If you would like to change your cookie settings at any time, please see http://www.aboutcookies.org for more information on how to change your cookie settings or block cookies altogether.
Accept & hide message
Trusted by organisations such as the NHS, Ambulance Service, Centrica, UBS Bank
and Ministry of Defence,our computer forensics service is accredited by
ISO27001 (Information Security) and ISO9001 (Quality Management).
Whether you require digital forensic investigation, digital forensic training, expert witness
testimony, or e-discovery, Computer Forensics Specialists are home to some of the most
experienced and respected analysts, technicians and experts at work in the industry today.
Computer Forensics Specialists benefit from some of the leading digital
forensic investigators, class 100 clean rooms, ISO accreditation and
proprietary data extraction tools. So you can be assured that
your data is safe in our hands!
Legacy files, databases, images, video and audio can often be
stored on media and in applications that are no longer supported.
We have the expertise to recover legacy electronic evidence to
support criminal or civil claims.
"We begin by establishing the purpose of the computer forensics investigation, and identifying the best way to preserve and analyse the data we find. Ultimately this will determine what tools, techniques and software we will be required to utilise. At all times we are mindful of any safety measures seeded in the computer, including failsafes that have been put in place to erase the data when triggered"
"Once we have established the nature of the investigation, we will begin the acquisition of the data. For this we need to create a duplicate of the media, typically by using a write blocker. This provides our specialists with a snapshot or mirror image of the data contained on the media, and is a perfect copy of the drive. The imaging process is non-destructive to the data, which ensures the integrity of the investigation"
"After acquisition the contents of the image files are analysed to identify evidence that either supports or contradicts a theory, hypothesis, allegation or claim. We will also look at any attempts to delete or hide data, including any failsafes that have been put in place. We utilise a wide variety of forensic tools for examining and analysing data including Access Data and Forensic ToolKit"
"Forensic Toolkit is a court-cited digital investigations platform that is used for computer forensics examination and analysis. FTK is database driven, meaning it is fast and resilient, and allows our specialists to handle massive data sets. The software also allows our specialists to correlate massive data sets from different sources (like mobile devices and cloud storage), allowing us to review data and identify relevant evidence"
"Once the data analysis is complete, our specialists will compile a detailed report with the findings of the investigation. Our easy to understand report will include notes taken by the specialist in charge of the particular case, details of the hardware examined, the procedures and software used in the examination and any evidence or findings found"
"Our computer forensics procedures are recognised by The Association of Chief Police Officers (ACPO and Civil Procedure Rules (CPR) Part 35 and have been accredited by ISO27001 and ISO9001. We pride ourselves on our professionalism and integrity, and have worked on over 600 cases since we were established in 1996"
"Our specialists always refer to the ACPO guidelines for electronic evidence. ACPO publish guidelines for handling electronic evidence, and it is of vital importance that these are strictly adhered to when investigating computers or digital media. Law enforcement agencies or their agents should never access the media directly, and must always use a write blocker to interrogate media"
"Adhering to the ACPO guidelines, an audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. Our audits are thorough, so that any other party should be able to examine those exact processes and achieve the same result"
"Robust information security is of vital importance, with a diverse range of clients entrusting their sensitive data to us. ISO 27001 is an internationally recognised framework for information security. It helps us identify any risks to important information so we can put in place the appropriate controls to help reduce the risk. Our certifications mean that we can offer our assurance of the quality we deliver"
Unit 1 Avon House, 19 Stanwell Road, CARDIFF, CF64 2EZ
Airport House, Purley Way, CROYDON CR0 0XZ
272 Bath Street, GLASGOW G2 4JR
Clavering House, Clavering Place, Newcastle Upon Tyne NE1 3NG
tel: 0800 223 0162