↑ Return to Investigations

Computer Forensics

Computer Forensics

computer forensics investigationsThe application of investigative and analytical techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law is known as computer forensics.  A broader definition is “the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal….”.

Forensic analysis can generally be performed on the following devices:

  • Computers
  • Laptops
  • Smartphones and most cell phones
  • iPads and iPods
  • Hard Drives
  • Digital Cameras
  • USB Memory Devices
  • PDAs (Personal Digital Assistants)
  • CD-ROMs & DVD’s

A forensic analysis of a computer or digital storage device is often associated with the following crimes/situations:

  • Industrial espionage
  • White collar crime
  • Criminal fraud and white-collar crime
  • Theft or unauthorized disclosure of corporate information
  • Numerous other criminal cases and civil actions
  • Employee Internet abuse or other violations of company computer policy

Forensics can be used to generally recover deleted or lost emails and files, identify files that have been uploaded or downloaded, dates and times files were accessed or deleted,  attempts to conceal, destroy, or fabricate evidence, faxes received on a computer, changes, deletions, additions to a document, chat logs etcetera.

contact global security groupPlease contact us for assistance with your computer forensics investigation.