Computer Forensics

Computer forensics requires specialized expertise that goes beyond normal data collection and preservation techniques available to end-users or system support personnel. This process often involves investigating computer systems to determine whether they are or have been used for illegal or unauthorized activities. Whether your organization needs computer forensic analysis of a single data element or comprehensive data collections from across multiple integrated business information systems, FSI will work with you to ensure sound and admissible forensic results at the most reasonable price point in the industry.


Computer Forensics

  • Acquisition and preservation of electronically stored information (ESI) wherever it exists

  • Investigation and detailed analysis of ESI

  • Search for deleted information

  • Fraud investigations

  • Evaluation of metadata to recreate time critical events

  • Expert reports and testimony

  • Recreation of device users’ Internet activity

Electronic Discovery

  • Gather, search, filter and produce large volumes of relevant ESI for legal review

  • Balance thorough document collection and review efforts with corresponding costs

  • Efficiently identify documents potentially relevant to litigation

  • Removal of non-relevant data through data filtering, identification and elimination of duplicate ESI, metadata analysis and keyword searching


When retrieving key electronic information is integral to your case,

our computer forensics professionals are certified to testify as expert witnesses in fact or opinion.


FSI principals offer their clients a variety of solutions

  • Verification of Digital Evidence to determine integrity of the computer’s image

  • Recovery, extraction, and processing of files deleted by a computer’s user to hide evidence

  • Deleted Email Data
    Deleted User Data

  • Verification of Time Zone Settings

  • Verification of File Signatures to determine changes in file extensions

  • Other Pre-Processing items, including execution of queries and scripts to identify additional items in need of analysis

  • Partition Finder Recovery and analysis to determine spoliation of evidence

  • Extraction and analysis of web browser history

  • Decryption of password-protected and encrypted items

  • Analysis of graphic and picture files

  • Notable File Identification to classify and segregate the image files whose unique electronic identifier matches the National Institute of Standards Technology list of “known files”

  • Review of program files for unusual programs or programs of interest (i.e. malware, viruses, disk wiping tools)

  • Deletion Analysis:

  • INFO2 Record Review
    Deletion Search Terms
    Timeline Analysis of deletion habits prior to computer imaging

Request Computer Forensics Information Sheet