2019 Family Law Through to Homicides – A Varied and Informative Half Year
I have been working on several homicide and fraud cased endeavouring to reconstruct events surrounding mobile phone usage, cell tower events, server logging and email compromises. Much of the work has been looking for anomalies to assist the legal teams and provide...
2018 Cyber Paranoia & Poor Computer & Network Security
Five cyber-bullying and stalking examinations recently completed and a major online fraud in the first half of 2018 reflect the insidious growth of malicious exploitation of individuals resulting in loss of income, reputation and well-being.Imprudent use of social...
Acquittal of Serious Assault Charge
A review of a serious assault charge identified a misinterpretation of witness testimony when compared with recovered digital evidence data.Beware of the Obvious Fact… Poor evidence handling, unauthorised and unexplained access and alteration to data, and a...
Review of Digital Evidence & Chain of Custody Exhibit Mishandling
Search Warrant Video review and Mobile phone analysis in a drug trafficking case identified and detected digital exhibit mishandling and evidence misinterpretation.Search Warrant Video review and Mobile phone analysis in a drug trafficking case identified and detected...
Completing Evidence-Led Forensic Examination & Review of Digital Evidence In Serious Criminal Cases
The ability to analyse digital evidence to produce timely forensic examination reports for counsel that include understandable and clear narrative is key to Forensics Australia’s success.The ability to analyse digital evidence to produce timely forensic examination...
Verifying The Innocence of An Alleged ‘Troll’ With Mobile Phone Analysis
Discovery of a significant amount of exculpatory evidence from a mobile phone in an alleged cyber stalking case resulted in the case being subsequently withdrawn by the prosecution.Discovery of a significant amount of exculpatory evidence from a mobile phone in an...
Recovery of Data Stolen Through Industrial Espionage
I successfully performed a recovery and retrieval of a large set of deleted files from an organisation’s former employee’s computer that had been stolen from the employer as an act of industrial espionage.I successfully performed a recovery and retrieval of a large...
Examination of Mobile Phones Used In Alleged Rape & Bomb Threat Cases
The analysis of Mobile phones and other telecommunications data provided by Forensics Australia led to a greater understanding by the legal team of the claims and enabled them to reconsider the evidence resulting in more fully reasoned outcomes for their clients in...
Review of Digital Evidence to Determine Suspect Culpability
I was able to locate digital evidence, which was identified as significant exculpatory evidence, from a range of computers seized in a number of criminal cases (including child exploitation investigations).I was able to locate digital evidence, which was identified as...
Data Analysis Identifies & Eliminates Hate Mail Suspects
I recently provided data analysis that led to an early resolution to a threatening email case that occurred within a large private organisation.I recently provided data analysis that led to an early resolution to a threatening email case that occurred within a large...
Welcome to Forensics Australia, The Home of Quality Digital Forensics
Forensics Australia is now open for business and offering quality digital forensics services. My name is Richard Boddington and I offer an extensive range of experience, skill sets and knowledge in the computer and mobile deviceMy name is Richard Boddington and I...