Computer Forensics Department

Computer forensics is simply acquiring, supplying and protecting content of digital data carriers that can be an effective complement to traditional methods of gathering evidence.

The search for and analysis of digital material concerns all kinds of electronic data carriers, such as computer hard drives, SSDs installed in more and more devices, memory cards, USB flash drives, telephones and smartphones.

Computer forensics also includes the analysis of network traffic, websites visited or activity on Internet portals. The process of obtaining electronic evidence begins with the recognition of the problem. The carrier is secured at our headquarters or directly at the customer’s location. A binary copy of the memory is created to protect against loss and modification of the data. Depending on the problem, the information on the media is filtered and searched, or recovered first if it has been lost or deleted before. At this stage the investigative analysis is carried out, which ends up with the expert report describing the obtained evidence.

Reports created by computer forensics experts may be used in civil matters, in particular in:

  • pursuing claims, divorce cases, copyright infringement, commercial cases and all types of abuse
  • unfair competition, employee disloyalty, violation of the competition ban, industrial espionage, data theft, disclosure of trade secrets, criminal cases
  • in order to gather evidence in support of the adopted defense line.

Throughout the process of obtaining and analyzing the evidence, we focus on security and confidentiality of data, i.e. data storage, protection against physical fault of carriers and against third-party access to the evidence.

Activities related to computer forensics:

  • research of mobile devices
  • detecting spyware
  • data decryption
  • analysis of data on digital information carriers
  • presentation of obtained digital evidence for the purposes of pre-trial and judicial proceedings
  • data recovery from digital data carriers, both functional and physically damaged, e.g. after flooding, fracture, breakage, etc.
  • HDDs and SSDs
  • RAID arrays
  • telephones, smartphones, tablets
  • SD cards, micro SD
  • other digital media