Analysing, interpreting and presenting
evidence stored on computers.
Computer Forensics incorporates the use of high level analysis software and the methodical examination skills of a trained Computer Forensic Expert. More importantly these analysis processes are accepted by Law enforcement and the Judicial system. Computer Forensics has more recently been referred to as Digital Forensics or Computer Forensic Analysis.
|Put simply there are four main stages of a Computer Forensic Investigation:|
|Computer Forensic " Imaging" or "Acquisition"|
|Creating a forensically sound and exact copy of the data and making sure the original evidence is secured and protected. This is done using a "write blocker" so that no new data can be written to the hard drive only the exisiting data can be read and analysed. It is vital that this procedure is completed otherwise it could lead to any potential evidence being inadmissible should the case go to court.
Please also see our page on On-site data collection
|Computer Forensic Analysis|
|The actual examination of the device and its data by the computer forensic analyst using a range of powerful forensic tools, the most popular being Guidance Software's EnCase and Access Data's FTK.|
|The conclusions and opinion drawn by the computer analyst regarding the outcome of the examination and the clear presentation of findings within an easy to understand report.|
|If the case goes to court the computer expert may have to give his or her opinion regarding the computer forensic analysis. For more information please follow this link to our expert witness page|
|All of our Computer Forensic Investigations follow strict written documentation and handling procedures to ensure the continuity and the integrity of the evidence is maintained at all times. X-act Forensics follow the Association of Chief Police Officers guidelines (ACPO) in the strict handling of all digital evidence.|
|For more information on computer forensic analysis from X-act Forensics please call us on 01789 450906|
|Useful computer forensics related infomation can be found on the Wikipedia|