deCipher logo   The digital information specialists  
 

Digital Forensics

Digital Forensics involves the collection, analysis and presentation of electronic evidence.

  • Collection

    Involves the forensic imaging (exact copying) of systems that hold electronic information i.e. computers, mobile phones, digital cameras etc. This is done using highly specialised hardware and software.

  • Analysis

    All analysis is conducted on the forensic image not on the original system. Specialist searching and analysis hardware and software are used.

  • Presentation

    Ranges from a verbal report for a simple discovery issue to a written report suitable for a civil or criminal case. Expert witness testimony may also be required, including Briefs of Evidence and Affidavits.

deCipher conducts all phases of a computer forensic investigation using secure and auditable forensic policies which comply with international best practice and all requirements under New Zealand law.

deCipher employs highly educated and experienced computer forensic consultants who undergo continuous training as the specialisms of digital forensics and information technology develop.

deCipher uses state-of-the-art specialised digital forensics hardware and software, including Encase®, Forensic Toolkit®(FTK™) and Password Recovery Toolkit™(PRTK™).

Having undertaken cases in New Zealand, Australia and the Pacific Islands, deCipher works with government departments, law enforcement agencies, legal firms, companies, educational organisations, individuals and as an independent expert appointed by the court.

Computer Forensic Services
Forensic imaging of digital evidence on PCs, Mainframes, Servers, iPads, iPhones, MACs, USB memory sticks, CD/DVDs, back-up tapes, floppy disks, mobile phones, cameras etc. Expert witness testimony and technical assistance to prepare and execute search warrants, search orders (formerly Anton Piller orders), Affidavits and an electronic evidence plan
Identification and extraction of relevant data and files Examination of images, emails and Internet activity
Recovery of deleted files from the hard drive Creating a timeline of usage for active and deleted files
Investigation of attempts to conceal, create or destroy electronic documents Identification of relevant information and development of further investigative leads
Password recovery Spyware detection

If you think you may have a problem requiring digital forensics then the following steps are time critical.

  1. Do not use or turn the computer on or off
  2. Isolate the computer if practical
  3. Obtain professional computer forensic advice as soon as possible