Partnerships

Belkasoft
Elcomsoft
Legal & Other

Disclaimer
Cookies
Use of this website (T&Cs)    
Environmental Responsibility
Compliance
Data Privacy
Documentation

Articles
White Papers
Brochures
Press Releases
Subscribe to our Newsletter

Our Websites

Visit our sister websites
Copyright Strathclyde Forensics © 2009-2015. All Rights Reserved.
About us

Our People
Our Clients
What our Clients say
High Profile Cases
Contact us
Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB
Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor) Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor)
"Absence of evidence is not
evidence of absence"
Our Blogs

Check out our Blogs
Terrorist Alerts

MI5 (UK)
Department of Homeland Security (USA)

Cyberattacks (real time)
Kaspersky
FBI Cyber Most Wanted

Home
ICTTF logo ICTTF logo
ACPO Guidelines ACPO Guidelines
Scottish Legal Aid logo Scottish Legal Aid logo
The American Society of Digital Forensics & eDiscovery The American Society of Digital Forensics & eDiscovery
Limbus Studio Limbus Studio
DFS Logo DFS Logo
Digital Forgery
Strathclyde Forensics are currently evaluating Belkasoft's Photo Manipulation (forgery) Detection software. The results of a test sample are shown in the pictures below (source: Belkasoft)
Digital artifacts are subject to forgery as much as any others. Documents, images, sound recordings, can all be manipulated.
Detecting digital forgeries is a sophisticated skill. We have worked on several cases of video and images, where we detected manipulation of some kind.
Forgeries can be also digital and tangible. There are cases of forged CD and DVD disks, credit cards, loyalty cards, and even travel cards like London's Oyster.

Forged DVDs from China or other far Eastern countries, can be excellent. We have acquired DVDs that look better than the original ones.

Contact Strathclyde Forensics and get expert advice now.
Forged images like the one on the left, can be used for a variety of reasons, from accusing someone, to make claims on land and property.

All digital files, media or documents however have hidden information inside them, what we call "metadata". This metadata is often the source of information that will identify a forged item and its source.