Mobile Phone Forensics

Forensic acquisition of phones, calls, sms, emails, photos, chat logs, IM

Computer Forensics

Forensic acquisition of computers, networks and portable storage devices

CyberCrime Investigation

Investigation of Internet traffic, social media and cyber enabled crimes.

Our Platforms

Keysight Technologies Inc. (NYSE: KEYS) is the world's leading electronic measurement company.
AccessData has developed other industry-leading solutions to assist in recovery.
The Gold Standard in Digital Investigation.
The Gold Standard in Mobile Phone Investigation.
Maltego is an interactive data mining tool that renders directed graphs for link analysis.
Trend Micro is the global leader in enterprise data security and cyber security.

CCIU Sections & Services

Forensic Acquisition

Mobile Phone Forensic

Forensic acquisition of phones, calls, sms, emails, photos, chat logs, IM

Mobile phones are proven to be valuable sources of information in the majority of investigations. Parties in litigation seeking to prove wrongdoing often find important evidence, clues and traces by analyzing activities stored on cell phones and smart devices, including contacts and their creation dates as well as when and how often certain phone numbers were called.

Learn more
HDD | Flash | NAND

Computer Forensics

Digitpol’s computer forensics experts investigate, analyse and recover forensic data from computers, portable devices and hard disk drives.

Computer forensics is the preservation, identification, acquisition, examination, and presentation of information found on computers and networks relating to a criminal or civil investigation. Computer forensics is also known as cyber forensics or digital forensics.

Look more

CyberCrime Investigation

Investigation of Internet traffic, social media and cyber enabled crimes.

Investigation of Internet traffic, social media and cyber enabled crimes.

Look more
Cybercrime Training - We follow the standards

Digitpol recommends and supports UCD Centre for Cybersecurity & Cybercrime Investigation (UCD CCI) as the only place to study in Computer Forensics, UCD CCI is a unique, world-class education and research centre with strong and well-established collaborative relationships with law enforcement and industry.

For over 15 years, UCD CCI has equipped teams of international cybercrime experts with the skills, knowledge and tools to pre-empt and protect against increasingly serious cybercrime attacks. The Centre’s exceptional research and training techniques have empowered national and international law enforcement agencies such as An Garda Síochána, INTERPOL and Europol, industry sector groups such as the Irish Banking Federation (IBF), and large global corporations such as Microsoft.

UCD CCI has created a network of formal relationships with INTERPOL, Europol, Visa (Europe), the IBF and IMPACT, and informal collaborations with UNODC (United Nations Office on Drugs and Crime), the OSCE (Organization for Security and Co-operation in Europe), OLAF (the European Anti-Fraud Office), Microsoft, CitiBank, INFACT and eBay.

UCD CCI works closely with law enforcement to identify key focus areas for research, training and tool development.

Unauthorised access

We investigate and analyse unauthorised access or hacking incidents such as when someone gains access to your computer or device without your permission. Hackers may gain access to your computer or device through security weaknesses, malware or phishing. Once they have compromised your email, banking or social media accounts, they can change passwords preventing you from accessing your account. Scammers often send out messages impersonating and directing people to fake websites, or asking them to send money. Modern attacks are very sophisticated and the fake websites may seem to be genuine.

Privacy Preference Center

Close your account?

Your account will be closed and all data will be permanently deleted and cannot be recovered. Are you sure?

Are you sure?

By disagreeing you will no longer have access to our site and will be logged out.