Digital forensics

With more and more information being stored in a digital format, there has been an increase in the demand for forensically sound digital investigations, both in legal and internal corporate settings.

We have experience in digital investigations and enjoy long-standing relationships both with major organizations across different industry sectors and with leading law firms.

Investigations are carried out in our ISO/IEC 27001 certified laboratory to ensure that both data security and client confidentiality are maintained to the highest standards at all times.  


Computer and document forensics

In the majority of computer related forensic investigations, an investigator will need to be able to seize data sources (desktops, laptops, handheld devices, email servers, file servers) and make a forensic ‘image’, which produces a precise snapshot of everything on a hard disk at a point in time. They also often involve recovering a variety of documents relating to a case. This may include the recovery of deleted files, password-protected files, or hidden information.

Our team of experts can help you determine a variety of facts about activity relating to a given document, including creation time and date, last access or print time and date etc.


IP and data theft

Research into intellectual property theft highlights the growing issues around IP and data theft. Almost 70% of people have stolen key information from work. The most pilfered items include e-mail address books, customer databases as well as proposals and presentations.

Many of those questioned said they used office email to get the stolen information off company premises. Employees often have far more access to information than is required and as a result there is a temptation, particularity among outgoing employees, to take information with them.

As more and more company information is stored electronically, there is an urgent need to have the capability and expertise to identify when such instances occur.

We help organizations identify the source of data theft and use forensic tools and methodologies to resolve cases that involve the theft of intellectual property and other trade.


Data misuse and fraud investigation

We use the latest forensic tools and techniques to maximize the effectiveness and speed of a sound investigation.

We quickly and thoroughly uncover vital pieces of evidence that was thought to be destroyed. Investigations of this nature are always sensitive and we understand the need for discretion and absolute confidentiality.

Detailed reports of our findings, accompanied by witness statements and expert testimony in court, are provided according to your requirements.


Data acquisitions

Our consultants have the necessary experience to extract, in a forensically sound manner, data that may reside on a variety of electronic devices, such as laptops, desktops, servers, virtual servers, cellular phones, smart phones, external drives, cloud services, and other types of electronic media.

Data acquisition is often the ‘first step’ in an investigation where potentially relevant data sources are identified and acquired, so a more detailed forensic analysis can be carried out if required. Our data acquisition services will ensure that potentially relevant data sources are collected and preserved in a forensically sound manner, ensuring the integrity of the data at all times.

We use international standards of best practice and industry leading hardware and software to carry out our service.


Mobile device analysis

Mobile communication devices that incorporate voice, data, and text capabilities are growing rapidly and present specific challenges for organizations. We have extensive expertise in the forensic analysis of mobile phones and other handheld devices.