Chapter 6

Extracting Information from Data

  • Understanding the different types of evidence
  • Understanding how people think
  • Picking the low-hanging fruit
  • Finding hidden evidence
  • Locating trace evidence
  • Preparing evidence
  • Presenting evidence

After you capture a data image, what should you look for? How do you figure out what portion of the captured data image is useful to your investigation? What happens if you can’t find what you are looking for? These are some of the questions that run through the mind of every forensic investigator.

Criminals or intruders can (and do) use programs to delete e-mail, pictures, and documents that might provide proof of their activities. Trained forensic investigators must have tools available that will help them ...

Get Computer Forensics JumpStart, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.