The latest industry news and insights
The challenge to digital forensics experts like CYFOR is to apply well-tested digital forensic techniques to a rapidly changing world. Think of the routine you followed today. You would most likely have used email, text messaging and logged into various websites and platforms, but what about the other interactions you have had with modern amenities? Did you have to swipe a key card to gain access to your hotel room, office or gym? How about that coffee shop rewards card or digital wallet on your Smartphone? Our day to day activities use applications that write to databases or log files leaving behind digital footprints that could be relevant to a digital forensics investigation.
For most lawyers and digital forensics practitioners the term ‘digital evidence’ brings to mind the “usual suspects”, including emails and office documents stored on servers, personal computers and laptops. However, ESI can be even more ubiquitous, intermingled and atypical, with data from our private and public activities being increasingly interconnected and stored on electronic media.
Over and above the “usual suspects”, CYFOR’s digital forensics investigators can reconstruct the activities of an individual by examining the following types of digital evidence:
Not every matter, therefore, hinges upon finding the decisive email or damning text message, but in this day and age, most matters tend to include some type of ESI that can be identified through the use of digital forensic tools (CYFOR’s main computer analysis tools are EnCase and Forensic ToolKit). Therefore, even electronic storage systems apart from the “usual suspects” and ones that predate the social media era must be properly preserved and maintained.
In this day and age, the limits and possibilities of finding electronically stored information that may hold relevant evidence are constantly growing. Regardless of where we find the digital evidence, the rules remain the same – reasonable steps must be taken to identify, preserve, collect and process the forensic image.
DISCLAIMER: The contents of this article are intended for general information purposes only and shall not be deemed to be, or constitute legal advice. We cannot accept responsibility for any loss as a result of acts or omissions taken in respect of this article.
After submitting an enquiry, a member of our team will be in touch with you as soon as possible
Your information will only be used to contact you, and is lawfully in accordance with the General Data Protection Regulation (GDPR) act, 2018.