computer-forensics

Computer forensic analysis

Computer forensics involves the preservation, identification, extraction, interpretation, and documentation of computer evidence. At a very basic level, computer forensics is the analysis of information contained within and created with computer systems aviatordreamliner, typically in the interest of figuring out what happened, when it happened, how it happened, and who was involved.

In many cases, the information gathered during a computer forensics investigation is not readily available or viewable by the average computer user.

These sources may include computer messaging, e-mails, the Internet, tapes, CDs, disks, or printouts made by a specific computer. Evidence can be sought in a wide range of computer incidents, including but not limited to:


  • Theft of Company Secrets (client, customer or employee lists)
  • Employee Sabotage or Terrorism
  • Credit Card Fraud
  • Financial Crimes
  • Embezzlement (money or information)
  • Economic Crimes
  • Harassment (sexual)
  • Child Pornography
  • Major Crimes
  • Identity Theft (short or long-term plans)
At ADVANCED, our contracted computer experts have access to the latest technology and we can recover electronic evidence during a computer forensic investigation from the following types of devices:


  • Hard Drives
  • Back-up Storage Media
  • Databases
  • E-mail Servers
  • Web Servers
  • Internet Sites
  • Personal Digital Devices (Blackberry’s, iPads, and mobile telephones)
  • Digital Cameras
  • Zip Drives
  • Fax Machines
  • Digital Answering Machines