Computer analysis involves the scientific examination and analysis of electronic information stored on a wide variety of computer, mobile and digital-storage devices, such as:
- Computer Systems, such as servers, desktops, laptops, digital video/audio recorders, gaming systems, and Internet of Things (IoT) devices;
- Including advanced methods to acquire information from damaged and/or secured devices;
- Mobile Devices, such as cellular telephones, tablets, and GPS navigation devices;
- Including advanced methods (repair, JTAG, ISP, Chip-Off, etc.) to acquire information from damaged and/or secured devices;
- Digital-Storage Devices, such as hard-disk drives, flash memory, and optical discs;
- Including advanced methods (repair, Chip-Off, etc.) to acquire information from damaged and/or secured devices.
Analysis can result in the identification, and recovery of:
- Existing, previously-existing (deleted) and/or fragmented data;
- Electronic communications, such as email, chat and text / multimedia messages;
- User activity or usage patterns, such as web-browser (Internet) activity, call logs, and application usage/activity;
- Multimedia files, such as pictures, audio and video recordings;
- Transient data – encryption keys, passwords, etc.