5 Initial Digital Computer Forensic Reports to Run in a Forensic Data Investigation

Digital Forensic Computer Investigation Image - Password Protected Files Graphic

At times forensic investigations are needed to take a deeper dive into forensically collected data whether it be in response to affidavits, request for expert testimony, the need to review employee activity, or a range of other investigation triggers. When these scenarios arise, you will need to work with a certified forensic expert to engage in the investigations. Lack of oversight from a forensic professional allows the validity of the data and collection process to be questioned, resulting in loss of negotiating power, sanctions, or being asked to recollect.

During the initial forensic investigation, an examiner can run a range of reports including:

  • Internet history reports
  • USB activity reports
  • Decryption and deletion recovery reports
  • Common or recently moved/opened files
  • Recycle bin report

Each report offers its own insights into intent and activity, but the tools deployed will always be directly tied to the case at hand and specific hurdles that are faced. For example, large-cap data investigations with a growing amount of custodians will take a different approach than a probe into a single custodians encrypted device. Working with a certified forensic examiner ensures that no corners are being cut and each aspect of the process is forensically defensible.

From swiftly and broadly preserving with legal holds to storing and maintaining the ability to produce native files with meta-data intact down the road. Forensic integrity is end to end, therefor by nature, a forensic investigation plan should be put together and executed by a certified expert.

TERIS’ comprehensive litigation support solution uncovers and collects digital evidence, both searchable and unsearchable data. Our certified digital forensics experts have the appropriate training, background, and credentials to properly execute any data mining necessary for the discovery process.

Leave a Comment

You must be logged in to post a comment.