Emergency Service
Call:
+27 83 863 5643
Imperative Technology SA
Call us Now: +27 11 462-1680
DO YOU REQUIRE COMPUTER FORENSIC SERVICES?
Our
specialist
expertise
enable
us
to
forensically
analyse
computer
systems
and
electronic
devices
for
criminal
investigations,
data
fraud
analysis,
finding
hidden
and
deleted
evidence,
intellectual
property
that’s
been
compromised
etc.
We
also
assist
representatives
as
appointed
by
the
Honourable
Court,
to
execute
Anton
Piller
Orders
in
the
seizure
of
electronic
devices
and
computer data for the purpose of prosecution.
Contact
us
for
an
estimate
on
our
Computer
Forensic
Services
once
we’ve
discussed
your
specific
requirements.
We’ll
then
explain
the
various
processes
we
need
to
follow
to
conduct
a Forensic Analysis.
A
BRIEF
EXPLANATION
OF
OUR
DIGITAL
FORENSIC PROCEDURE
•
The
first
step
is
a
brief
by
the
client
to
discuss
requirements
to
enable
us
to
provide
an
estimate
of
timeframe
and
associated costs.
•
We
start
the
Evidence
Acquisition
and
Verification
Process,
this
is
to
ensure
the
preservation
of
data
integrity
and
includes
a
Forensically
Sound
Imaging
Process
of
all
electronic
devices.
As
soon
as
electronic
data
will
be
used
as
possible
evidence
in
any
legal
matter,
data
preservation
is
critical.
Forensically
sound
and
verified
images
are
used
for
the
analysis,
therefore
original
electronic/storage
media
is
never
used
for
analysis
to
avoid
contamination
of
possible evidence.
•
We
proceed
with
an
exhaustive
Forensic
Analysis
following
a
proper
Chain
of
Custody and documentation process.
•
We
present
our
findings
to
the
Client/Legal
Counsel
by
means
of
a
detailed
Digital
Forensic
report
that
is
concise and easy to follow.
•
Expert Witness Testimony when required.
SOME
OF
THE
COMPUTER
FORENSIC
REQUIREMENTS:
•
Hexadecimal
searching
for
evidence
and
links to all areas of fraudulent activity.
•
Intellectual
Property
that
may
have
been
compromised
incl.
connected
storage
devices.
•
Examination
of
user
activity,
computer
misuse/abuse
at
work,
website
visit
logs,
Internet cache examination.
•
Finding/recovering
deleted
data
with
relevant date & time stamps.
•
Examination
of
hidden
Operating
System
logs, Registry & META file information.
•
Email
searches,
Data
Recovery
of
deleted
mail messages.
•
Data
decryption,
file
repair
and
restoring
password protected files.
•
Permanently
erasing
sensitive
data
for
those
organisations
whose
policies
insist
that
sensitive
data
is
destroyed
irreversibly.
WHAT YOU
SHOULD NOT DO
Please
do
not
allow
anyone
to
search
or
by
any
means
work
on
any
electronic
device
that
may
be
used
as
evidence
in
any
legal
matter.
This
will
contaminate
evidence
that
could
be
used
to
support your case.
By
simply
connecting
a
storage
device
to
any
computer,
already
makes
a
change
to
the
storage
volume
information,
date
&
time stamps etc.
Users
may
unintentionally
or
inadvertently
overwrite
critical
evidence
by
simply
doing
a
search
for
information
or
continuing
to
access
the
electronic
device
in
a
normal
working
environment.
Forensic
experts
use
very
advanced
h
e
x
a
d
e
c
i
m
a
l
techniques
to
search
for
fragments
of
evidence
that
link
to
other
deleted
fragments
all
over
the
device
that
may
be
compromised
when
computer
users
access
the device.
BOTTOM
LINE:
Do
not
access
the
device
if
needed
in
any
legal
matter.
Rather
call
us,
even
if
it’s for advice only.
CONTACT US AT
+27 11 462-1680
© IMPERATIVE TECHNOLOGY - 2023