Computer Forensics for Defence

The main factor when it comes to the analysis of digital computer based data is for the examination to be carried out in a forensically sound manner with the aim of preserving, recovering, analysing and clearly presenting the facts at hand.

All Computer Forensic examinations carried out by the expert examiners at Sytech follow the Association of Chief Police Officers (ACPO) Guidelines known as the ACPO – Good Practice Guide for Computer Based Electronic Evidence

These guidelines contain four primary principals:

Principle 1:
No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court.

Principle 2:
In circumstances where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.

Principle 3:
An audit trail or other record of all processes applied to computer-based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.

Principle 4:
The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.


Computer forensics analysisWorld-class forensic analysis for a wide range of investigations.

Sytech provide industry-leading digital forensic analysis of all formats of computer – revealing ‘hidden’ or encrypted files, bypassing password protection, establishing timelines and so forth. There’s very little that isn’t possible, and our role is to provide all the evidence possible through digital forensic examination of computers, whilst ensuring that files and associated evidence remain intact and undisturbed by the analysis (through adherence to the ACPO Guidelines).

Contact us and we’ll be very happy to provide further details.

The services we provide are comprehensive – including forensic analysis supporting investigations into the following:

Indecent Images / Grooming
Media Files
Internet History
Instant Messaging (IM) Chat Programs
IM Chat Web Pages
Linking physical media to computers/laptops

Alternate Data Streams (ADS)
Remote Desktop

Locating files used in/storing data on fraudulent activity
Software/hardware relating to fraudulent application

Hidden Files
Altered file extensions
Files within files (ADS)

File activity
Internet activity

Anti forensics
Possibility of virus being capable of performing malicious actions
Investigation of a Virus potentially being planted for the use as of an Alibi

Deleted/altered data
Stealing data
Viewing data

Editing EXIF information
Altering image content

Chat logs
Voice chat logs

Document Validation
Validity of documents and Validation of document timings (creation, access & modified)
Where were they created?

Contact us and we’ll be very happy to provide further details.