Computer Forensics for Prosecution

The main factor when it comes to the analysis of digital computer based data is for the examination to be carried out in a forensically sound manner with the aim of preserving, recovering, analysing and clearly presenting the facts at hand.

All Computer Forensic examinations carried out by the expert examiners at Sytech follow the Association of Chief Police Officers (ACPO) Guidelines known as the ACPO – Good Practice Guide for Computer Based Electronic Evidence

These guidelines contain four primary principals:

Principle 1:
No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court.

Principle 2:
In circumstances where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.

Principle 3:
An audit trail or other record of all processes applied to computer-based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.

Principle 4:
The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.

 

Computer forensics analysisProsecution evidence through world-class Digital Forensics.

Sytech use world-class Digital Forensics analysis and procedures to gather digital data for Prosecution from all formats of computer. We reveal ‘hidden’ or encrypted files, even those protected by passwords.

Through this state of the art Digital Forensic analysis, Sytech are able to establish timelines and a multitude of patterns that help to build a successful Prosecution case. And in doing so, we ensure that files and associated evidence remain intact and undisturbed by the analysis (through adherence to the ACPO Guidelines).

Contact us and we’ll be very happy to provide further details.

The services we provide are comprehensive – including forensic analysis supporting investigations into the following:

Indecent Images / Grooming
Media Files
Internet History
Instant Messaging (IM) Chat Programs
IM Chat Web Pages
Linking physical media to computers/laptops

Hacking
Alternate Data Streams (ADS)
Rootkits
Logs
Remote Desktop
Practicality

Fraud
Locating files used in/storing data on fraudulent activity
Software/hardware relating to fraudulent application

Hidden Files
Altered file extensions
Files within files (ADS)

Location
File activity
Internet activity
Logs

Virus/Trojan
Anti forensics
Possibility of virus being capable of performing malicious actions
Investigation of a Virus potentially being planted for the use as of an Alibi

Misfeasance
Deleted/altered data
Stealing data
Viewing data

Photoshop
Editing EXIF information
Altering image content

Communication
Email
Chat logs
Voice chat logs

Document Validation
Validity of documents and Validation of document timings (creation, access & modified)
Where were they created?

Contact us and we’ll be very happy to provide further details.