Digital acquisition is the very first technical operation to be conducted in a computer investigation and a fundamental process in the field of digital forensics.
It is of utmost importance and considerable effort should be made to obtain forensically sound data.
Every doubt must be eliminated that the investigator might have contaminated or altered the contents of the source, thus rendering the evidence useless and inadmissible in court.
Even if the nature of the original complaint does not seem to lead to criminal prosecution and therefore does not have to comply with legal standards on computer forensics, it is advisable - based on a duty of precaution - to act in such a way that no evidence proves inadmissible at a later stage.
Acquisition conducted in bad conditions compromises evidence irreversibly.
ComputerInvestigation maintains a strict chain of custody ensuring original evidence is properly and securely maintained while in our possession.
Computer Investigation will use proven hash functions to authenticate the datasets and ensure data integrity.
ComputerInvestigation has an extensive experience conducting acquisition in various situations, including in the field, where very senior staff are involved or in highly sensible matters, with an eye on specific matters like multiculturalism, privileges, due process and respect of the mandate as well as technical issues.
Digital’ Forensics can be summarised as follows:
The practice of gathering, analysing, and preserving data from digital media (computers, mobile phones, etc) in an authentic, accurate and complete form so that it may be acceptable as evidence in a court of law. This evidence may include, but is not limited to, deleted emails or files, computer logs, indecent images, spreadsheets and accounting information.
At the most basic level, digital forensics has three major phases:
ComputerInvestigation can help should you require a forensic examination of any computer hard drive, data storage device or digital source within criminal, civil and personal matters when required.
ComputerInvestigation is able to provide credible evidence that can significantly influence the outcome of any computer-related legal proceeding, including the following operations:
- Keyword searches
- Document and financial data extraction
- Analysis of Internet usage and searches
- Analysis of electronic mail
- Computer Data Recovery
- Determination of event timelines, when possible
- Computer password cracking
Computer forensics proves especially valuable when the expert combines an experience as investigator with the technical skills of the forensic examiner.
ComputerInvestigation has an extensive experience of both fields of expertise and will consider your case from both angles.
ComputerInvestigation will provide you with an investigation report on the digital media of your choice. This report will present evidence collected in a non technical format and will be supported by a technical paper detailing the procedures.
Documentation and data will be returned in a variety of formats (e.g., CDs, DVDs, removable disks, cartridges, tapes, and/or on paper)
Electronic Discovery is the process of securing, searching and locating electronic data (including emails, spreadsheets and documents) on a computer or over a network with the intent of using the identified material as part of a civil or criminal legal case.
eDiscovery request is often time-consuming and expensive due to the volume of information and records created and stored in electronic form, typically throughout the enterprise in an unstructured manner on network drives, personal computers and PDAs.
ComputerInvestigation will examine, identify and extract any amount of files, folders and data - from which it will provide the evidence you need. Computer Investigation will present that data accurately and in a format that is admissible within a court of law.
In the preliminary analysis of a case, it is especially important to decide an overall strategy for the investigation after having carefully assessed all impacting factors. A clear view of what to expect from a digital analysis, the necessary precautions to take in the course of the investigation and the expected time to complete an analysis are all key issues.
ComputerInvestigation will provide you with a specialized advice on procedures, tools and potential difficulties, based on an extensive experience.
In many cases, it is important to securely dispose of any item of computer media containing confidential or sensitive information.
ComputerInvestigation offers a secure data erasure service that performs a safe erasure of your media in a way that no information can be retrieved from the disposed equipment.
ComputerInvestigation will treat all client communication and correspondence with the utmost discretion.
Furthermore, data related to your case is protected, digital forensics examinations are conducted in secure surrounds, and findings/reports are disseminated on an ‘eyes-only’ basis.
Finally, once our business relationship is concluded, any forensic data related to your case is virtually or physically shredded after use, unless otherwise agreed.
Expressions and definitions of due process rights in the individual international agreements and in national constitutions may vary, and so do the interpretations given to those rights. Computer Investigation will proceed in line with the customer's own rules and regulations.
Need more information ?