In a recent investigation at a large US-based corporation, FTI Technology’s team of computer forensics specialists was asked to collect data from every mobile phone, USB device, computer and cloud source used by the company’s employees in order to piece together the clues surrounding a suspected fraudulent business transaction. Another matter this year involved a client’s request to collect information from its corporate Facebook page, which included the requirement to go back in time and recover historical and deleted data that was no longer resident on the site.

Completing these types of investigations has become standard practice within large organizations today, with social media, a wide range of mobile devices and multiple operating systems now playing a role. These sources introduce many variables, which can create significant obstacles for investigators seeking the key facts to solve a case. By examining matters that involve complex collections from social media and BYOD (“Bring Your Own Device”) environments, this article will reveal techniques for tackling common challenges in a defensible and efficient way.

Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access