Cookies on the
LGC website
We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we’ll assume that you are happy to receive all cookies on the LGC website. However, if you would like to, you can change your cookie settings at anytime.
Question markFind out more

Computer investigations

Today, almost every criminal investigation will include a computer-based line of enquiry - from the more obvious acts of terrorism, murder, internet scams and indecent images of children, to the less obvious burglaries, violent disorder or stealing an osprey's egg.
Using the latest forensic techniques, we will work closely with you to establish the facts. The team can draw on experience in a wide variety of cases and can advise on lines of inquiry that may not at first be apparent. They can also draw on the other disciplines in LGC Forensics to provide a complete solution. This may be to enhance video footage found on a PC or obtain cell site information from a phone number found on a laptop.
We can tailor the output to suit you, whether it's a written report, a CD or an electronic presentation. The reports are easy to understand and the investigator can come to your place of work to explain any issues that need further explanation and, if required, carry out on-site analysis using a complete mobile computer forensic suite.
Our ISO9001-accredited analysts are security-cleared, qualified to provide expert witness testimony, are listed in the Expert Witness Directory and have a wealth of law enforcement experience to draw on. Our investigations follow the ACPO Good Practice Guide for Computer Based Electronic Evidence and Forensic Regulator guidelines, notably:
Principle 1: No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court.
Principle 2: In circumstances where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.
Principle 3: An audit trail or other record of all processes applied to computer-based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.

Principle 4: The provider shall have the ability to demonstrate that any tools, techniques and methods used are fit for purpose.

Principle 5: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.
Principle 6 An individual is responsible for all actions taken with respect to digital evidence while the digital evidence is in their possession.