Computer forensics

Computer forensic analysis for litigation and investigations.

Computers can contain a broad record of user activity, file access, internet history, downloads, external device use, email records, deleted data, and system artifacts. Rune Forensics reviews those records and explains what can be supported.

Scope

Computer activity leaves records

The analysis is scoped to the question. In some matters that means a narrow review of a few records. In others it means building a timeline across files, accounts, logs, and user activity.

When this work matters

  • File access or transfer questions
  • Deleted data concerns
  • External storage activity
  • Internet history review
  • Email and attachment analysis
  • User activity timelines

Evidence sources

  • Laptops and desktops
  • Forensic images
  • User profiles
  • Browser artifacts
  • Email files
  • Logs, metadata, and system records

What clients receive

  • Forensic imaging when needed
  • Focused analysis of relevant artifacts
  • Timeline reconstruction when supported
  • Clear reporting of findings and limits
  • Consultation for discovery, investigation, or testimony support

Consultation

Request a focused review

Computer forensic work is strongest when the original device or forensic image is preserved before normal use changes the available records.

Request consultation