123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Legal >> View Article

Digital Forensics Data Collections: Acquisition Methods

Profile Picture
By Author: Sacha Ward
Total Articles: 2
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

This article outlines some of the digital forensics data acquisition methods used on a regular basis to preserve metadata and ensure defensibility.

This article outlines some of the digital forensics data acquisition methods used on a regular basis to preserve metadata and ensure defensibility.

Digital forensics data acquisition methods can broadly be broken down into two categories – overt and covert. Quite simply an overt approach is one in which the subject is aware of the data collection, conversely a covert approach is one in which the subject is unaware. The method used will depend on the requirements of the investigation; in the vast majority of cases an overt approach is adopted, particularly for disclosure as part of civil litigation where a duty to preserve exists often long before collection. In general an overt approach is easier, takes less effort and is therefore the cheaper option. Although sometimes, the situation is such that a covert approach is the only option.

When it comes to covert digital forensics data acquisition we have two options: ‘dead-box’ or ‘remote’ ...
... acquisition. Dead-box involves physically taking possession of the device and acquiring data directly, then returning it before the absence is noted. Historically this has been the favoured approach, especially at a time when most users had desktop computers left in offices overnight. Nowadays the majority of users have laptops which are, more often than not, taken home at night. In addition, mobile phones are becoming ever more relevant and are rarely, if ever, parted from their owners for any great length of time.

The mobility of devices presents us with a challenge: how can we covertly acquire data when the user is never parted from their devices? The solution is to work alongside in-house IT teams to use the local IT infrastructure to our advantage. It is possible to remotely acquire data from devices with no tangible access to them. By deploying what is essentially a ‘Trojan’ to the devices (a Trojan which is secure and fully under our control), we are able to access and acquire data from user devices without their knowledge. This has proved particularly useful in investigations where the suspects were ‘home workers’ and a covert approach was required.

Whatever digital forensics data acquisition approach is adopted it is important that it is done in a forensic manner, ensuring all possible data and metadata are preserved. The process must be fully defensible should the integrity of the evidence ever be questioned.
Resource: http://www.cclgroupltd.com

Total Views: 299Word Count: 409See All articles From Author

Add Comment

Legal Articles

1. Uk Sponsor Licence Guide For Employers (2025 Updated)
Author: The SmartMove2UK

2. Divorce In Singapore: What You Really Need To Know First
Author: Singapore Sole Parent

3. The Importance Of Communication Skills In The Best Criminal Lawyers
Author: glennrroderman

4. Hiring The Right Construction Lawyer Near You: What To Look For
Author: Robert J. Incollingo

5. Seeking Justice After A Dog Attack: Work With A Minnesota Dog Bite Accident Attorney
Author: sussmanlaw

6. How To Effectively Use Australian Immigration Consultancy Services In Hyderabad?
Author: Ankit Sharma

7. The Growing Importance Of Legal Recruitment In Today’s Competitive Market
Author: EMEA Legal

8. When Your Business Is Ready To Expand To The Uk, We Handle The Visas
Author: The SmartMove2UK

9. What Is Intellectual Property And Its Benefits?
Author: Alicia Reno

10. A Complete Guide To Eu Trademark Registration For Businesses Expanding Across Europe
Author: The Trademark Helpline

11. Bringing Your Loved Ones To The Uk: Your Guide To The Skilled Worker Dependant Visa
Author: Conroy Baker

12. How Long Does Llp Registration Take? Timeline Explained
Author: Jishan Khan

13. Starting A Business In Pune? 7 Essential Online Registrations You Shouldn’t Miss!
Author: Startupporta Business Services

14. Top Materials We Use In Our Best Custom Cnc Machining Parts
Author: YuYao QiDi Plastic Mold Factory

15. Why Every Business Needs A Corporate Lawyer In Dubai
Author: Dr. Hassan Elhais

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: