Computer Forensics

Exponent computer engineers and scientists perform secure disk and cell phone imaging and analysis. We also have facilities to host secure computer inspections and source code inspections. In our Menlo Park facility we have key-card restricted and padlocked metal lockers for secure computer data or source code storage. Disks and other data sources can be protected by hardware-level write blocking tools such as the Wiebe Forensic Combo-dock during inspection or imaging of data. Physical machines can be secured in our steel computer locker. We also have computer forensic software tools to aid in disk, operating system, filesystem, and software inspection and analysis. In addition to proprietary code and scripts, we also use commercial software tools such as EnCase Forensic v7 and IDA Interactive Disassembler.