VFC v2

In order to examine a suspect’s computer, Law Enforcement professionals will usually undertake forensic cloning /imaging of the original storage device, effectively copying all the data stored on the suspect’s computer for later analysis, using specialist forensic software. This secured … Continue reading VFC v2