Computers and Media
The world in which we live and act is becoming an increasingly digital world. Most of everyday’s communication is digital, by way of smart phones, computers and cameras.
Most of the documents we know are produced as electronic files, as are all text messages (SMS) and the correspondence by means of telephone.
The Institute of Forensic Science operates a laboratory for computers and media which provides solutions for all digital questions in a wide variety of areas: Starting with criminal investigations via damage claims to industrial espionage and security breaches and personal affairs.
There are four topics in which
the computer and media section focuses:
Analysis of events and situations
Authentication of files
Authentication of Electronic Files
Most of the information known to us today is stored in electronic files. The files are found on computer drives, recording devices, cameras, telephones, players and in every media storage device.
In addition to electronic files, information is stored on other devices – magnetic audio or video tapes or magnetic cards.
The experts at the Institute of Forensic Science are experts in determining the authenticity of every type of electronic file and record.
The authentication of electronic files and other storage devices examines a number of factors, among them the following
All factors examined provide details about the
originality and reliability of the information.
Communications investigations concerning cell phones make it possible to provide answers in the following cases
The investigation of communications is a very
effective tool in criminal investigations.
Nevertheless, one should know that, although the investigation of communications can provide evidence on the device, it cannot do so as far as the owner of the device is concerned.
Analysis of events and situations
In analyzing events and situations, the experts of the Institute of Forensic Science carry out actions of improving, slowing down and dividing the digital media, in order to present the event as it happened
Analyzing events and situations answers the following questions
Security Breaches and
Recovery of Files
Computers with access to the internet bear the risk of being infiltrated by malware or spyware
The investigation of security breaches
provides answers to the following questions
Malware can destroy part of the information found on the computer.
In addition to this, files are sometimes erroneously
erased and must be restored.
The recovery process transfers the required file from a place where it is inaccessible to a location where it can be retrieved.
Sometimes, the recovery process might cause permanent damage to the computer’s drive after the required material has been recovered
The computer and media section gives
services in various areas
velocity determination, authenticity of media, people recognition.
Analysis of situations and movements, authenticity of media, people recognition,
dating of media formation speaker recognition.
File authenticity is checked, and claims made in the context of a filmed event are checked.
File authenticity is checked.
The institute's experts can, based on testing the remains of biological material left in the vehicle and comparing DNA, know where the passengers of a vehicle that had an accident sat. This test is very important when there is a suspicion of changing drivers due to an accident.
The department also examines marks left on those involved in the accident by other involved, in order to know the mutual directions of movement, and to understand the factors of the injury.