Billing Records
Billing Records
The network provider can serve information, beyond normal billing records, relating to mobile handset utilisation which can be especially valuable in identifying usage, activity, patterns and the movements of a given mobile telephone handset. This information can be served in a variety of formats and due to the structure and complexity is typically...
Read More
Read More
CPD Lectures
CPD Lectures
Afentis Forensics is accredited by the Solicitors Regulation Authority and also the Bar Standards Board to offer free CPD lectures and courses covering investigations and using forensic science to prepare for court proceedings. All CPD lectures provide Continuing Professional Development (CPD) credits and are designed to bring textbook theory to li...
Read More
Read More
Mobile Telephone Forensics
Mobile Telephone Forensics
Technological advances have created mobile communication devices and Personal Digital Assistants (PDAs), such as the iPhone and Blackberry, capable of making voice calls as well as browsing the Internet and accessing email. Whilst telephones devices can hold only a relatively small amount of data when compared to desktop computers, the results of m...
Read More
Read More
Forensic Examinations
Forensic Examinations
The discipline of identifying, preserving, and evaluating evidence found in a wide assortment of places, is the focus of forensic examinations.  Almost every interaction in life – from driving a car or using a mobile telephone, leaves behind traces.  Whether DNA, skin cells, cell site analysis, or data fragments on a computer – these ...
Read More
Read More
CCTV & Audio Enhancement Authentication
CCTV & Audio Enhancement Authentication
Our CCTV & audio enhancement expert witness consultants are experienced in identifying, extracting and preserving recording evidence from all manner of platforms and devices. We are able to forensically examine systems and reconstruct media from damaged systems or render corrupted images intelligible. Working in strict compliance with Associat...
Read More
Read More
Computer Forensics
Computer Forensics
Almost every memo, spreadsheet and document is created on a computer. Whether it is a PC, Mac or Linux operating system, the computer forensics investigator must be able to identify, seize, collect and preserve electronic evidence. Tracing the digital footprint starts upon the seizure of potential electronic evidence by an experienced analyst. As e...
Read More
Read More
Indecent Images
Indecent Images
Almost every memo, spreadsheet and document is created on a computer. Whether it is a PC, Mac or Linux operating system, the computer forensics investigator must be able to identify, seize, collect and preserve electronic evidence in indecent images of children (IIoC) cases. ‘Child pornography’ – or possession/distribution of indecent images ...
Read More
Read More
Fingerprint Evidence & Footprints
Fingerprint Evidence & Footprints
Fingerprint evidence identification, known as dactyloscopy, or hand print identification, is the process of comparing two instances of friction ridge skin impressions, from human fingers, the palm of the hand or even toes, to determine whether these impressions could have come from the same individual. The flexibility of friction ridge skin means t...
Read More
Read More
DNA Evidence
DNA Evidence
Perhaps one of the most powerful and commonly known investigative forensic techniques; the science of dna evidence was pioneered in the early 1980′s by SIR ALEC JEFFREYS at the University of Leicester, and concerns the genetic make-up of organic samples (e.g. blood, skin cells, hair follicles). Whilst over 99.99% of human DNA is common between in...
Read More
Read More
Data Recovery
Data Recovery
Data loss or corruption can be crippling to both businesses and lawful investigations. Our data recovery analysts have extensive experience in recovering and salvaging lost data from disaster stricken hard drives, RAID Arrays, laptops, e-mail servers, ipods, USB memory sticks, and storage media of every brand, manufacturer, model and data storage c...
Read More
Read More
eCrime Graduates & Placements
eCrime Graduates & Placements
Each year, AFENTIS FORENSICS recruits graduates and placement students who are passionate about a career in DIGITAL EVIDENCE AND TECHNOLOGY FORENSICS. Successful eCrime Graduates & Placements applicants will be given unique training and development opportunities, participate in ‘Best Practice’ Government Working Groups, Policy Debates, and...
Read More
Read More
Forensic Case Studies
Forensic Case Studies
Regularly instructed in the most high profile investigations and sensitive matters on the criminal and civil court circuits; a selection of forensic case studies and recent casework examples: ICC v K Sensitive proceedings in the International Criminal Court (Hague) relating to prominent international politician. R v KELAY Charged with conspiracy un...
Read More
Read More

Forensic scientists & law society certified expert witnessesLive Help

Leading investigation practice, providing sophisticated analysis of computers, telecommunication and mobile telephone evidence, call record mapping and cell site analysis (CSA), litigation support through e-Discovery, indecent imagery (Operation Ore), and audio-visual exhibit assessments. Certified analysts are available to assist in drug evaluations, toxicology assessments, DNA profiling, cell site analysis, fingerprint comparisons, firearm or ballistic studies, and the review of questioned documents.

Our analysts are regularly instructed in the most high profile and sensitve cases acting as forensic scientist & cell site analysis expert witness, trial consultants, and single joint experts (SJE) in both civil and criminal proceedings.

  • legal aid