Collaborating with the University of South Wales…

The University of South Wales Information Security Research Group are pioneers in data recovery and computer science research. Their state-of-the-art data recovery laboratory at the Treforest Campus has been instrumental in advances of technology over recent years. Current projects include next generation chip-off technology, HGST HelioSeal data recovery methods and data recovery from binary source code identified using high magnification microscopes. Data Recovery Specialists are pleased to have teamed up with the University and are looking forward to a long relationship.

Andrew Blyth is the Professor of Information Security and has over twenty of experience in the areas of computer forensics and data recovery. He has also functioned as an expert witness and conducted a number of forensic investigations for law enforcement and commercial organisations. Keys areas of expertise include computer forensics and forensic analysis of all forms of computer hard drives as well as mobile phones and tablets. Previous casework includes:

Data breach and illicit activity analysis;
Malware and vulnerability identification/analysis;
Social network and user behaviour profiling/analysis.

He has functioned as principle research scientist on the following projects. These projects are concerned with the development of tools and techniques that aid in a) the forensic investigative process and b) data recovery.

Title: Fortoo: Network Forensics Tools, Funding Agent: EU ISEC, Duration: Nov 2011 - March 2014.
Title: Forensic Best Practice, Funding Agent: Roke Manor Research and the Home Office (CAST), Duration: July 2011 – June 2012.
Title: Forensic Readiness Tools and Techniques for Rapid Forensic Impact Assessment, Funding Agent: MOD/DSTL, Duration: Nov 2011 - March 2012.

In addition he has published a number of books on the subject including: Eden P., Blyth A., Burnap P., Cherdantseva Y., Jones K., Soulsby H., Stoddart K., (2015), A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure, The 10th International Conference on Critical Information Infrastructures Security. Xynos, K, Harries, S, Sutherland, I, Davies, G, Blyth, A, (2010), Xbox 360: A digital forensic investigation of the hard disk drive, Digital Investigation, Volume 6, Issues 3-4, pp. 104-111.