Search Our Site

Register

Computer Forensics / Electronic Forensics / Digital Forensics

At Infinity Risk Control we conduct Computer Forensics & Digital Forensics investigations, both "large and small scale" of desktop computers and servers, laptop computers, Android's, iPhones, Blackberry's and mobile Phones to obtain evidence vital to civil litigation and criminal matters. Digital forensics is the science behind obtaining valuable electronic evidence or information from electronic devices.

We are regularly involved in cases involving suspected spoliation and destruction of electronic evidence, human resource investigations, frauds, embezzlement, improper termination, copyright infringement, theft of intellectual property, divorce and other legal areas.

  • Infinity Risk Control’s Computer Forensic Services understands that the our clients researching “Computer Forensics” wants to know quickly, “How Fast,” “How Much,” and are you qualified to do the Job. We feel confident in responding that we have a full time professional staff to meet your requirements locally the shortest amount of time.
  • Infinity Risk Control’s Computer Forensic Services Fees are very Cost Effective While providing Professional Liability and E&O Insurance protection.
  • Infinity Risk Control’s Computer Forensic Services specializes in the identification, extraction, preservation, interpretation and documentation of electronic evidence for evidentiary or mitigation purposes.
  • Infinity Risk Control’s Computer Forensic Services provides services to all size Businesses, Law Firms, Private Investigation Firms, Government Agencies and Private Individuals.

What is Computer Forensics?

Computer Forensics is the preservation, identification, extraction, documentation and interpretation of computer media for evidentiary and/or root cause analysis. It is also referred to Electronic Discovery, Electronic Evidence Discovery, Digital Recovery, Data Discovery, Computer Analysis and Computer Examination.

What is Computer Crimes?

  • Identity Theft
  • Fraud and financial crimes
  • Defamation
  • Copyright
  • Gambling
  • Website Defacement / Website Hacking
  • Phising/Spoofing
  • Blackmail/Extortion
  • Electronic Harassment
  • Accessing Unauthorized Data & Information
  • Altering, destroying, suppressing, or stealing of unauthorized
  • Altering or deleting stored data
  • Computer viruses / Malware attack
  • Information warfare
  • Obscene or offensive content
  • Our Investigation Approach

Determine legal right

Investigator must obtain authorization from authorities such as legal department. This is an important issue, because without authorization, evidence gathered may not accept.

Design for Evidence

A good start might be photographing the original hardware setup, anything which may related to case should fully recorded, for instance, Location, Time, Date, Serial Number, etc. All the evidence should isolated and protected. The chain of custody form helps to find out who has touched the evidence, also it’s a way to demonstrate the evidence hasn’t been damaged. All the process should be fully document.

Produce records

All media must been write protected. Write protecting a digital evidence guaranties that the evidence is not altered or erased during investigation process. 
Creating a bit streaming backup (Mirror Image) of the digital media is the following step. When imaging has been done, a Hash value has to implement to both Master and Copy evidence to confirm that duplication process done properly.

Collect Evidence

During this step, examiner must determine where to collect evidence from and decide the best order to gather the data. This can be done through several processes, to include: searching for hidden information, user file, deleted file, encrypted file, emails, cookies, and system logs. All the suspicion evidence must be print out and all process must be fully documented.

Analysis Evidence

All collected evidence must be analyse to extract the evidence to answer, “who, when, why and how” questions. Main challenge in this process is to check and run, unknown programs, unknown files, to find out what is the result.

Reporting and presentation

Reporting and Presentation is the conclusions and corresponding evidence from the investigation to convince an authority. Document the following for presenting to an authority:

Document the entire seize the evidence and chain of custody.
Document all the gathered evidence.
Document what was examined and what was the result.

Infinity Risk Control

35 Tannery Road #09-05,Ruby Industrial Complex / 347740 / Singapore 65 68460654
88 Wood Street, 10th - 11th Floor / Greater London EC2V 7RS / UK 44 203 6953536