Our Digital Forensics Lab
With our newly built digital forensics lab at our Kent HQ, we have the internal capability to provide digital forensics services that can safely preserve and examine data found on digital devices and computer networks.
The identification and imaging of digital evidence can be key to successful litigation and dispute resolution.
Our Forensic Team work from the digital forensics lab and are trained to recover and investigate material found in digital devices, including hard-drives, servers, laptops, smart-phones, networks and storage media by imaging these devices for further analysis and evidence review.
Recent cases where we have assisted clients, have included the:
- recovery of deleted company emails, documents and spreadsheets, sales proposals,
- identification of altered documents
- discovering internet browser histories and internet emails
- unauthorised access to company information
- downloading of malicious and pornographic content
- transfer of confidential files
- uploading of external devices
- recovery of other electronic generated documents
Digital Forensics is an investigation discipline that often provides evidence to support an internal fraud investigation or cyber-attack. If you need to store evidence within our Digital Forensic Lab, contact us here.
Imaging & Examination
Once the evidence has been seized and preserved (securely stored within our digtial forensics lab) the forensic examination can begin, including the imaging (producing a working copy) of all digital data from the devices collected using specialised forensic software and hardware.
The imaging allows the original device to be preserved as an evidence exhibit, leaving the imaged version to be forensically tested and analysed.
Clients often request their devices to be imaged as a precaution and if required, to be analysed at a later stage in the investigation.
Working with our clients, the analysis phase of the digital forensic investigation is the interrogation of the data collected; this will include:
- testing investigation hypotheses
- traditional analysis of deleted files, browser history, access logs and file sharing
- understanding and interpreting the data structures
- examining storage components
- identifying clusters, meta-data and unallocated data sets
- keyword searches
- presenting evidential findings and statements
Preservation of Evidence
It is essential to follow forensic principles, evidence continuity and methodology when conducting a digital forensic investigation.
The initial phases of a typical digital forensic investigation are critical; we provide clients with a practical perspective and help them:
- Identify and seize items that may contain digital evidence
- Obtain the correct legal procedures and permissions
- Map and index electronically stored information (ESI)
- Help with decision making around loss of evidence
- Collect other available records
- Provide evidence handling and chain of custody
- Examine data from emerging technologies
For further information, visit www.tenintel.com/investigations, where you can find out how we support clients with digital forensics, investigations and litigation support.
Email us at firstname.lastname@example.org and follow us on LinkedIn and Twitter @TenIntelligence for all updates.
Litigation Support | fact finding and forensic support
COVID-19 Fraud Trends and Cyber Threats
How to identify a fraudster and build an anti-fraud environment?
Keeping Vigilant and Staying Business Safe
Investigations | Workplace investigations and fact finding
Remote Working | Has your password been stolen?
How using forensics can help protect your organisation’s digital assets