Accessibility Skip to Global Navigation Skip to Local Navigation Skip to Content Skip to Search Skip to Site Map Menu

Hank Wolfe

BSc(Am Uni Wash DC), PhD(Otago), FNZCS

Associate Professor
9.09, Commerce Building
+64 3 479 8141
2017 S2: BSNS115, COMP210, COMP111
2018 S1: COMP210

Associate Professor Henry B. Wolfe (Hank) has been an active computer professional for more than 50 years and has specialised in computer security. During that period he has earned an international reputation in the field of electronic forensics, encryption, surveillance, privacy and computer virus defences. He has provided advice on security matters to major government bodies within New Zealand and to Australian, Panamanian, Singaporean and U.S. Government organizations; and additionally to New Zealand businesses and the major New Zealand Internet Service Providers. Over the past twenty-five or so years he has conducted and supervised 175 computer security audits of New Zealand businesses and government bodies. Dr Wolfe speaks on security and privacy issues (both technical and policy) regularly at national and international conferences. His primary research interest is the discipline of electronic forensics and surveillance. In addition he has an interest in private communications techniques, which focus on the implementation of various cryptographic algorithms that are currently available and the associated hardware and software necessary to implement such systems.


Laurenson, T., MacDonell, S., & Wolfe, H. (2015). Towards a standardised strategy to collect and distribute application software artifacts. Proceedings of the 13th Australian Digital Forensics Conference. (pp. 54-61). Perth, Australia: Edith Cowan University. doi: 10.4225/75/57b3f5cffb889

Gee, H., Laurenson, T., & Wolfe, H. (2015). Improving the detection and validation of inland revenue numbers. Proceedings of the 13th Australian Digital Forensics Conference. (pp. 62-69). Perth, Australia: Edith Cowan University. doi: 10.4225/75/57b3f6edfb88a

Wolfe, H. B. (2015, November). Another point of view. Verbal presentation at the Centre for Organisational Performance Measurement & Management (COPMM) Symposium: Big Data and Organisational Performance, Dunedin, New Zealand. Retrieved from

Janczewski, L. J., Wolfe, H. B., & Shenoi, S. (Eds.). (2013). Security and Privacy Protection in Information Processing Systems: Proceedings of the 28th International Federation for Information Processing (IFIP TC 11) International Conference. Heidelberg, Germany: Springer. 436p.

Roberts, D., & Wolfe, H. B. (2011). Data remanence in New Zealand: 2011. In A. Woodward & C. Valli (Eds.), Proceedings of the 9th Australian Digital Forensics Conference. (pp. 110-115). Joondalup, Australia: Edith Cowan University. [Full Paper]

Authored Book - Other

Wolfe, H. B., & Quinn, S. (2004). Voyage of discovery: Computing for end-users (No. 2, 8th ed.). Dunedin, New Zealand: Alpha-Omega Group, 84p.

Wolfe, H. B., & Quinn, S. (2004). Voyage of discovery: Computing for end-users (No. 1, 8th ed.). Dunedin, New Zealand: Alpha-Omega Group, 84p.

^ Top of page

Chapter in Book - Research

Wolfe, H. B. (2010). A history of ICT: Selected highlights. In J. Toland (Ed.), Return to tomorrow: 50 years of computing in New Zealand. (pp. 25-37). Wellington, New Zealand: New Zealand Computer Society.

Wolfe, H. B. (2000). Internet and Intranet Security, Management, Risks and Solutions. In L. J. Janczewski (Ed.), Cryptography: Protecting Confidentiality, Integrity and Availability of Data. Hershey, PA: Idea Group Publishing.

^ Top of page

Journal - Research Article

Wolfe, H. B. (2010). Mobile phone security: An update. TSCM Journal, 1(3), 1-14.

Wolfe, H. (2004). Penetrating encrypted evidence. Digital Investigation, 1(2), 102-105.

Wolfe, H. B. (2002). Non-cryptanalytic attacks. Cryptologia, XXVI(3), 222-235.

Wolfe, H. B. (2001). Using Computer Forensic Techniques in Your Practice. Technology Law Forum, 1(4), 45-47.

Wolfe, H. B. (2001). Using Computer Data Encryption Techniqus in Your Practice. Technology Law Forum, 1(6), 77-80.

Wolfe, H. B. (2000). Discovery in a Computer World. Technology Law Forum, 1(3), 33-37.

Wolfe, H. B. (1997). Privacy Enhancing Technology. Computer Fraud & Security Bulletin, 11-15.

^ Top of page

Journal - Research Other

Wolfe, H. (2007). [Review of the book Securing IM and P2P applications for the enterprise]. Digital Investigation, 4, 46-47.

Wolfe, H. (2007). [Review of the book Cisco wireless LAN security]. Digital Investigation, 4, 46.

Wolfe, H. B. (2006). [Review of the book The official EnCE: EnCase Certified Examiner: Study Guide]. Digital Investigation, 3, 103-104.

^ Top of page

Journal - Professional & Other Non-Research Articles

Wolfe, H. B. (2006). An introduction to surveillance. Employment Law Bulletin, Feburary(1), 3-7.

Wolfe, H. B. (2006). [Review of the book RFID Security]. Digital Investigation, 3, 181-182.

Wolfe, H. (2004). The question of organizational forensic policy. Computer Fraud & Security, (June), 13-14.

Wolfe, H. (2004). Computer security for fun and profit. Computer Fraud & Security, (April), 4-5.

Wolfe, H. (2004). KISS - Keep it simple stupid. Computer Fraud & Security, (May), 11.

Wolfe, H. B. (2003). Forensic evidence testimony - some thoughts. Computers & Security, 22(7), 577-579.

Wolfe, H. B. (2003). Evidence analysis. Computers & Security, 22(4), 289-291.

Wolfe, H. B. (2003). Evidence acquisition. Computers & Security, 22(3), 193-195.

Wolfe-Wilson, J., & Wolfe, H. B. (2003). Management strategies for implementing forensic security measures. Information Security Technical Report, 8(2), 55-64.

Wolfe, H. B. (2003). The circumstances of seizure. Computers & Security, 22(2), 96-98.

Wolfe, H. B. (2003). Encountering encryption. Computers & Security, 22(5), 388-391.

More publications...