Corporate Investigator Answers Investigation

Computer Investigation

An Introduction

If you are the victim of computer fraud in the workplace or at home - this is what to do first. For more information, telephone 020 7158 0332 or email info@private-detectives.co.uk.

Action to take if you feel your computer system or server may be compromised or the subject of illegal use - or that the user has perpetrated a fraud against you / used the machine for illegal reasons

Computer Forensics and Examination will obtain irrefutable evidence admissible in law. If you have suspicions, here is what to do first:

The internet, networks, laptops, portable devices (eg external drives / USB keys) and users accessing externally provide miscreants with the means to commit fraudulent, criminal or innapropriate activity or unauthorised usage in the workplace (e.g pornography or social networking sites). Computer Forensics have become an essential tool in providing evidence in cases of misuse or significant crimes such as embezzlement, theft of intellectual property etc

If in doubt - don't touch ! Never attempt to recover data or explore data from a computer without the necessary skills - this may affect the integrity of a chain of evidence to your later cost. When working with units our first move will be to clone the unit and conduct our work from the clone without booting the machine. By all means, however, take evidential photographs

Computer forensics is a generic name describing forensic analysis and reporting of computer or IT media. As well as the hard drive(s) this may include USB drives, MP3/4's, external drives etc. While most cases involve Windows Operating Systems we can also apply the same principles to Mac OS and Linux. Never make the error of believing that when you hit the delete key the information is gone - there is a high possibility deleted data may be recovered in it's entirety

We apply Computer forensics in investigation for many reasons including:

  • Misuse of company information by employee or ex-employee
  • Internal theft or fraud
  • Analysis of email and deleted files
  • Pornography and/or illegal downloads
  • Data Recovery
  • Paedophilia
  • Substance Abuse / dealing
  • Internet Misuse
  • Theft of Intellectual Property (e.g. databases)
  • Forensic investigation in an employment tribunal case as reported in the Daily Telegraph

    Daily Telegraph Employment Tribunal

    Computer Forensic analysis for companies with internal problems or lost information

    Corporate Investigation

    Data recovery and timeline analysis on the instructions of Solicitors Nationally

    Legal/Solicitors

    Computer Investigation - Rebuilding files and building a timeline of events

    Computer Recovery of deleted files and timeline building

    Obtaining evidence - revealing the secrets a user has invested in a computer

    computer forensic evidence

    Mobile Phone Forensics - applying forensic investigation to a miocile or cell phone

    undeleting mobile phone messages

    Preserving the Evidence - what steps to take before forensic investigation

    Preserving evidence for a Computer Investigation

    Action on Scene - what to do, and what not to touch

    Preserving evidence for a Computer Investigation
    Private Investigator

    "searching the world for answers"

    Copyright © Detective Ltd 1995-2024 ·

    Site Map