methodologies and techniques, discovering new places to find evidence and discover the tracks of a cyber criminal or hacker, who is trying to stay hidden inside a network. We use the best tool for the job, whether it be AccessData’s FTK, Encase, X-Way Forensics Suite, Sleuthkit, Foremost, and the HELIX3 Pro Forensics Live CD and HELIX Live Response.

John is comfortable in the computer world, having been a programmer as well as a maintenance technician on Ohio Scientific mini-computers, in another life. As an adjunct professor at The Corcoran College of Art and Design in Washington, DC and as a Certified Editor and Trainer for Apple’s Final Cut Pro editing software, John has proven to be an effective communicator and instructor.

John is currently an adjunct professor with Utica College in Utica, NY and has taught for the new EC-Council University in Albuquerque, NM teaching CyberSecurity and Forensics courses. He is also a certified instructor for AccessData’s Forensic Tool Kit software suite.

Thanks for visiting and if we can be of any help to you with your Forensic investigations, please contact us.

John Wulff
JW Cyber Forensics, LLC
FEIN: 27-1368511


Home | Data Forensics | Data Retrieval | About Us | Why Use Us?

© 2010 to 2017 JW Cyber Forensics, LLC  EMAIL