How we do it

Our Laboratory is equipped with an isolated network of analysis machines and a stand-alone 'sheep dip' which is used to ensure that no viruses or other malware enter the analysis network. Each analysis machine is multi-processor and set up with four giga bytes of main memory. As with the field equipment each machine is subject to forensic cleaning and re-loading between assignments. None of the equipment is ever connected to the Internet or other insecure networks. All software is loaded from known good sources and standard disk load is made that is cloned to all the machines. This ensures consistency and security.

We have implemented our own internal Forensic systems and methodology which is based on current working models used by Military, Police and Intelligence Services. Our systems ensure a quality standard that is consistently achieved throughout an investigation.

The end result is a practical report that will be accepted in any court, Magistrates or Crown. The report will be easy to read and understand.

The field equipment used consists of a number of stand-alone copying devices that may be associated with an IBM laptop fully loaded with forensic imaging and analysis software. This combination allows for both the rapid production of forensic images where time is the over-riding factor and allows for on-site analysis or pre-seizure inspection depending upon the terms of the warrant or seizure order. Each machine is subject to forensic cleaning and is reloaded from a known good image between each assignment. This avoids any possible claim of evidence spoilage from data left from a previous assignment.

We use a combination of industry standard forensic software like Guidance Software's EnCase, AccessData's Forensic Tool Kit, X-Ways WinHex and bespoke programs and scripts to perform the more unusual tasks. We also have a full range of more general-purpose tools used for indexing, searching, reporting and file viewing. This is augmented by data recovery programs, virus removal tools and a selection of engineering software.