Computer Forensics

At DiskEng all our computer forensic specialists are trained to follow a set of guidelines issues by the Association of Chief Police Officers (ACPO) which ensure that the integrity of all evidence is maintained. While these are a voluntary set of guidelines, they are accepted as producing evidence which is admissible in a British court of law.

Forensic imaging

With our advance techniques and in-house hardware and software developed over more than a decade, we have the ability to secure a forensically sound image from any type of digital storage media. For an image to be considered forensically sound it must not only have a digital fingerprint, but also be demonstrable that the image is reproducible by everyone, in order for it to be used as admissible evidence.

Processing of imaged data

The image is processed using our in-house proprietary forensic processing suite, which must ensure that all data contained on a disk is process in manner that can be searched an investigated. Subsequent investigation will analyse all areas of the data including active files, deleted data, lost files, unused blocks, slack space along with compressed and encrypted data.

Forensic data investigation

The DiskEng forensic specialist have a wealth of knowledge regarding operating systems and the underlying storage technology and file systems they contain. The forensic engineer must accurately establish the sequence of activities which were performed on the computer, including contacts, email activity and internet activity, allowing a timeline to be built up.

Forensic investigation reports

An important part of the investigation is the report which our forensic engineers are required to write outlining the findings of an investigation, which is admissible for legal purposes. Our forensic engineer can be called up as an expert witness in court.

DiskEng are recognised in the UK as experts in Data Recovery and Computer Forensics. Call DiskEng now for a confidential consultation with a computer forensic specialist to discuss your computer forensic requirements.

Comments are closed