Computer Forensics: Managing and Securing Data
There is seemingly no end of questions to answer and record when collecting and analyzing data from digital devices gathered in the course of criminal investigations. How have the devices been stored? Have officers had interactions with the devices? How were the devices being transported? Were they turned on or turned off? And so on.