Australian digital forensics practitioner, expert witness and academic
Richard Brian Adams
Richard Brian Adams
Nationality
Australian
Almamater
Murdoch University; Curtin University
Occupation(s)
Digital forensics practitioner; expert witness; academic
Yearsactive
1990s–present
Knownfor
Advanced Data Acquisition Model (ADAM); Advanced Framework for Evaluating Remote Agents (AFERA); ISEEK distributed collection tool
Richard Brian Adams is an Australian digital forensics practitioner, expert witness and academic based in Perth. He is known for the Advanced Data Acquisition Model (ADAM), published in 2013, and for the Advanced Framework for Evaluating Remote Agents (AFERA), the subject of his 2023 doctoral thesis at Curtin University. He also co-authored the 2017 paper introducing ISEEK, a high-speed distributed forensic acquisition tool.[1][2][3]
Adams earned a PhD in Information Technology at Murdoch University, where he developed the ADAM process model for digital evidence acquisition.[1] He later completed a second PhD in Information Systems at Curtin University, producing AFERA, a structured framework for evaluating tools that use remote agents for live, distributed collections.[2] Holding two separate PhDs in science and technology disciplines is rare; less than 1% of doctoral graduates earn a second doctorate.[4]
He has also published on cloud forensics in an edited volume by IGI Global.[5]
Career
Adams worked in information systems and software for investigative and law-enforcement contexts in the United Kingdom before relocating to Australia (self-published). He served as a Principal in the Forensics division of Deloitte Australia between 2004 and 2013, subsequently practicing as an independent expert witness and consultant (self-published).[6]
A third-party speaker profile describes him as “a leading cyber forensics practitioner,” notes his decade as a Deloitte Principal, lists investigations spanning fraud, stalking and murder, and references academic roles with the University of Western Australia's Centre for Forensic Science and Curtin University.[7]
Adams has also contributed articles to the Australian Cyber Security Magazine, including “Hybrid Forensics” in Issue 4 (2018)[8] and “Beyond application whitelisting” in Issue 6 (2018).[9]
Research and frameworks
Adams's 2013 paper proposed the Advanced Data Acquisition Model (ADAM).[1] The model has since been discussed in reviews and comparative studies of forensic process models.[10][11][12]
His 2023 thesis introduced AFERA, a framework for evaluating tools that use distributed agents.[2]
Tools and development
Adams co-authored the 2017 paper on ISEEK, a distributed acquisition and search tool.[3] Adams has been heavily involved in the development of ISeek and ILooKIX since 2013. A neutral vendor directory describes ISEEK/XISuite as enabling remote keyword searches and data retrieval “without the need for pre-installed agents.”[13]
Expert witness and forensic analysis
According to Adams's public profiles (self-published), he has provided expert evidence in Australian District, Supreme and Federal courts.[14]
Impact and reception
The ADAM framework has been cited in independent literature as a reference point for fairness in digital evidence, ethics in forensic investigation, drone forensics, and evolving systems.[10][15][16][17][18]
Selected publications
Adams, R.; Hobbs, V. H.; Mann, G. M. (2013). “The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice.” Journal of Digital Forensics, Security and Law 8(4): 25–48.[1]
Adams, R.; Mann, G.; Hobbs, V. (2017). “ISEEK: A tool for high speed, concurrent, distributed forensic data acquisition.” In: Proceedings of the 15th Australian Digital Forensics Conference. Edith Cowan University, pp.1–9.[3]
Adams, R. (2012). “The Emergence of Cloud Storage and the Need for a New Digital Forensic Process Model.” In: Ruan, K. (ed.), Cybercrime and Cloud Forensics: Applications for Investigation Processes. IGI Global, pp.49–69.
Adams, R. (2018). “Hybrid Forensics.” Australian Cyber Security Magazine, Issue 4: 38–41.
Adams, R. (2018). “Beyond application whitelisting.” Australian Cyber Security Magazine, Issue 6: 10–13.
This page is based on this Wikipedia article Text is available under the CC BY-SA 4.0 license; additional terms may apply. Images, videos and audio are available under their respective licenses.