Text this: Computer technique for the suitability of digital evidence in attacking an information system: Forensic analysis for the digital custody chain