Computer Forensic Investigation
Advanced Computer Forensic
Malware Detection & Analysis | Carving Deleted Space | Decryption methods | Immediate Response Situations
Windows Application Analysis | Registry analysis | Live Systems application | Analysis of Data | Live Running Applications
Time Line Analysis
File System Meta data | Event Logs | Dynamic Analysis | Network Capture | USB logs
Hive Analysis | NetworkLst | USB Device Analysis | Shell bags | MUICache
Digitpol’s computer forensics experts investigate, analyse and recover forensic data from computers, portable devices and hard disk drives. We ensure that no digital evidence is overlooked and assist at any stage of an investigation, regardless of the size or location of data sources. Claims of leaks, fraud, cyber espionage, financial tampering, computer crime, employee misconduct, and other illegal or wrongdoing actions require corporations, law firms, and government agencies to deploy digital forensic methods to piece together facts that lead to the truth.
Computer forensics is the preservation, identification, acquisition, examination, and presentation of information found on computers and networks relating to a criminal or civil investigation. Computer forensics is also known as cyber forensics or digital forensics.
FTK – An Industry Standard
At Digipol, we utilize vendor computer forensic tools such as FTK from Access Data
We investigate and analyse unauthorised access or hacking incidents such as when someone gains access to your computer or device without your permission. Hackers may gain access to your computer or device through security weaknesses, malware or phishing. Once they have compromised your email, banking or social media accounts, they can change passwords preventing you from accessing your account. Scammers often send out messages impersonating and directing people to fake websites, or asking them to send money. Modern attacks are very sophisticated the fake websites may seem to be geniune.
Criminals may use malicious software (or malware) to monitor your online activity and cause damage to the computer. Malware is often downloaded when people open an infected email attachment or click a suspicious link in an email. Malware can also be used to steal your usernames, passwords or other information, which is then forwarded to a third party.
‘Malware’ is a catch all term to describe different types of malware which include viruses, worms, spyware, trojans or bots.
Digitpol recommends and supports UCD Centre for Cybersecurity & Cybercrime Investigation (UCD CCI) as the only place to study in Computer Forensics, UCD CCI is a unique, world-class education and research centre with strong and well-established collaborative relationships with law enforcement and industry.
For over 15 years, UCD CCI has equipped teams of international cybercrime experts with the skills, knowledge and tools to pre-empt and protect against increasingly serious cybercrime attacks. The Centre’s exceptional research and training techniques have empowered national and international law enforcement agencies such as An Garda Síochána, INTERPOL and Europol, industry sector groups such as the Irish Banking Federation (IBF), and large global corporations such as Microsoft.
UCD CCI has created a network of formal relationships with INTERPOL, Europol, Visa (Europe), the IBF and IMPACT, and informal collaborations with UNODC (United Nations Office on Drugs and Crime), the OSCE (Organization for Security and Co-operation in Europe), OLAF (the European Anti-Fraud Office), Microsoft, CitiBank, INFACT and eBay.
UCD CCI works closely with law enforcement to identify key focus areas for research, training and tool development.
Sophisticated criminals are active daily to exploit vulnerabilities on computers and other devices. Some of the techniques they use include:
- unauthorised access or hacking – when someone gains access to your computer or device without permission,
- malware – malicious software (such as viruses, trojans and spyware) which monitor your online activity and cause damage to the computer,
- denial of service attacks – an attack which floods a computer or website with data, causing it to overload and prevent it from functioning properly. This type of attack is more frequently targeted at businesses, rather than individuals.
Denial of service or distributed denial of service attacks
Cyber attacks are common and often a method seen is a denial of service attack which floods a computer or website with data, which can overload the system or computer and prevent it from functioning properly. Unlike hacking or malware, it generally doesn’t involve access to the computer system. A distributed denial of service (DDoS) attack is a denial of service attack that comes from multiple systems, often a network of compromised computers.
European Cybercrime Training and Education Group
E.C.T.E.G is composed of participants from European Union Member States and candidate countries law enforcement agencies, international bodies, academia and private industry. Martin Coyne represented The Netherlands from 2010 – 2013
Collaborating to fight High Tech crime
HTCC is an international organization connecting cyber cops and investigators, sharing information and offering each other help and advice in Cybercrime matters. Martin Coyne joined HTTC in 2009. HTTC – Helping law enforcement since 1998
Information Security and Forensics Society (ISFS)
ISFS, Our mission is to advocate and enforce professionalism, integrity and innovation in Information Security and Computer Forensics in Hong Kong and the surrounding region. Martin Coyne joined ISFS in 2014