Now that computers and the Internet are a regular part of our daily lives, the digital world increasingly contains potential evidence for all types of activity ranging from individual criminal actions to activity that may be relevant to a business litigation or investigation. Forensic investigations seek to uncover this evidence and then perform analysis in order to gain a full understanding of an end user’s activity on a given computing device. In recent years, traditional computer forensics, or “dead-box analysis,” has begun transitioning into “live-box analysis,” meaning more analyses are performed on volatile systems, such as live computer work stations and mobile devices like laptops, tablets and smartphones. Given the growing use of these mobile technologies for professional purposes, understanding the nuances of preserving, extracting and analyzing electronically stored information (ESI) from them is paramount to the success of any such investigation. Additionally, the policies established by the organization and its legal team to protect that data will be critical in defending this recovery moving forward.
Click here to read article.