We specialise in acquiring intelligence from industrial, commercial and office systems where there are suspicions that they might have been manipulated, misused, abused, or otherwise failed to operate as expected.
Most commercial activity is entrusted to computers or electronic devices. They store information. They are pivotal in communication with others. So in matters as diverse as disputes between partners, loss of intellectual property or major fraud, much of the essential evidence will reside somewhere on a computer or a network of computers or devices, or a cloud service.
We operate a specialist forensic laboratory to ISO 17025 standards. The most common task we perform is to produce legally admissible evidence from the data we find on computer and network systems, or on mobile devices and tablets. Our task is to acquire, find and analyse the information required by the client, and to prepare and present it in evidential format.
It may be as simple as finding an existing or deleted document or e-mail, or analysing a transaction log. Or it be a complex investigation involving the chronology of amendments to databases, or it might be tracking movements of information in a large network of computing devices.
We use many forensic techniques, such as searching for text or alpha-numeric strings in existing or deleted files, or in the free-space area of disks containing old and discarded fragments of files. We have the capability to apply Optical Character Recognition to large volumes of pictorial documents, such as Graphical PDF or image files from scanned invoices or accounting dockets, which might contain relevant data.
Most of our assignments are cases before the Civil Courts where we comply with Part 35 of the Rules of Court in regard to the handling, preparation and presentation of evidence. We also comply with the Association of Chief Police Officers' guidelines in regard to computer forensics in criminal cases.