
Digital forensics (sometimes known as digital forensic science) is a branch of
forensic science
Forensic science combines principles of law and science to investigate criminal activity. Through crime scene investigations and laboratory analysis, forensic scientists are able to link suspects to evidence. An example is determining the time and ...
encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and
computer crime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cybercriminals may exp ...
.
The term "digital forensics" was originally used as a synonym for
computer forensics
Computer forensics (also known as computer forensic science) is a branch of digital forensics, digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital me ...
but has been expanded to cover investigation of all devices capable of
storing digital data.
With roots in the
personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.
Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before
criminal
In ordinary language, a crime is an unlawful act punishable by a State (polity), state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definiti ...
or
civil courts. Criminal cases involve the alleged breaking of laws that are defined by legislation and enforced by the police and prosecuted by the state, such as murder, theft, and assault against the person. Civil cases, on the other hand, deal with protecting the rights and property of individuals (often associated with family disputes), but may also be concerned with contractual disputes between commercial entities where a form of digital forensics referred to as
electronic discovery
Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often r ...
(ediscovery) may be involved.
Forensics may also feature in the private sector, such as during internal corporate investigations or intrusion investigations (a special probe into the nature and extent of an unauthorized
network intrusion).
The technical aspect of an investigation is divided into several sub-branches related to the type of digital devices involved: computer forensics,
network forensics,
forensic data analysis, and
mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging (acquisition), and analysis of digital media, followed with the production of a report of the collected evidence.
As well as identifying direct evidence of a crime, digital forensics can be used to attribute evidence to specific suspects, confirm
alibi
An alibi (, from the Latin, '' alibī'', meaning "somewhere else") is a statement by a person under suspicion in a crime that they were in a different place when the offence was committed. During a police investigation, all suspects are usually a ...
s or statements, determine
intent
An intention is a mental state in which a person commits themselves to a course of action. Having the plan to visit the zoo tomorrow is an example of an intention. The action plan is the ''content'' of the intention while the commitment is the '' ...
, identify sources (for example, in copyright cases), or authenticate documents.
Investigations are much broader in scope than other areas of forensic analysis (where the usual aim is to provide answers to a series of simpler questions), often involving complex time-lines or hypotheses.
History
Prior to the 1970s, crimes involving computers were dealt with using existing laws. The first
computer crime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cybercriminals may exp ...
s were recognized in the 1978 Florida Computer Crimes Act, which included legislation against the unauthorized modification or deletion of data on a computer system.
Over the next few years, the range of computer crimes being committed increased, and laws were passed to deal with issues of
copyright
A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, ...
, privacy/harassment (e.g.,
cyber bullying,
happy slapping
Happy slapping was a fad originating in the United Kingdom around 2005, in which one or more people attack a victim for the purpose of recording the assault (commonly with a camera phone or a smartphone). Though the term usually refers to relativ ...
,
cyber stalking, and
online predator
Online predators are individuals who commit child sexual abuse that begins or takes place on the Internet.
Conceptions
Internet-facilitated crimes against minors involve deceit and begin with adults communicating with children over the Internet ...
s), and
child pornography
Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is Eroticism, erotic ma ...
.
It was not until the 1980s that federal laws began to incorporate computer offences. Canada was the first country to pass legislation in 1983.
This was followed by the US Federal ''
Computer Fraud and Abuse Act
The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (), which had been included in the Comprehensive Crime Control Act of 1984. Prior ...
'' in 1986, Australian amendments to their crimes acts in 1989, and the British ''Computer Misuse Act'' in 1990.
Digital forensics methods are increasingly being applied to preserve and authenticate born-digital cultural materials in heritage institutions.
1980s–1990s: Growth of the field
The growth in computer crime during the 1980s and 1990s caused
law enforcement agencies
A law enforcement agency (LEA) is any government agency responsible for law enforcement within a specific jurisdiction through the employment and deployment of law enforcement officers and their resources. The most common type of law enforcement ...
to begin establishing specialized groups, usually at the national level, to handle the technical aspects of investigations. For example, in 1984, the
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
launched a ''Computer Analysis and Response Team'' and the following year a computer crime department was set up within the British
Metropolitan Police fraud squad. As well as being law enforcement professionals, many of the early members of these groups were also computer hobbyists and became responsible for the field's initial research and direction.
One of the first practical (or at least publicized) examples of digital forensics was
Cliff Stoll's pursuit of hacker
Markus Hess in 1986. Stoll, whose investigation made use of computer and network forensic techniques, was not a specialized examiner.
Many of the earliest forensic examinations followed the same profile.
Throughout the 1990s, there was high demand for these new, and basic, investigative resources. The strain on central units lead to the creation of regional, and even local, level groups to help handle the load. For example, the British
National Hi-Tech Crime Unit
The National Hi-Tech Crime Unit (NHTCU) previously formed part of the National Crime Squad, a British Police organisation which dealt with major crime.
The National Hi-Tech Crime Unit was created in 2001 as a result of an Association of Chief Poli ...
was set up in 2001 to provide a national infrastructure for computer crime, with personnel located both centrally in London and with the various
regional police forces (the unit was folded into the
Serious Organised Crime Agency (SOCA) in 2006).
During this period, the science of digital forensics grew from the ad-hoc tools and techniques developed by these hobbyist practitioners. This is in contrast to other forensics disciplines, which developed from work by the scientific community.
It was not until 1992 that the term "computer forensics" was used in
academic literature
Academic publishing is the subfield of publishing which distributes Research, academic research and scholarship. Most academic work is published in academic journal articles, books or Thesis, theses. The part of academic written output that is n ...
(although prior to this, it had been in informal use); a paper by Collier and Spaul attempted to justify this new discipline to the forensic science world.
This swift development resulted in a lack of standardization and training. In his 1995 book, ''High-Technology Crime: Investigating Cases Involving Computers'', K. Rosenblatt wrote the following:
2000s: Developing standards
Since 2000, in response to the need for standardization, various bodies and agencies have published guidelines for digital forensics. The
Scientific Working Group on Digital Evidence (SWGDE) produced a 2002 paper, ''Best practices for Computer Forensics'', this was followed, in 2005, by the publication of an
ISO
The International Organization for Standardization (ISO ; ; ) is an independent, non-governmental, international standard development organization composed of representatives from the national standards organizations of member countries.
Me ...
standard (
ISO 17025
ISO/ IEC 17025 General requirements for the competence of testing and calibration laboratories is the main standard used by testing and calibration laboratories. In most countries, ISO/IEC 17025 is the standard for which most labs must hold accr ...
, ''General requirements for the competence of testing and calibration laboratories'').
A European-led international treaty, the
Budapest Convention on Cybercrime, came into force in 2004 with the aim of reconciling national computer crime laws, investigative techniques, and international co-operation. The treaty has been signed by 43 nations (including the US, Canada, Japan, South Africa, UK, and other European nations) and ratified by 16.
The issue of training also received attention. Commercial companies (often forensic software developers) began to offer certification programs, and digital forensic analysis was included as a topic at the UK specialist investigator training facility,
Centrex
Centrex is a portmanteau of central exchange, a kind of telephone exchange. It provides functions similar to a PBX, but is provisioned with equipment owned by, and located at, the telephone company premises.
Centrex service was first install ...
.
In the late 1990s, mobile devices became more widely available, advancing beyond simple communication devices, and were found to be rich forms of information, even for crime not traditionally associated with digital forensics.
Despite this, digital analysis of phones has lagged behind traditional computer media, largely due to problems over the proprietary nature of devices.
Focus has also shifted onto internet crime, particularly the risk of
cyber warfare
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
and
cyberterrorism
Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Emerging alongside th ...
. A February 2010 report by the
United States Joint Forces Command concluded the following:
The field of digital forensics still faces unresolved issues. A 2009 paper, "Digital Forensic Research: The Good, the Bad and the Unaddressed" by Peterson and Shenoi, identified a bias towards Windows operating systems in digital forensics research.
In 2010,
Simson Garfinkel identified issues facing digital investigations in the future, including the increasing size of digital media, the wide availability of encryption to consumers, a growing variety of operating systems and file formats, an increasing number of individuals owning multiple devices, and legal limitations on investigators. The paper also identified continued training issues, as well as the prohibitively high cost of entering the field.
Development of forensic tools
During the 1980s, very few specialized digital forensic tools existed. Consequently, investigators often performed
live analysis on media, examining computers from within the operating system using existing
sysadmin
An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrat ...
tools to extract evidence. This practice carried the risk of modifying data on the disk, either inadvertently or otherwise, which led to claims of evidence tampering. A number of tools were created during the early 1990s to address the problem.
The need for such software was first recognized in 1989 at the
Federal Law Enforcement Training Center
The Federal Law Enforcement Training Centers (FLETC; pronounced ) is a law enforcement training school under the United States Department of Homeland Security, serving 105 federal law enforcement agencies within the United States federal governm ...
, resulting in the creation of IMDUMP (by Michael White) and in 1990, SafeBack (developed by Sydex). Similar software was developed in other countries; DIBS (a hardware and software solution) was released commercially in the UK in 1991, and Rob McKemmish released ''Fixed Disk Image'' free to Australian law enforcement.
These tools allowed examiners to create an exact copy of a piece of digital media to work on, leaving the original disk intact for verification. By the end of the 1990s, as demand for digital evidence grew, more advanced commercial tools such as
EnCase and
FTK were developed, allowing analysts to examine copies of media without using any live forensics.
More recently, a trend towards "live memory forensics" has grown, resulting in the availability of tools such as
WindowsSCOPE.
More recently, the same progression of tool development has occurred for
mobile device
A mobile device or handheld device is a computer small enough to hold and operate in hand. Mobile devices are typically battery-powered and possess a flat-panel display and one or more built-in input devices, such as a touchscreen or keypad. ...
s; initially investigators accessed data directly on the device, but soon specialist tools such as
XRY or Radio Tactics Aceso appeared.
Police forces have begun implementing risk-based triage systems to manage the overwhelming demand for digital forensic services.
Forensic process

A digital forensic investigation commonly consists of 3 stages:
* acquisition or
imaging
Imaging is the representation or reproduction of an object's form; especially a visual representation (i.e., the formation of an image).
Imaging technology is the application of materials and methods to create, preserve, or duplicate images.
...
of exhibits,
* analysis, and
* reporting.
Acquisition does not normally involve capturing an image of the computer's volatile memory (RAM) unless this is done as part of an incident response investigation.
Typically the task involves creating an exact
sector level duplicate (or "forensic duplicate") of the media, often using a
write blocking device to prevent modification of the original. However, the growth in size of storage media and developments such as cloud computing
have led to more use of 'live' acquisitions whereby a 'logical' copy of the data is acquired rather than a complete image of the physical storage device.
Both acquired image (or logical copy) and original media/data are
hashed (using an algorithm such as
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as 40 hexadecimal digits. It was designed by the United States ...
or
MD5
The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as Request for Comments, RFC 1321.
MD5 ...
) and the values compared to verify the copy is accurate.
An alternative (and patented) approach (that has been dubbed 'hybrid forensics'
or 'distributed forensics') combines digital forensics and ediscovery processes. This approach has been embodied in a commercial tool called ISEEK that was presented together with test results at a conference in 2017.
During the analysis phase an investigator recovers evidence material using a number of different methodologies and tools. In 2002, an article in the ''International Journal of Digital Evidence'' referred to this step as "an in-depth systematic search of evidence related to the suspected crime."
In 2006, forensics researcher
Brian Carrier described an "intuitive procedure" in which obvious evidence is first identified and then "exhaustive searches are conducted to start filling in the holes."
The actual process of analysis can vary between investigations, but common methodologies include conducting keyword searches across the digital media (within files as well as unallocated and
slack space), recovering deleted files and extraction of registry information (for example to list user accounts, or attached USB devices).
The evidence recovered is analyzed to reconstruct events or actions and to reach conclusions, work that can often be performed by less specialized staff.
When an investigation is complete the data is presented, usually in the form of a written report, in
lay persons' terms.
Application

Digital forensics is commonly used in both criminal law and private investigation. Traditionally it has been associated with criminal law, where evidence is collected to support or oppose a hypothesis before the courts. As with other areas of forensics this is often a part of a wider investigation spanning a number of disciplines. In some cases, the collected evidence is used as a form of intelligence gathering, used for other purposes than court proceedings (for example to locate, identify or halt other crimes). As a result, intelligence gathering is sometimes held to a less strict forensic standard.
In civil litigation or corporate matters, digital forensics forms part of the
electronic discovery
Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often r ...
(or eDiscovery) process. Forensic procedures are similar to those used in criminal investigations, often with different legal requirements and limitations. Outside of the courts digital forensics can form a part of internal corporate investigations.
A common example might be following unauthorized
network intrusion. A specialist forensic examination, into the nature and extent of the attack, is performed as a damage limitation exercise, both to establish the extent of any intrusion and in an attempt to identify the attacker.
Such attacks were commonly conducted over phone lines during the 1980s, but in the modern era are usually propagated over the Internet.
The main focus of digital forensics investigations is to recover objective evidence of a criminal activity (termed
actus reus
In criminal law, ''actus reus'' (; : ''actus rei''), Latin for "guilty act", is one of the elements normally required to prove commission of a crime in common law jurisdictions, the other being ("guilty mind"). In the United States, it is some ...
in legal parlance). However, the diverse range of data held in digital devices can help with other areas of inquiry.
;Attribution
:Meta data and other logs can be used to attribute actions to an individual. For example, personal documents on a computer drive might identify its owner.
;Alibis and statements
:Information provided by those involved can be cross checked with digital evidence. For example, during the investigation into the
Soham murders the offender's alibi was disproved when mobile phone records of the person he claimed to be with showed she was out of town at the time.
;Intent
:As well as finding objective evidence of a crime being committed, investigations can also be used to prove the intent (known by the legal term
mens rea
In criminal law, (; Law Latin for "guilty mind") is the mental state of a defendant who is accused of committing a crime. In common law jurisdictions, most crimes require proof both of ''mens rea'' and '' actus reus'' ("guilty act") before th ...
). For example, the Internet history of convicted killer
Neil Entwistle included references to a site discussing ''How to kill people''.
;Evaluation of source
:File artifacts and meta-data can be used to identify the origin of a particular piece of data; for example, older versions of
Microsoft Word
Microsoft Word is a word processor program, word processing program developed by Microsoft. It was first released on October 25, 1983, under the name Multi-Tool Word for Xenix systems. Subsequent versions were later written for several other platf ...
embedded a Global Unique Identifier into files which identified the computer it had been created on. Proving whether a file was produced on the digital device being examined or obtained from elsewhere (e.g., the Internet) can be very important.
;Document authentication
:Related to "Evaluation of source," meta data associated with digital documents can be easily modified (for example, by changing the computer clock you can affect the creation date of a file). Document authentication relates to detecting and identifying falsification of such details.
Limitations
One major limitation to a forensic investigation is the use of encryption; this disrupts initial examination where pertinent evidence might be located using keywords. Laws to compel individuals to
disclose encryption keys are still relatively new and controversial.
But always more frequently there are solutions to
brute force passwords or bypass encryption, such as in smartphones or PCs where by means of
bootloader
A bootloader, also spelled as boot loader or called bootstrap loader, is a computer program that is responsible for booting a computer and booting an operating system. If it also provides an interactive menu with multiple boot choices then it's o ...
techniques the content of the device can be first acquired and later forced in order to find the password or encryption key. It is estimated that about 60% of cases that involve encrypted devices, often go unprocessed because there is no way to access the potential evidence.
Legal considerations
The examination of digital media is covered by national and international legislation. For civil investigations, in particular, laws may restrict the abilities of analysts to undertake examinations. Restrictions against
network monitoring
Network monitoring is the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages or other trouble. Network monitor ...
or reading of personal communications often exist.
During criminal investigation, national laws restrict how much information can be seized.
For example, in the United Kingdom seizure of evidence by law enforcement is governed by the
PACE act.
During its existence early in the field, the "International Organization on Computer Evidence" (IOCE) was one agency that worked to establish compatible international standards for the seizure of evidence.
In the UK, the same laws covering computer crime can also affect forensic investigators. The 1990
Computer Misuse Act legislates against unauthorized access to computer material. This is a particular concern for civil investigators who have more limitations than law enforcement.
An individual's right to privacy is one area of digital forensics which is still largely undecided by courts. The US
Electronic Communications Privacy Act
The Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend restrictions on government wire taps of telephone calls to include transmissions of electronic data by computer ( ''et seq.''), added n ...
places limitations on the ability of law enforcement or civil investigators to intercept and access evidence. The act makes a distinction between stored communication (e.g. email archives) and transmitted communication (such as
VOIP
Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as ...
). The latter, being considered more of a privacy invasion, is harder to obtain a warrant for.
The ECPA also affects the ability of companies to investigate the computers and communications of their employees, an aspect that is still under debate as to the extent to which a company can perform such monitoring.
Article 5 of the European Convention on Human Rights Article 5 of the European Convention on Human Rights (Art.5 ECHR for short) provides that everyone has the right to liberty and security of person. Liberty and security of the person are taken as a "compound" concept - security of the person has ...
asserts similar privacy limitations to the ECPA and limits the processing and sharing of personal data both within the EU and with external countries. The ability of UK law enforcement to conduct digital forensics investigations is legislated by the
Regulation of Investigatory Powers Act.
Digital evidence

When used in a
court of law
A court is an institution, often a government entity, with the authority to adjudicate legal disputes between Party (law), parties and Administration of justice, administer justice in Civil law (common law), civil, Criminal law, criminal, an ...
, digital evidence falls under the same legal guidelines as other forms of evidence, as courts do not usually require more stringent guidelines.
In the United States, the
Federal Rules of Evidence
First adopted in 1975, the Federal Rules of Evidence codify the evidence law that applies in United States federal courts. In addition, many states in the United States have either adopted the Federal Rules of Evidence, with or without local v ...
are used to evaluate the
admissibility of digital evidence. The United Kingdom PACE an
Civil Evidence actshave similar guidelines and many other countries have their own laws. US federal laws restrict seizures to items with only obvious evidential value. This is acknowledged as not always being possible to establish with digital media prior to an examination.
Laws dealing with digital evidence are concerned with two issues:
* Integrity - it's ensuring that the act of seizing and acquiring digital media does not modify the evidence (either the original or the copy).
* Authenticity - refers to the ability to confirm the integrity of information; for example that the imaged media matches the original evidence.
The ease with which digital media can be modified means that documenting the
chain of custody
Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. Of particul ...
from the crime scene, through analysis and, ultimately, to the court, (a form of
audit trail
An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific ...
) is important to establish the authenticity of evidence.
Attorneys have argued that because digital evidence can theoretically be altered it undermines the reliability of the evidence. US judges are beginning to reject this theory, in the case ''US v. Bonallo'' the court ruled that "the fact that it is possible to alter data contained in a computer is plainly insufficient to establish untrustworthiness."
In the United Kingdom, guidelines such as those issued by
ACPO
The Association of Chief Police Officers of England, Wales and Northern Ireland (ACPO) was a not-for-profit private limited company that for many years led the development of policing practices in England, Wales, and Northern Ireland. Established ...
are followed to help document the authenticity and integrity of evidence.
Digital investigators, particularly in criminal investigations, have to ensure that conclusions are based upon factual evidence and their own expert knowledge.
In the US, for example, Federal Rules of Evidence state that a qualified expert may testify “in the form of an opinion or otherwise” so long as:
The sub-branches of digital forensics may each have their own specific guidelines for the conduct of investigations and the handling of evidence. For example, mobile phones may be required to be placed in a
Faraday shield during seizure or acquisition to prevent further radio traffic to the device. In the UK forensic examination of computers in criminal matters is subject to
ACPO
The Association of Chief Police Officers of England, Wales and Northern Ireland (ACPO) was a not-for-profit private limited company that for many years led the development of policing practices in England, Wales, and Northern Ireland. Established ...
guidelines.
There are also international approaches to providing guidance on how to handle
electronic evidence. The "Electronic Evidence Guide" by the
Council of Europe
The Council of Europe (CoE; , CdE) is an international organisation with the goal of upholding human rights, democracy and the Law in Europe, rule of law in Europe. Founded in 1949, it is Europe's oldest intergovernmental organisation, represe ...
offers a framework for law enforcement and judicial authorities in countries who seek to set up or enhance their own guidelines for the identification and handling of electronic evidence.
Investigative tools
The admissibility of digital evidence relies on the tools used to extract it. In the US, forensic tools are subjected to the
Daubert standard, where the judge is responsible for ensuring that the processes and software used were acceptable.
In a 2003 paper, Brian Carrier argued that the Daubert guidelines required the code of forensic tools to be published and peer reviewed. He concluded that "open source tools may more clearly and comprehensively meet the guideline requirements than would closed-source tools."
In 2011,
Josh Brunty stated that the scientific validation of the technology and software associated with performing a digital forensic examination is critical to any laboratory process. He argued that "the science of digital forensics is founded on the principles of repeatable processes and quality evidence therefore knowing how to design and properly maintain a good validation process is a key requirement for any digital forensic examiner to defend their methods in court."
One of the key issues relating to validating forensic tools is determining a 'baseline' or reference point for tool testing/evaluation. There have been numerous attempts to provide an environment for testing the functionality of forensic tools such as the Computer Forensic Tool Testing (CFTT) programme developed by NIST ".
To allow for the different environments in which practitioners operate there have also been many attempts to create a framework for customizing test/evaluation environments. These resources focus on a single or limited number of target systems. However, they do not scale well when attempts are made to test/evaluate tools designed for large networks or the cloud which have become more commonplace in investigations over the years. As of 2024 the only framework that addresses the use of remote agents by forensic tools for distributed processing/collection is that developed by Adams
Branches
Digital forensics investigation is not restricted to retrieve data merely from the computer, as laws are breached by the criminals and small digital devices (e.g. tablets, smartphones, flash drives) are now extensively used. Some of these devices have volatile memory while some have non-volatile memory. Sufficient methodologies are available to retrieve data from volatile memory, however, there is lack of detailed methodology or a framework for data retrieval from non-volatile memory sources. Depending on the type of devices, media or artifacts, digital forensics investigation is branched into various types.
Computer forensics

The goal of computer forensics is to explain the current state of a digital artifact; such as a computer system, storage medium or electronic document.
The discipline usually covers computers,
embedded system
An embedded system is a specialized computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system. It is e ...
s (digital devices with rudimentary computing power and onboard memory) and static memory (such as USB pen drives).
Computer forensics can deal with a broad range of information; from logs (such as internet history) through to the actual files on the drive. In 2007, prosecutors used a
spreadsheet
A spreadsheet is a computer application for computation, organization, analysis and storage of data in tabular form. Spreadsheets were developed as computerized analogs of paper accounting worksheets. The program operates on data entered in c ...
recovered from the computer of
Joseph Edward Duncan
Joseph Edward Duncan III (February 25, 1963 – March 28, 2021) was an American convicted serial killer and child molester who was on death row in federal prison following the 2005 kidnappings and murders of members of the Groene family of Coeu ...
to show
premeditation and secure the
death penalty
Capital punishment, also known as the death penalty and formerly called judicial homicide, is the state-sanctioned killing of a person as punishment for actual or supposed misconduct. The sentence ordering that an offender be punished in s ...
.
Sharon Lopatka
Sharon ( 'plain'), also spelled Saron, is a given name as well as a Hebrew name.
In English-speaking areas, Sharon is now predominantly a feminine given name, but historically it was also used as a masculine given name. In Israel, it is used a ...
's killer was identified in 2006 after email messages from him detailing torture and death fantasies were found on her computer.
Mobile device forensics

Mobile device forensics is a sub-branch of digital forensics relating to recovery of digital evidence or data from a
mobile device
A mobile device or handheld device is a computer small enough to hold and operate in hand. Mobile devices are typically battery-powered and possess a flat-panel display and one or more built-in input devices, such as a touchscreen or keypad. ...
. It differs from Computer forensics in that a mobile device will have an inbuilt communication system (e.g.
GSM
The Global System for Mobile Communications (GSM) is a family of standards to describe the protocols for second-generation (2G) digital cellular networks, as used by mobile devices such as mobile phones and Mobile broadband modem, mobile broadba ...
) and, usually, proprietary storage mechanisms. Investigations usually focus on simple data such as call data and communications (SMS/Email) rather than in-depth recovery of deleted data.
SMS
Short Message Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems. It uses standardized communication protocols that let mobile phones exchange short text messages, t ...
data from a mobile device investigation helped to exonerate Patrick Lumumba in the
murder of Meredith Kercher.
Mobile devices are also useful for providing location information; either from inbuilt gps/location tracking or via
cell site
A cell site, cell phone tower, cell base tower, or cellular base station is a cellular frequencies, cellular-enabled mobile device site where antenna (electronics), antennas and electronic communications equipment are placed (typically on a Rad ...
logs, which track the devices within their range. Such information was used to track down the kidnappers of Thomas Onofri in 2006.
Network forensics
Network forensics is concerned with the monitoring and analysis of
computer network
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
traffic, both
local
Local may refer to:
Geography and transportation
* Local (train), a train serving local traffic demand
* Local, Missouri, a community in the United States
Arts, entertainment, and media
* ''Local'' (comics), a limited series comic book by Bria ...
and
WAN/
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
, for the purposes of information gathering, evidence collection, or intrusion detection.
[Gary Palmer, A Road Map for Digital Forensic Research, Report from DFRWS 2001, First Digital Forensic Research Workshop, Utica, New York, 7–8 August 2001, Page(s) 27–30] Traffic is usually intercepted at the
packet level, and either stored for later analysis or filtered in real-time. Unlike other areas of digital forensics network data is often volatile and rarely logged, making the discipline often reactionary.
In 2000, the
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
lured computer hackers Aleksey Ivanov and Gorshkov to the United States for a fake job interview. By monitoring network traffic from the pair's computers, the FBI identified passwords allowing them to collect evidence directly from Russian-based computers.
Forensic data analysis
Forensic Data Analysis is a branch of digital forensics. It examines structured data with the aim to discover and analyze patterns of fraudulent activities resulting from financial crime.
Digital image forensics
Digital
image forensics (or forensic image analysis) is a branch of digital forensics that deals with examination and verification of an image's authenticity and content.
These can range from Stalin-era airbrushed photos to elaborate
deepfake videos.
This has broad implications for a wide variety of crimes, for determining the validity of information presented in civil and criminal trials, and for verifying images and information that are circulated through news and social media.
Database forensics
Database forensics is a branch of digital forensics relating to the forensic study of
databases
In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and ana ...
and their
metadata
Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including:
* Descriptive ...
.
Investigations use database contents, log files and in-
RAM
Ram, ram, or RAM most commonly refers to:
* A male sheep
* Random-access memory, computer memory
* Ram Trucks, US, since 2009
** List of vehicles named Dodge Ram, trucks and vans
** Ram Pickup, produced by Ram Trucks
Ram, ram, or RAM may also ref ...
data to build a timeline or recover relevant information.
IoT Forensics
IoT forensics is a branch of Digital forensics that has the goal of identifying and extracting digital information from devices belonging to the
Internet of things
Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
field, to be used for forensics investigations as potential source of evidence.
See also
*
List of digital forensics tools
During the 1980s, most digital forensics, digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In the 1990s, several freeware and other proprietary tools (both hardware and softw ...
*
Cyberspace
Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
*
Forensic search
*
Glossary of digital forensics terms
*
Outline of forensic science
References
Further reading
*
*
*
*
*
*
*
Related journals
*
Journal of Digital Forensics, Security and Law'
*
International Journal of Digital Crime and Forensics'
*
Journal of Digital Investigation'
*
International Journal of Digital Evidence'
*
International Journal of Forensic Computer Science'
*
Journal of Digital Forensic Practice'
*'
External links
Scientific Working Group on Digital EvidenceDigital Forensics Case Studies
{{DEFAULTSORT:Digital Forensics
Forensic disciplines