posted on Thursday, 06 September 2018 by itpieadmin

What is volatile data

What exactly is volatile data? When recovering data and information from computers or mobile phones or indeed other forms of media devices, data can be retrieved mainly from two ty.....

posted on Thursday, 23 August 2018 by itpieadmin

What is error level analysis?

Error level analysis can establish whether a digital photograph or image has been digitally altered. Images in a jpeg file format actually lose quality each time they are resaved. The f.....

posted on Friday, 13 July 2018 by itpieadmin

iPhone forensic analysis

There are many challenges facing the computer forensic investigator when acquiring data from iphones and the iOS operating system. Many different tools are required to access all the da.....

posted on Tuesday, 10 July 2018 by itpieadmin

Data acquisition from electronic evidence

The first principle when examining electronic evidence is to keep data held on a storage medium unchanged. For embedded systems this principle is more challenging than it looks at first.....

posted on Wednesday, 01 March 2017 by itpieadmin

Investigating files in the ‘cloud’

As more and more of users store data in the ‘cloud’, what is the process for investigating digital evidence that does not reside on the user’s hardware? Can these file.....

posted on Thursday, 26 January 2017 by itpieadmin

What is computer forensics...

If you manage or administer information systems and networks, you should understand computer forensics. Forensics is the process of using scientific knowledge for collecting, analyzing,.....

posted on Wednesday, 11 January 2017 by itpieadmin

What you can do to preserve evidence...

As soon as you suspect that relevant data may exist on a computer, do whatever is within your power to assure that it remains untouched. It is human nature to want to “check out&r.....

posted on Thursday, 24 November 2016 by itpieadmin

The principles of digital evidence...

The principles of digital evidence:

Principle 1: No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data .....


posted on Wednesday, 09 November 2016 by itpieadmin

Recovering hidden data...

In most cases culprits use the delete and erase commands to erase the files. Although the precise notion of erase depends on the file system used, in most cases, deleting a file most of.....

posted on Thursday, 20 October 2016 by itpieadmin

Why overwritten data cannot be recovered...

Magnetic media is composed of small weak domains in which all of the magnetic moments are aligned in one direction. A domain acts a weak magnet aligned in some random direction. Conside.....

posted on Thursday, 20 October 2016 by itpieadmin

Growing challenges for digital forensics...

GPS devices, vehicle data collectors, and so-called smart phones are just a few of the digital devices that can yield relevant information during investigations. Many homes contain comp.....

posted on Saturday, 01 October 2016 by itpieadmin

Forensic data recovery in employment dispute

Data Recovery Specialists was contacted by a large public sector organisation following an employee deliberately formatting a hard disk drive on a standalone system in an allege.....

posted on Thursday, 15 September 2016 by itpieadmin

Interpretation of electronic evidence...

As with other forensic evidence, interpretation is often required to ensure the evidential weight of recovered digital evidence is clear. Practitioners who undertake the interpretation .....

posted on Wednesday, 08 July 2015 by itpieadmin

Our lead investigator...

Chairman of Fields Associates, Dr D Hamilton-Wallis’ experience of computers is both extensive and varied. His work initially came to public prominence while pursuing academic res.....