Computer Forensics is not a new science to us: we have been engaged in providing computer and mobile phone forensics to police forces and corporate clients for more than a decade, working to the rigorous standards demanded by judicial criteria for admissible evidence.
As technologies evolve within the digital forensics environment, the synergy between devices closes and the demands on the analysts increases, whether it’s in relation to a laptop, PDA, mobile phone or simply a USB key.
We can advise on the best ways in which to undertake an analysis to meet clients wishes and deliver any results in a clear and concise manner for the desired forensics forum.
Typical examinations can involve all elements of the magnetic media, including file space and free space and could cover such elements as:
- The recovery of deleted data
- Computer activity
- Internet history, including any relevant web sites visited
- File access and possible transfer
- Activity associated with adding, altering, deleting or concealing material
- Data encryption
- Password Cracking
Our practices and methodology have been evolved over time and comply to relevant standards in relation to:
- On-site seizure and preservation of data
- Analysis and investigation of data
- Presentation of evidence
- Advice on the preparation of requests for discovery and disclosure
These services have wide-ranging applications for both corporate entities and governmental, including police, agencies. The evidence we have recovered has proved invaluable to clients in the preparation of criminal prosecutions and civil actions, but it has an equally useful role to play in simply tracking employees’ activities.
It is worth remembering that every investigation that identifies miscreants will necessarily confirm the good faith and reputation of the majority. Employees, too, need to have confidence in the integrity of the systems and the people they work with day to day.
Our expertise in this area has lead to the development of the first on-line computer forensic case management system using cloud technology called DiscTrack.
As with similar companies, we utilise a wide range of industry standard tools and techniques. However, to enhance this range we have also developed our own in-house software. This provides a comprehensive suite of tools allowing us to achieve and maintain the highest standards.
Whether hidden folders, unallocated disk space, deleted, encrypted or damaged files. Any evidence found is documented by our experts in a simple and easy to understand manner. Suitable for all legal forums whether criminal or civil, including discovery, depositions, or litigation.
Where applicable all investigations are undertaken in accordance with current guidelines, such as ACPO (Association of Chief Police Officers) .
Irrespective of the type of investigation, we employ standard procedures to ensure both the continuity of evidence and secure storage of material, including:
- Exhibits are correctly documented and verified in accordance with INDIA evidential standards, prior to acquisition.
- Images are securely stored until analysis.
- Acquired data is verified during the forensic process to ensure the integrity of data as working copies, back-ups and for disaster recovery purposes.
- Where applicable evidence will be evaluated by two analysts to ensure the accuracy and quality of findings.
- Clients are advised and kept up to date with the progress of cases, so that nay modifications to requirements can be adopted at the earliest opportunity.
- All procedures are recorded and audited using in-house case management software DiscTrack.
- The entire process, has been audited and approved by Police Forces.
- Dual verification for the validation of findings is performed where needed.
- Reports are provided for their audience in both technical and non-technical forms.
The company maintains a repository of hardware, software and firmware in order that a full range of media, whether new, proprietary or rare can be analysed.
For more Information please see