360 ipix virtual tour

Computer Forensics

Computer Forensics

  • Investigation Report

    When the objectives of the investigation have been achieved, Disklabs Forensic Services will prepare a full Investigation Report.

  • Covert/On-Site Evidence Gathering

    Should a covert service be required, one of our technical managers will arrive On-Site and image the hard disk drive, Server, or other storage device, (out of hours – if required).

  • Expert Witness

    For both prosecution and defence, our expert witness service will give you a wealth of experience in interpreting evidence for the prosecution, defence, jury and judge.

  • Password Cracking

    Disklabs Data Recovery and Forensic services offer a password cracking service, for police forces, military organisations, corporates and private individuals.

  • Training Seminars

    Learn how and what to do with your personnel in matters that could end up being resolved in court.  Understand the full implications of incorrect policy and procedures in evidence gathering.

Mobile Phone Data Recovery and Mobile Phone Forensics

Calling us after your technical support team have looked at the computer may be too late. Call us first for free, confidential and impartial advice on how to effectively handle the situation .    

One may simply think of computer crimes as someone trying to "hack" into a computer system or as crimes committed on the internet. However, once it is realized that computer storage media are really large filing cabinets with detailed, retrievable records of the activities of the user, it can be seen that computer evidence can be very important in any type investigation or inquiry.

These are just some of the reasons for Forensic Services. Data Recovery and Disklabs Forensic Services have many years of experience in the field of storage, recovering data, repairing hard disk drives and examining storage media and hardware. Data Recovery and Forensic Services can deal with clients with investigative requirements in all of the following hardware areas:

Computer Forensics

In the workplace, incidents have always happened, but now the evidence can be captured and examined on the computer.

The 3 Most Important Steps of Computer Forensic Investigations:

  1. Adhere to ACPO guidelines for digital evidence recovery , with a comprehensive auditable process

  1. Preserve the evidence . Data stored on a computer can be destroyed or made inadmissible as evidence very easily. The single most important task is using the correct procedures to get at the data. Vital evidence may lie in deleted files or fragments of past files and, even turning the computer on can result in their permanent loss.

  1. Never work on the original media . Once the computer or device has been identified as containing potential evidence, it must be forensically imaged in order to be examined. Specialist tools and software are used to create legally recognised exact copies of the media for analysis purposes. These copies are not the same as a normal backup. They contain an exact copy of every BIT on the disk or device.

  1. Examinations must be repeatable . Forensic analysis is an exact science. We deal in proof, not speculation