
e: richard@richardadams.com.au
m: +61 (0)404 464495
# author of the Advanced Data Acquisition Model used throughout the world by law enforcement, commerce and academia
Dr Richard Adams#
Digital Forensics, eDiscovery, I.T. Forensics Expert Witness
Perth - Western Australia
Based in Perth I am one of the most experienced computer forensics practitioners in Australia and worked as a Principal for Deloitte between 2004 and 2013. I am the only digital forensics practitioner in the world that also has two PhDs in digital forensics and now, as well as providing consultancy services, I help develop digital forensic, e-Discovery and incident response software as Xtremeforensics.
Recent work has involved assisting criminal lawyers in a variety of cases including murder, cell tower log analysis and possession of Child Exploitation Material, as well as assisting commercial lawyers in cases such as theft of IP and eDiscovery.
During my time at Deloitte I was involved in several significant matters that included the ASIC Westpoint investigations (where I was engaged by ASIC to manage the collection and processing of all the electronic material) and the $3.2 million Racing and Wagering Western Australia dispute with Software AG (where I was engaged by RWWA to provide expert testimony in relation to disaster recovery testing and mainframe software installation).
I obtained my first PhD in Information Technology (Digital Forensics) when I began working with a US company to develop cutting-edge technology for digital forensics and incident response. This software has now been used by several large organisations that include NASA and Northrop Grumman. I have also undertaken selective engagements that have included a high-profile murder trial and several high-profile investigations by the Department of Primary Industry and Regional Development.
My second PhD is in Information Systems (Digital Forensics) and involves the development of a framework to assist digital forensics practitioners test and evaluate tools that deploy remote agents for data collection.
Qualifications and experience
I have the following qualifications:
-
Cert III in Investigative Services
-
Higher National Certificate - Electronics
-
Postgraduate Diploma - Management and Marketing
-
Master of Arts – Management and Computer Studies
-
Doctor of Philosophy – Information Technology (Digital Forensics)
-
Doctor of Philosophy - Information Systems (Digital Forensics)
I am a member of the High Technology Crime Association
I have the following relevant experience:
I am a committee member of the Australian Standards organisation as part of the International Standards Organisation Working Group for Digital Evidence.
I am the Independent Auditor for the WA Electoral Commission for technology-assisted voting being responsible for ensuring the technology and processes used for recording voter preferences are operated in accordance with approved procedures and that the integrity of the voting system is maintained.
I have worked with a wide range of law enforcement agencies in the UK where I held a high level of security clearance. These agencies included the National Crime Squad, HM Customs and Excise, the National Criminal Intelligence Service plus several security agencies. In Australia I have held Highly Protected security clearance since April 2010 and have worked with various government agencies in relation to criminal investigations such as the;
-
Australian Securities and Investment Commission
-
Department of Fisheries
-
Fisheries Management Authority
-
Department of Commerce
-
Electoral Commission
I have provided digital forensic services to lawyers as well as many large and small corporate clients for more than 15 years involving such matters as:
-
Theft of Intellectual Property
-
Hacking into Computer Systems
-
Misuse of Company Computer Resources
-
Possession of Illegal Digital Material
-
Software Copyright Disputes
-
Software Licensing Disputes
-
Stalking
-
Insider Trading
-
Serious Misconduct by Directors and Employees
-
Murder
-
Data Recovery
-
Electronic Discovery
I have appeared many times as an expert witness in criminal and civil matters heard in the District and Supreme Courts of Western Australia and the Federal Court of Australia.

With qualifications and a background in electronics, telecommunications, computer systems, software and hardware development I can provide expert witness services across a range of technology-related environments.

I can identify and collect potentially responsive artefacts including all associated metadata as well as an audit of the entire process.

I assists internal auditors in monitoring the effectiveness of IT Governance within their organisation, from the storage of sensitive documents outside controlled areas to the installation of unauthorised applications.

With qualifications and a background in electronics, telecommunications, computer systems, software and hardware development I can provide expert witness services across a range of technology-related environments.
As part of my consultancy services I can provide clients with access to the patented tool that I have helped to develop. The work of creating indexes in order to find specific data is time consuming, disruptive and labour-intensive. The solution to these issues is ISEEK; a fast, autonomous tool with NO requirement to install software on the endpoints, such as 'dumb agents'. There is also NO requirement for specific software to be running on the endpoints (or that needs to be shut down to unlock files)..
ISEEK can be deployed across any size network or just a single device, even by email. It doesn't create background indexes, use up freespace or stress corporate network bandwidth while trying to move data or analyze endpoints. Making images is no longer required to process authenticated data on live machines.
Expensive human resources can now be turned to better uses since there is no requirement for ‘hands-on' as part of the ISEEK search and recovery process.
ISEEK replaces ‘indexing’ with a patented search method which accurately and reliably locates responsive data on multiple endpoints in parallel. With this new approach ISEEK is not a tool that simply falls into any one category because its role simply depends on the settings applied in the configuration file and the aims of those who deploy it. One day it may be used for an eDiscovery matter, the next day the same organization could use it to help detect a security breach.