What I Do
I run both a Digital Intellegence & Digital Marketing Agency. I help business owners implement brand positioning & de-positioning science to help crush competition & increases the Return On Investment (ROI).
It’s impossible to provide accurate or in-depth opinions, information or advice for you, your brand, case, client, service or company without actually discussing your specific objectives, challenges, and conducting an in-depth review with you.
My mission for every website I work on is to outsmart the competition vs. outspending the competition. Derick Downs uses a proven process that controls the audiences perception in favor away from competitors.
Digital Forensics Services
Digital Marketing Services
I can extract any computer, labtop, etc.
Digital Evidence & E-discovery
We find digital evidence & turn it into E-discovery.
Cell Phone Extractions
I specialize Mobile Extractions of all phones.
We find evidence on your employees as needed.
SEM Search Engine Marketing (PPC)
I specialize in running digital traffic to websites or apps .
Brand Positioning & De-positioning
I use proven methods to influence clients behavior.
Digital Analytics Tracking
I track every action or event that happens on your website.
Website & Mobile App Development
I specialize in running digital traffic to websites or apps .
Need Help With Something?
Google Certifications & Awards
Frequently Asked Questions (FAQ)
What is Digital Forensics?
Digital forensics is the modern day version of forensic science and deals with the recovery and investigation of material found in digital devices. It is most often used in cybercrime situations, including but not limited to:
- identifying leaks within an organization
- assessing any damage occurred during a breach
Using the data collected from electronic devices, digital forensic investigators can stop hackers and other cybercriminals from compromising an organization’s digital infrastructure. They can also assist in recovering lost or stolen data, discover where a specific attack came from and trace it back to the source, and help create a detailed investigative report that can remedy any crime.
The field is spread across a number of subdivisions, all of which depend on the nature of the digital device that is the subject of the investigation, such as:
- computer forensics
- network forensics
- forensic data analysis
- mobile device forensics
Digital forensics and cybersecurity are connected in many ways and provide information to each other. For example, analyzing a breach may produce insights that could prevent future breaches and understand how particular threats work makes it easier for cybersecurity professionals and digital forensics investigators to establish a timeline and provide a direction for the investigation.
Digital forensics is a highly detailed investigative approach that collects and examines digital evidence that resides on electronic devices and subsequent response to threats and attacks. In the world of cybersecurity, Digital Forensics and Incident Response (DFIR) applies forensics to examine cases involving data breaches and malware, among others.
In many cases, digital forensics investigators have a background in computer sciences, which can help them develop the knowledge necessary to understand how virtual networks tick and work with one another. Most importantly, perhaps, they understand the vulnerabilities that exist within these systems and how they can be compromised.
Digital Forensics and the Corporate World
The likelihood of your company having to conduct a digital investigation is quite high. Many threats could be solved with a digital forensics approach, including litigation, data breaches, fraud, insider threats, HR issues and other cybersecurity problems.
Companies that hire a digital forensics professional will have firsthand information about their electronic data and how it may be interpreted in a court of law or by an investigator. The examiner will determine if any data has been altered within the system (which would indicate a breach of some nature). A digital forensic report provides the court with verified details about an incident and when it happened.
Unfortunately, it’s not always outside sources that commit these cyber crimes. Many companies turn to digital forensics experts to investigate members of their teams or for HR investigations. This can provide eye-opening insight into the company’s digital vulnerabilities, both as they pertain to outside sources and those within the business who may not otherwise have access to the system. Key to the investigation is determining whether anyone within the company has violated company policy with regards to the use of any computer hardware or software. That’s why it’s essential for the investigator to have a thorough understanding of operating systems in their entirety.
Companies that lose valuable digital information may also seek the skilled assistance of digital forensics professional to recover lost data from a hard drive that’s been erased. For example, they can trace a hack to its source, uncover valuable evidence that provides information about the culprit, and work in tandem with law enforcement to identify the crimes that have been committed. These people are invaluable to a digital investigation that requires a more in-depth view of enterprise-level tech information.
Derick Downs Can Find the Answers you Need
Research shows that motive and opportunity are the two primary reasons for people to commit crimes. While motive is the predominant factor, recent advancement in technology has changed the landscape for opportunities.
While each case will present its own set of challenges, key considerations in cyber investigations include:
- The ability to identify, collect and analyze droves of electronic documents, databases and other sources of information promptly
- Recognize and retrieve electronic documents that are intentionally hidden, password-protected or encrypted
- The skill necessary to ensure data isn’t damaged or altered during an examination
- The tools to maintain the evidentiary value of the data and the media it’s stored within
Our digital world has made it easier to commit cyber crimes, which has created many challenges related to how to investigate these incidents (e.g., fraud, unauthorized access, theft of intellectual property and sabotage). This has created an environment where a multi-disciplinary investigative approach is required to uncover a solution to these crimes.
Companies that lose valuable digital information may also seek the skilled assistance of a digital forensics professional. The investigator may be able to recover that lost data from a hard drive that’s been erased. They can trace a hack to its source, uncover valuable evidence that provides information about the culprit, and work in tandem with detectives and police officers to solve a case.
For businesses, many of which have or will likely encounter a cyber breach in the near future, the skills possessed by digital forensics professionals are invaluable in investigations that require the ability to decipher in-depth technological information.
What Is A Google Partner?
Achieving Partner status means that your company has demonstrated Google Ads skill and expertise, met Google ad spend requirements, delivered company agency and client revenue growth, and sustained and grown its client base. Partner status gives your company access to a number of benefits, including the Google Partner badge that can be shown on your website and marketing materials. Derick Downs is an active Google Partner with Downs Agency.
What is a GoDaddy Pro?
The GoDaddy Pro program was created to support web designers and developers who use GoDaddy products to build and maintain websites for their clients.
What is the cost to extract cell phones?
Derick Downs can extract data from almost any device. I can recover data from phones that no longer turn on. My forensic services for mobile phones, tablet computers, and other mobile devices are broken up into three Groups. Group A and Group B
My forensic services for cell phones, tablets, and other mobile devices are broken into three Groups. Each Group has a flat rate charge: Group A $400, Group B $1400, and Group C $3000. Group A and Group B costs are per device. The Group C cost of $3500 is for the first device, each additional device has a $900 flat charge. If a client opts for a lower Group and later determines that a higher Group is needed, the additional work can be performed at only the difference in cost between the Groups.
Derick Downs can extract data from almost any device. I can recover data from phones that no longer turn on, have been smashed, and anywhere in between. How much data is recoverable depends on the particular model and Group of damage, or any failure of the device. The flat rate costs assume the device is functioning properly. Additional costs for damaged devices may apply and usually fall in the $300 – $5000 range. The client will be apprised of any such required costs prior to the work being executed. The flat rates don’t include future consultation or testimony which is charged at our standard rates of $375 per hour.
Group A is the Data Recovery Group
This Group recovers most common data on mobile devices, such as text messages, pictures, call logs, etc. This Group is appropriate for general users who need to recover accidentally deleted pictures, old text messages, and things of that nature. Group A is not recommended for producing data to be used in legal matters. For a more complete depiction of what each Group can do, please see the chart below.
Group B is the Electronic Discovery Group
Group B can recover data from many 3rd Party Apps, such as SnapChat, Uber, Lyft, Facebook, Twitter, Slack, Kik, etc. Group B can also recover internet browsing history. Detailed reports about all the data extracted from the phone are provided. These reports include metadata, such as dates and times pictures were taken, dates and times text messages were sent or received, the GPS location of the device at different times, etc. A comprehensive timeline of events that occurred on the phone is provided.
Group C is the Forensic Analysis Group.
In addition to everything provided in Group A and Group B, Group C includes deeper examination of the raw data. Advanced SMS recovery is performed which typically recovers hundreds of additional text messages. Data Relation Analysis and other proprietary tasks are performed. An expert conclusion is formed after a thorough and detailed examination of all data. A formal and professionally written report of the expert’s findings are provided.
|Data Recovery||Electronic Discovery||Forensic Analysis|
|Security / Lock Code Bypassing||x||x||x|
|Advanced Security / Lock Code Bypassing||x||x|
|Recovery of Text Message||x||x||x|
|Recovery of Pictures||x||x||x|
|Recovery of Audio||x||x||x|
|Recovery of Video||x||x||x|
|Recovery of Calendar Entries||x||x||x|
|Recovery of Documents||x||x||x|
|Recovery of Call History||x||x||x|
|Recovery of Contacts||x||x||x|
|Recovery of Files from Memory Card||x||x||x|
|Recovery of Email||x||x|
|Recovery from 3rd Party Apps: Kik, Skype, AIM, etc.||x||x|
|Recovery of Internet Browsing History||x||x|
|Report on all Recovered Data with Metadata (date/time, author, GPS location, etc.)||x||x|
|Report on Timeline of Events||x||x|
|Advanced SMS Recovery||x|
|Data Relation Analysis||x|
|Holmes Digital Investigation Proprietary Analysis||x|
|Professional Report of Expert’s Findings||x|
What is forensic in cyber security?
Digital Forensics is a branch of forensic science which includes the identification, collection, analysis and reporting any valuable digital information in the digital devices related to the computer crimes, as a part of the investigation.
In simple words, Digital Forensics is the process of identifying, preserving, analyzing and presenting digital evidences. The first computer crimes were recognized in the 1978 Florida computers act and after this, the field of digital forensics grew pretty fast in the late 80-90’s. It includes the area of analysis like storage media, hardware, operating system, network and applications.
It consists of 5 steps at high level:
- Identification of evidence
It includes of identifying evidences related to the digital crime in storage media, hardware, operating system, network and/or applications. It is the most important and basic step.
It includes preserving the digital evidences identified in the first step so that they doesn’t degrade to vanish with time. Preserving the digital evidences is very important and crucial.
It includes analyzing the collected digital evidences of the committed computer crime in order to trace the criminal and possible path used to breach into the system.
It includes the proper documentation of the whole digital investigation, digital evidences, loop holes of the attacked system etc. so that the case can be studied and analysed in future also and can be presented in the court in a proper format.
It includes the presentation of all the digital evidences and documentation in the court in order to prove the digital crime committed and identify the criminal.
Branches of Digital Forensics:
- Media forensics
It is the branch of digital forensics which includes identification, collection, analysis and presentation of audio, video and image evidences during the investigation process.
- Cyber forensics
It is the branch of digital forensics which includes identification, collection, analysis and presentation of digital evidences during the investigation of a cyber crime.
- Mobile forensics
It is the branch of digital forensics which includes identification, collection, analysis and presentation of digital evidences during the investigation of a crime committed through a mobile device like mobile phones, GPS device, tablet, laptop.
- Software forensics
It is the branch of digital forensics which includes identification, collection, analysis and presentation of digital evidences during the investigation of a crime related to softwares only.
I partner with the best software in the world
There is a lot of digital evidence out there. Derick can help you access, manage, and control data from cloud sources, social media, and devices. I can store, manage, and control data securly and preserve forensic integrity to help my clients win cases with digital evidence.
” Derick is a dynamic marketing executive with superior technical know how. He makes the magic happen by driving revenue and business growth through his creativity and mastery of web-based technology. Simply put, Derick is a winner. Trust him! “
” Derick is a true force of nature. His unbounded energy, unfailing ability to “think outside the box” and his single minded focus on results is a tremendous asset. I count Derick as one of my most inspirational peers and look forward to every continuing opportunity we have to work together “