We have an excellent success record of identifying crime that has been committed using digital devices such as cell phones, laptops and/or computers.
Oftentimes computer crimes are not immediately detected, and they are usually triggered by a newspaper article making reference to confidential information, an audit in a specific area that reveals that something is amiss or a whistle-blowing report.
The result of detecting cyber crimes at a much later stage necessitates a forensic image of a device and recovery of deleted items.