We live in a computerized world, where much of our interaction is dictated through technology. This leaves a growing space for malicious, criminal activity in the digital realm.

Police expert examines hard drive in search of evidence, conceptual imageHowever it’s defined—physical imaging, sector copying, bitwise duplication—forensic duplication has a strict set of rules, usually set at the Federal level, for good reason.  When dealing with a chain of evidence, any deviation could be interpreted as a breach, a miscalculation or evidence of tampering. Either way, a break in this structure means valuable data becomes unusable, and even worse, inadmissible.

Today’s digital forensic duplication tools help capture, preserve and analyze evidence on digital devices, so connections between recovered information can be made, validated and then used in the chain of evidence.

Duplication that ensures data integrity

Validation of proof, without any hint of data tampering, is paramount.  And logical data copies alone don’t include all the relevant back data needed for forensics analysis, including allocated and unallocated data as well as timestamps and file metadata.

The use of specific standards such as hash functions, tables and codes, for example, which serves as a digital fingerprint for a specific dataset, ensures the integrity of that data. The underlying data can be proven identical, unaltered and unchanged. These help to uphold the principles of best evidence.

When it comes to gathering evidence and preventing future cybercrimes, e-discovery and digital activity tracking have become some of the most important tools for law enforcement and other legal entities. Having access to the latest tools in computer forensic acquisition to deter cybercrime in all forms will help protect private citizens and uphold justice.

Trusted technology for forensic analysis

Cybercrime will only continue to grow, but so will the sophistication of digital forensic systems used to apprehend and convict malicious actors, hackers, attackers and others with harmful intent.  Ensuring 100% guaranteed error-free duplication, when it counts the most, is at the heart of every JMR/ICS Forensic disk duplication system. As we develop our forensic data analysis products, we keep this clearly as our point of focus.

Cybercrime statistic


Available in a variety of sizes, our products have a multitude of features designed specifically for computer forensic acquisition, and they’re fast, with acquisition speeds approaching 100 GB/min on the newer models.

Our products integrate an extremely versatile toolset essential to ensure the security and concealment of extracted forensic data, offering the most comprehensive and critical features to digital and cyber forensics teams:

  • Data authenticity
  • On-the-fly encryption
  • 100% guaranteed error-free cloning
  • Verified contextual data
  • Inclusion of unallocated partitions
  • Unaltered metadata

Used extensively by law enforcement, federal and international agencies, JMR/ICS forensics duplication systems provide state-of-the-art technology that acquires data at a rate previously unseen in the computer forensics industry.

Customer service and cutting edge solutions

When computer felony surged in the mid-1990s and became a serious factor in crime, JMR/ICS collaborated with law enforcement agencies, emerging as the predominant supplier of computer forensic systems for agencies as diverse as local police departments to Federal and International organizations. Today, government agencies globally depend on our products.

JMR/ICS forensic disk duplicators are used around the world, from the U.S., Canada, Europe and the Middle East to Australia, New Zealand, China, Japan and India. Cybercrime is on the rise with the increased availability of the internet, but with the right resources, forensic analysts can do their job quickly, efficiently and with confidence.