{"id":916,"date":"2019-03-05T15:20:49","date_gmt":"2019-03-05T14:20:49","guid":{"rendered":"https:\/\/psgrecherche.nl\/missed-opportunities-identification-of-data-sources\/"},"modified":"2020-04-08T08:47:12","modified_gmt":"2020-04-08T06:47:12","slug":"missed-opportunities-identification-of-data-sources","status":"publish","type":"post","link":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/","title":{"rendered":"Missed opportunities \u2013 identification of data sources"},"content":{"rendered":"<p class=\"has-text-color has-cyan-bluish-gray-color\">Published: 05-03-2019, Remon Verkerk<\/p>\n<p>Computers, smartphones, IP camera, drones, cars, smart lighting and kettles; what do these objects have in common? They can potentially contain digital data that could contribute to a truth finding investigation. This evidence may be supportive of &#8216;regular&#8217; tactical research, but is often decisive and provides a breakthrough in the research. We speak in the proverbial sense of a <em>smoking gun.<\/em><\/p>\n<p>That smoking gun rarely presents itself on a serving leaf and in practice looks more like a <strong>needle in a haystack.<\/strong> In order to maximise the chances of finding the digital evidence, it is important to identify and secure potential data carriers as well as possible. This securing is preferably done by making a forensic copy by a specially trained <strong>forensic specialist.<\/strong> This specialist takes care of the correct preparation of the evidence, while continuously monitoring the integrity of the data, which benefits the usefulness in legal disputes or criminal cases.<\/p>\n<p>The process of handling digital evidence is at its core quite simple:<\/p>\n<ol>\n<li>Identification data sources<\/li>\n<li>Reservation\/securing dates<\/li>\n<li>Processing\/analysis data<\/li>\n<li>Production evidence<\/li>\n<li>Presentation evidence<\/li>\n<\/ol>\n<p>However, this seemingly simple process has many pitfalls. In the coming weeks we will reflect on the <strong>TOP 3: Missed opportunities!<\/strong><\/p>\n<h2>1. Identification of data sources<\/h2>\n<p>As mentioned, we are surrounded by computers of all shapes and sizes and which can contribute more or less to the research. It&#8217;s not feasible to collect all this data. It is therefore necessary to be selective.<\/p>\n<p>When the police see a mobile phone on the table during the search of a suspect&#8217;s home, we can add that it is confiscated and is involved in the investigation. Provided this can be of some relevance of course.<\/p>\n<p>Otherwise, if there is no direct view of a phone, tablet, laptop on similar device. Too often in such studies we see that too much is relied on the investigators&#8217; own perception or on the &#8216;blue eyes&#8217; of the suspect who indicates that they do not have such devices. Are we going to settle for that old Nokia that pulls the suspect down a drawer?!<\/p>\n<p>Through a digital triage, extracts can be obtained on the spot from the many digital sources, which can reveal the presence of digital sources, hitherto unknown.<\/p>\n<blockquote class=\"wp-block-quote\"><p>Digital triage is the first investigative step of the forensic examination. The digital triage comes in two forms, live triage and post-mortem triage. The primary goal of the live triage is a rapid extraction of an intelligence from the potential sources.<\/p>\n<p><cite>Methods and Tools of Digital Triage in Forensic Context: Survey and Future Directions<br \/>\nVacius Jusas, Darius Birvinskas and Elvar Gahramanov<\/cite><\/p><\/blockquote>\n<p>If in doubt, it makes sense to secure a little more digital data than seems relevant at first. In retrospect, the collection is not always possible because devices are taken away or data overwritten.<\/p>\n<p><strong>Summary; increases the likelihood of success of the study by identifying as many data sources as possible. A first digital triage provides insight, after which the collection of digital data can be started. Proportionate and hopefully inclusive <\/strong><em><strong>smoking gun!<\/strong><\/p>\n<p><\/em><strong>!<\/strong><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-244 aligncenter\" src=\"https:\/\/www.psgforensics.nl\/wp-content\/uploads\/2019\/03\/LOGO_PSG_FORENSICS_300px.png\" alt=\"\" width=\"164\" height=\"127\"><\/figure>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Published: 05-03-2019, Remon Verkerk Computers, smartphones, IP camera, drones, cars, smart lighting and kettles; what do these objects have in common? They can potentially contain digital data that could contribute to a truth finding investigation. This evidence may be supportive&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-916","post","type-post","status-publish","format-standard","hentry","category-geen-categorie"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Missed opportunities \u2013 identification of data sources - Psgrecherche.nl<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Missed opportunities \u2013 identification of data sources - Psgrecherche.nl\" \/>\n<meta property=\"og:description\" content=\"Published: 05-03-2019, Remon Verkerk Computers, smartphones, IP camera, drones, cars, smart lighting and kettles; what do these objects have in common? They can potentially contain digital data that could contribute to a truth finding investigation. This evidence may be supportive...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/\" \/>\n<meta property=\"og:site_name\" content=\"Psgrecherche.nl\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-05T14:20:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-08T06:47:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.psgforensics.nl\/wp-content\/uploads\/2019\/03\/LOGO_PSG_FORENSICS_300px.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/#\\\/schema\\\/person\\\/833943ff71dafc62cf8e1fb505f0595a\"},\"headline\":\"Missed opportunities \u2013 identification of data sources\",\"datePublished\":\"2019-03-05T14:20:49+00:00\",\"dateModified\":\"2020-04-08T06:47:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/\"},\"wordCount\":515,\"image\":{\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.psgforensics.nl\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/LOGO_PSG_FORENSICS_300px.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/\",\"url\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/\",\"name\":\"Missed opportunities \u2013 identification of data sources - Psgrecherche.nl\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.psgforensics.nl\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/LOGO_PSG_FORENSICS_300px.png\",\"datePublished\":\"2019-03-05T14:20:49+00:00\",\"dateModified\":\"2020-04-08T06:47:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/#\\\/schema\\\/person\\\/833943ff71dafc62cf8e1fb505f0595a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.psgforensics.nl\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/LOGO_PSG_FORENSICS_300px.png\",\"contentUrl\":\"https:\\\/\\\/www.psgforensics.nl\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/LOGO_PSG_FORENSICS_300px.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/missed-opportunities-identification-of-data-sources\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Missed opportunities \u2013 identification of data sources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/\",\"name\":\"Psgrecherche.nl\",\"description\":\"PSG Recherche heeft een passie voor waarheidsvinding\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/#\\\/schema\\\/person\\\/833943ff71dafc62cf8e1fb505f0595a\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/psgrecherche.nl\\\/wp-content\\\/litespeed\\\/avatar\\\/ebb6127695798d90b74a529c2c26da26.jpg?ver=1776316176\",\"url\":\"https:\\\/\\\/psgrecherche.nl\\\/wp-content\\\/litespeed\\\/avatar\\\/ebb6127695798d90b74a529c2c26da26.jpg?ver=1776316176\",\"contentUrl\":\"https:\\\/\\\/psgrecherche.nl\\\/wp-content\\\/litespeed\\\/avatar\\\/ebb6127695798d90b74a529c2c26da26.jpg?ver=1776316176\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/psgrecherche.nl\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Missed opportunities \u2013 identification of data sources - Psgrecherche.nl","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/","og_locale":"en_US","og_type":"article","og_title":"Missed opportunities \u2013 identification of data sources - Psgrecherche.nl","og_description":"Published: 05-03-2019, Remon Verkerk Computers, smartphones, IP camera, drones, cars, smart lighting and kettles; what do these objects have in common? They can potentially contain digital data that could contribute to a truth finding investigation. This evidence may be supportive...","og_url":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/","og_site_name":"Psgrecherche.nl","article_published_time":"2019-03-05T14:20:49+00:00","article_modified_time":"2020-04-08T06:47:12+00:00","og_image":[{"url":"https:\/\/www.psgforensics.nl\/wp-content\/uploads\/2019\/03\/LOGO_PSG_FORENSICS_300px.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/#article","isPartOf":{"@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/"},"author":{"name":"admin","@id":"https:\/\/psgrecherche.nl\/en\/#\/schema\/person\/833943ff71dafc62cf8e1fb505f0595a"},"headline":"Missed opportunities \u2013 identification of data sources","datePublished":"2019-03-05T14:20:49+00:00","dateModified":"2020-04-08T06:47:12+00:00","mainEntityOfPage":{"@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/"},"wordCount":515,"image":{"@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/#primaryimage"},"thumbnailUrl":"https:\/\/www.psgforensics.nl\/wp-content\/uploads\/2019\/03\/LOGO_PSG_FORENSICS_300px.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/","url":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/","name":"Missed opportunities \u2013 identification of data sources - Psgrecherche.nl","isPartOf":{"@id":"https:\/\/psgrecherche.nl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/#primaryimage"},"image":{"@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/#primaryimage"},"thumbnailUrl":"https:\/\/www.psgforensics.nl\/wp-content\/uploads\/2019\/03\/LOGO_PSG_FORENSICS_300px.png","datePublished":"2019-03-05T14:20:49+00:00","dateModified":"2020-04-08T06:47:12+00:00","author":{"@id":"https:\/\/psgrecherche.nl\/en\/#\/schema\/person\/833943ff71dafc62cf8e1fb505f0595a"},"breadcrumb":{"@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/#primaryimage","url":"https:\/\/www.psgforensics.nl\/wp-content\/uploads\/2019\/03\/LOGO_PSG_FORENSICS_300px.png","contentUrl":"https:\/\/www.psgforensics.nl\/wp-content\/uploads\/2019\/03\/LOGO_PSG_FORENSICS_300px.png"},{"@type":"BreadcrumbList","@id":"https:\/\/psgrecherche.nl\/en\/missed-opportunities-identification-of-data-sources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/psgrecherche.nl\/en\/"},{"@type":"ListItem","position":2,"name":"Missed opportunities \u2013 identification of data sources"}]},{"@type":"WebSite","@id":"https:\/\/psgrecherche.nl\/en\/#website","url":"https:\/\/psgrecherche.nl\/en\/","name":"Psgrecherche.nl","description":"PSG Recherche heeft een passie voor waarheidsvinding","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/psgrecherche.nl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/psgrecherche.nl\/en\/#\/schema\/person\/833943ff71dafc62cf8e1fb505f0595a","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/psgrecherche.nl\/wp-content\/litespeed\/avatar\/ebb6127695798d90b74a529c2c26da26.jpg?ver=1776316176","url":"https:\/\/psgrecherche.nl\/wp-content\/litespeed\/avatar\/ebb6127695798d90b74a529c2c26da26.jpg?ver=1776316176","contentUrl":"https:\/\/psgrecherche.nl\/wp-content\/litespeed\/avatar\/ebb6127695798d90b74a529c2c26da26.jpg?ver=1776316176","caption":"admin"},"url":"https:\/\/psgrecherche.nl\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/psgrecherche.nl\/en\/wp-json\/wp\/v2\/posts\/916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/psgrecherche.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/psgrecherche.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/psgrecherche.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/psgrecherche.nl\/en\/wp-json\/wp\/v2\/comments?post=916"}],"version-history":[{"count":0,"href":"https:\/\/psgrecherche.nl\/en\/wp-json\/wp\/v2\/posts\/916\/revisions"}],"wp:attachment":[{"href":"https:\/\/psgrecherche.nl\/en\/wp-json\/wp\/v2\/media?parent=916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/psgrecherche.nl\/en\/wp-json\/wp\/v2\/categories?post=916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/psgrecherche.nl\/en\/wp-json\/wp\/v2\/tags?post=916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}