Custodire — return to home

Forensic Methodology

Our forensic methodology is designed for admissibility, not merely investigation. The evidential value of synthetic media analysis depends not on technical sophistication alone, but on whether the methodology can withstand scrutiny in court. We therefore structure the entire process — preservation, collection, analysis, reporting, and testimony — to meet the standards applied at the point of admission in the principal jurisdictions in which we operate.

Reliability criteria

Our approach is built to address the reliability criteria applied to expert scientific evidence in leading jurisdictions, including US Federal proceedings, England and Wales, and comparable international frameworks.

Testability

Our methodology is based on documented, reproducible analytical processes. A qualified forensic examiner working from the same evidential record should be able to replicate the analytical steps and assess the basis of the conclusion. Where proprietary tooling is used, the underlying analytical logic is documented to a standard that permits independent scrutiny. We do not base expert opinion on black-box outputs. Every conclusion must be traceable to specific technical observations capable of explanation and review.

Known error rates

We maintain documented error rates for each analytical method we deploy, derived from validation testing against datasets of known authentic and synthetic material. These rates distinguish false positives from false negatives. Error rates are disclosed where relevant. We do not characterise a finding as definitive unless the validated performance of the method supports that characterisation. Where it does not, we say so plainly.

Peer review and validation

The methods we use are grounded in established research across forensic science, computer vision, audio engineering, and digital evidence. We monitor the literature continuously and update methodology where validated advances materially improve reliability. Where we develop novel methods in response to emerging threats or tools, those methods are documented and internally validated before being relied upon for definitive opinion.

Operational standards

We maintain written standards governing evidence preservation, handling, analysis, and reporting. Those standards are applied consistently across engagements. Any departure from standard procedure is documented, justified, and disclosed. No report intended for proceedings is issued solely on the basis of an unreviewed single-analyst assessment.

Scientific limits

Synthetic media detection is an established and rapidly developing area of forensic practice. Core methods such as metadata forensics, spectral audio analysis, temporal and spatial consistency analysis, and artefact-based examination are recognised within the wider digital evidence community. We are equally explicit about scientific limits, including uncertainty across generation models, degradation caused by recompression or format conversion, and the possibility that poor collection practices may weaken or destroy forensic indicators. Our reports reflect those limits accurately.

Chain of custody

A forensic conclusion is only as strong as the continuity of the evidence on which it rests. Informal response measures — including screenshots, manual copying, re-recording, or platform-level removal before preservation — commonly destroy evidential continuity. Once lost, that continuity may be impossible to restore.

Original-file collection

Evidence is collected in its native file format wherever possible, preserving headers, metadata, container information, and encoding artefacts. Screenshots and manual recordings are not treated as primary preservation methods except where no better evidential source exists.

Cryptographic hashing

Each item is cryptographically hashed at first collection to create an immutable record of its state at acquisition. Subsequent copies can then be verified against that record.

Segregated storage

Evidence is held in infrastructure segregated from both the client’s operational environment and our commercial systems. Access is logged and auditable.

Restricted access

Access is limited to personnel with a direct operational requirement within the engagement. Access events are recorded with timestamp, identity, and purpose.

Retention and destruction

Evidence is retained only for the period required under the engagement or any applicable legal hold. Destruction is documented and confirmed.

Continuity record

A continuity log records each transfer, copy, access event, and analytical operation performed on the evidence from discovery through disclosure. Where proceedings require it, that record forms part of the reporting package.

Expert reports and testimony

Our forensic reports are prepared to the standard required for expert evidence in the relevant jurisdiction, not merely for internal briefing. That distinction is material. A report suitable for internal decision-making will often be inadequate for formal proceedings.

Report structure

Reports follow the structure required by the applicable procedural framework, including declarations, statement of instructions where required, identification of facts and materials relied upon, and clear separation between factual findings and expert opinion.

Opinion discipline

We do not advance opinions beyond what the evidence and methodology can support. Where the evidence permits more than one reasonable conclusion, the report states that range and explains the basis for any preferred view.

Cross-examination readiness

Reports are written on the assumption that they may be tested by technically capable opposing experts and by counsel under cross-examination. Analytical steps are documented in sufficient detail to be explained clearly without loss of technical accuracy.

Availability for testimony

Where required and agreed under the engagement, our analysts are available to provide oral evidence. We do not issue reports for proceedings that we are unwilling to defend.

Jurisdictional application

Our methodology is designed for use in adversarial proceedings and regulatory matters across common law and civil law contexts. Where a matter is expected to proceed in a specific jurisdiction, the reporting structure and evidential handling protocol are aligned with the applicable procedural requirements at the outset of the engagement. The standard we apply is the standard that matters when the analysis is placed before a court. Preservation, custody, analysis, reporting, and testimony are all structured with that endpoint in view.

Secure enquiry →

References to legal and procedural frameworks are provided for general orientation only and do not constitute legal advice. Applicable admissibility standards should be confirmed by instructing counsel in the relevant proceedings.