Computer Forensic Investigation

Advanced Computer Forensic

Malware Detection & Analysis | Carving Deleted Space | Decryption methods | Immediate Response Situations

Application Forensics

Windows Application Analysis | Registry analysis | Live Systems application | Analysis of Data | Live Running Applications

Time Line Analysis

File System Meta data | Event Logs | Dynamic Analysis | Network Capture | USB logs

Registry Analysis

Hive Analysis | NetworkLst | USB Device Analysis | Shell bags | MUICache

Computer Forensics


Digitpol’s computer forensics experts investigate, analyse and recover forensic data from computers, portable devices and hard disk drives. We ensure that no digital evidence is overlooked and assist at any stage of an investigation, regardless of the size or location of data sources. Claims of leaks, fraud, cyber espionage, financial tampering, computer crime, employee misconduct, and other illegal or wrongdoing actions require corporations, law firms, and government agencies to deploy digital forensic methods to piece together facts that lead to the truth.


Computer forensics is the preservation, identification, acquisition, examination, and presentation of information found on computers and networks relating to a criminal or civil investigation. Computer forensics is also known as cyber forensics or digital forensics.



FTK – An Industry Standard

At Digipol, we utilize vendor computer forensic tools such as FTK from Access Data

Unauthorised access

We investigate and analyse unauthorised access or hacking incidents such as when someone gains access to your computer or device without your permission. Hackers may gain access to your computer or device through security weaknesses, malware or phishing. Once they have compromised your email, banking or social media accounts, they can change passwords preventing you from accessing your account. Scammers often send out messages impersonating and directing people to fake websites, or asking them to send money. Modern attacks are very sophisticated the fake websites may seem to be geniune.


Criminals may use malicious software (or malware) to monitor your online activity and cause damage to the computer. Malware is often downloaded when people open an infected email attachment or click a suspicious link in an email. Malware can also be used to steal your usernames, passwords or other information, which is then forwarded to a third party.

‘Malware’ is a catch all term to describe different types of malware which include viruses, worms, spyware, trojans or bots.

The Training


Digitpol recommends and supports UCD Centre for Cybersecurity & Cybercrime Investigation (UCD CCI) as the only place to study in Computer Forensics, UCD CCI is a unique, world-class education and research centre with strong and well-established collaborative relationships with law enforcement and industry.

For over 15 years, UCD CCI has equipped teams of international cybercrime experts with the skills, knowledge and tools to pre-empt and protect against increasingly serious cybercrime attacks. The Centre’s exceptional research and training techniques have empowered national and international law enforcement agencies such as An Garda Síochána, INTERPOL and Europol, industry sector groups such as the Irish Banking Federation (IBF), and large global corporations such as Microsoft.

UCD CCI has created a network of formal relationships with INTERPOL, Europol, Visa (Europe), the IBF and IMPACT, and informal collaborations with UNODC (United Nations Office on Drugs and Crime), the OSCE (Organization for Security and Co-operation in Europe), OLAF (the European Anti-Fraud Office), Microsoft, CitiBank, INFACT and eBay.

UCD CCI works closely with law enforcement to identify key focus areas for research, training and tool development.

Sophisticated attacks

Sophisticated criminals are active daily to exploit vulnerabilities on computers and other devices. Some of the techniques they use include:

  • unauthorised access or hacking – when someone gains access to your computer or device without permission,
  • malware – malicious software (such as viruses, trojans and spyware) which monitor your online activity and cause damage to the computer,
  • denial of service attacks – an attack which floods a computer or website with data, causing it to overload and prevent it from functioning properly. This type of attack is more frequently targeted at businesses, rather than individuals.

Denial of service or distributed denial of service attacks

Cyber attacks are common and often a method seen is a denial of service attack which floods a computer or website with data, which can overload the system or computer and prevent it from functioning properly. Unlike hacking or malware, it generally doesn’t involve access to the computer system. A distributed denial of service (DDoS) attack is a denial of service attack that comes from multiple systems, often a network of compromised computers.


European Cybercrime Training and Education Group

E.C.T.E.G is composed of participants from European Union Member States and candidate countries law enforcement agencies, international bodies, academia and private industry. Martin Coyne represented The Netherlands from 2010 – 2013

Learn More


Collaborating to fight High Tech crime

HTCC is an international organization connecting cyber cops and investigators, sharing information and offering each other help and advice in Cybercrime matters. Martin Coyne joined HTTC in 2009. HTTC – Helping law enforcement since 1998

Learn More


Information Security and Forensics Society (ISFS)

ISFS, Our mission is to advocate and enforce professionalism, integrity and innovation in Information Security and Computer Forensics in Hong Kong and the surrounding region. Martin Coyne joined ISFS in 2014

Learn More