What to Expect During A Forensic Data Collection (2024)

What to Expect During A Forensic Data Collection (1)

For those who do not work in digital forensics or deal with forensic data collections and investigations on a regular basis, the thought of going through a collection can be daunting. Both for the law firm charged with setting up the collection and subsequently reviewing the information, and the custodian who is getting their device collected.

In this post, we will cover what to commonly expect when going through a forensic collection, both from the point of view of the vendor as well as the client and custodian. While this is not an exhaustive breakdown of what goes into forensic collections, the goal of this is to provide a basic understanding of the various areas of concern that go into setting up the collection of a device.

Forensic collection is the most common digital forensic procedure because it leads to others by necessity. Without collecting the data in a forensically sound manner you cannot complete forensic analysis, investigation, or reporting tasks.

First, we should define a few common terms such as forensic data collection and custodians. For the purposes of this post, we will only be referring to digital forensics and the collection of ESI from devices or cloud-based sources. Forensic data collection is the process of defensible collecting or imaging information from a device or cloud-based source for the use of forensic analysis, investigation, or review. There are several methods of forensic collection, but the two most common are on-site collections and remote collections. When done improperly, collections can lead to a myriad of issues that can affect the overall outcome of a matter ranging from lack of defensibility to the need to recollect, or even sanctions.

A custodian is the person having administrative control of a document or electronic file. This is commonly the owner and/or creator of the electronically stored information being collected. An example of a custodian would be a corporate employee involved in litigation, where the employee’s workstation is sought for collection as it is believed to contain information relevant to the case. In this scenario the corporate employee whose workstation is being collected is the custodian.

Next, for the collection to be scheduled there are commonly some administrative steps that need to take place first. Typically, law firms will engage a third-party vendor to run the collection. This is both because it avoids a conflict of interest, as well as firms sometimes do not prefer to retain a certified forensic examiner and the licenses needed for these forensic collections in-house. Once engaged, the vendor will gather information relating to the client, the case, and the custodians being collected from.

Once a collection is scheduled between the vendor and the custodian, the vendor will obtain information relating to the specific device that will be collected. Common information they will ask for includes device information (make, model, serial number, operating system, etc.), if there is a pin or passcode on the device, if the device is encrypted or has two-factor authentication enabled. Additional information that can be helpful is knowing whether the device is a personal or work device, if the device is backed up to the cloud, and if there is any mobile device management software involved.

This is important because many custodians are wary of providing their login credentials and information relating to their device to a third party, and rightfully so. Personal and work devices contain sensitive information and custodians want to know their information is safe. To mitigate this, some vendors require NDA’s during digital forensic stages to protect the firm, the custodian, and the vendor.

Additional layers of security that are common, if not standard, are vendors having enacted physical security measures in place as well as secure computer forensic labs that only certified forensic examiners have access to too. A chain of custody is another required document that provides transparent and clear documentation of everyone who has handled the device.

Once device and custodian information are collected, the forensic examiner may have additional questions specific to the collections. These can include asking what information is being collected, where the device is located, inquiring about the initial collection request, asking if the custodian aware of the collection, if any media being targeted or excluded, if this part of a forensic investigation, and various other questions. The forensic examiner will also keep a forensic journal with information such as the name of the forensic examiner, the date of collection, notes and documentation of the collection, software used in the collection, and an internal job or tracking number for the collection.

Following completion of the forensic collection, the vendor will provide the custodian back with their device and any other items that were given to them initially such as charging cables or cases. Commonly, this is the end of the custodian’s journey relating to the vendors’ need for their involvement, but this does not mean their involvement with the case is necessarily over. From there the vendor will share the information collected via Secure FTP with the law firm and work with their case team for any analysis, investigation, or reporting that is required for the case.

For more information on forensic data collections or how the TERIS Forensics team can assist your matter, reach out today to learn more.

What to Expect During A Forensic Data Collection (2024)

FAQs

What to Expect During A Forensic Data Collection? ›

The data forensics process has 4 stages: acquisition, examination, analysis, and reporting. There are also various techniques used in data forensic investigations. One of these techniques is cross-drive analysis, which links information discovered on multiple hard drives.

What does a forensic collection involve? ›

Forensic data collection is the process of defensible collecting or imaging information from a device or cloud-based source for the use of forensic analysis, investigation, or review. There are several methods of forensic collection, but the two most common are on-site collections and remote collections.

What important practices should be followed when gathering forensics data? ›

The digital forensic acquisition process is a set of three principles that lie at the core of digital forensics and may be paraphrased as follows: 1) acquire the evidence without altering or damaging the original; 2) establish and demonstrate that the examined evidence is the same as that which was originally obtained; ...

How do forensic investigators collect evidence? ›

They take photographs and physical measurements of the scene, identify and collect forensic evidence, and maintain the proper chain of custody of that evidence. Crime scene investigators collect evidence such as fingerprints, footprints, tire tracks, blood and other body fluids, hairs, fibers and fire debris.

What do forensics check? ›

The forensic pathologist is specially trained: to perform autopsies to determine the presence or absence of disease, injury or poisoning; to evaluate historical and law-enforcement investigative information relating to manner of death; to collect medical evidence, such as trace evidence and secretions, to document ...

What happens during a forensic exam? ›

The examination includes gathering information from the patient for the medical forensic history; an examination; coordinating treatment of injuries, documentation of biological and physical findings, and collection of evidence from the patient; documentation of findings; information, treatment, and referrals for STIs, ...

What to expect in forensics? ›

Record observations and findings, such as the location and position of evidence. Collect evidence, including weapons, fingerprints, and bodily fluids. Catalog and preserve evidence for transfer to crime labs. Reconstruct crime scenes.

What to take screenshots of during an investigation? ›

There are several strong use cases for using screenshots to capture evidence. For example, screenshots can provide visual evidence of text messages, social media posts, contacts, home screen applications installed, and other digital content that may be relevant to a case.

What are the two types of data collected with forensics? ›

Two types of data are typically collected in data forensics. This first type of data collected in data forensics is called persistent data. Persistent data is data that is permanently stored on a drive, making it easier to find. The other type of data collected in data forensics is called volatile data.

How is forensic testing done? ›

Crime Lab scientists analyze evidence and develop a DNA profile of a possible suspect. That DNA profile is used to search the DNA database, known as the Combined DNA Index System (CODIS). If the DNA sample searched against CODIS matches a DNA sample already in the database, that is known as a “hit.”

What process must investigators follow when collecting evidence? ›

The five steps recommended by the Federal Bureau of Investigation for collecting and preserving evidence are (1) obtaining it legally; (2) describing the evidence in detailed notes; (3) identifying it accurately and positively; (4) packaging it properly for identification, storage, or shipment to the laboratory; and (5 ...

What does a forensic document examination do? ›

The forensic document examiner makes scientific examinations, comparisons, and analyses of documents in order to: 1) establish genuineness or non-genuineness, 2) reveal alterations, additions, or deletions, 3) identify or eliminate persons as the source of handwriting, 4) identify or eliminate the source of machine ...

What is the forensic data analysis process? ›

The data forensics process has 4 stages: acquisition, examination, analysis, and reporting. There are also various techniques used in data forensic investigations.

What are the methods of data collection for crime? ›

For example, surveys, interviews, focus groups, or experiments are all common data collection techniques that allow criminal justice professionals or experts to form policies or practices.

Top Articles
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 6355

Rating: 4.2 / 5 (73 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.