Q&A with Blair Joynson: Digital Forensics in Practice - Timelines, Strategy and Emerging Risks | Part 2
Q5. How does digital forensics help establish timelines, intent, or patterns of behaviour that might not be obvious at first glance?
In simple terms, digital forensics helps turn large amounts of raw data into something meaningful.
On its own, digital information is just data. Emails, logs, documents, access records and device information do not automatically explain what happened. Good digital forensics is about collecting that information properly, understanding it in context, and then explaining what it actually shows.
I generally think about digital forensics in three parts.
The first part is acquisition. This is the technical process of extracting data from devices and systems in a way that preserves accuracy and reliability. It involves understanding device states, using appropriate tools, and making sure the data collected is complete and defensible. If this part is done poorly, everything that follows is compromised.
The second part is analysis. This is where digital forensics really starts to add value to an investigation. By correlating different sources of data, you can establish timelines, identify patterns of behaviour, and work out who knew what and when. This is rarely obvious from a single document or system. It usually comes from piecing together multiple data points and mapping them against the issues being investigated.
This is also where investigative experience matters. It is not enough to simply present data. You need to understand what the evidence is meant to establish. Is it knowledge? Intent? Opportunity? Compliance with an obligation? Digital evidence needs to be analysed with those questions in mind. Otherwise, you are left with information that looks impressive but does not actually prove anything.
At Conseek, this overlap between investigations and digital forensics is deliberate. We are all exlaw enforcement, and I personally ran investigations as a detective. That background means we approach digital evidence strategically. We focus on how it supports or challenges allegations, whether it is inculpatory or exculpatory, and how it fits into the broader case theory.
The third part is reporting and explanation. This is just as important as collecting the data itself. Digital forensics often involves technical concepts that are not immediately obvious to lawyers, courts or decision-makers. Explaining timelines, metadata, system behaviour, IP addresses or device activity in clear, plain language is just as important as the information itself.
In many matters, the real value of digital forensics is not just establishing facts, but making those facts understandable and usable. That is what allows timelines, intent and patterns of behaviour to be properly assessed and relied upon.
When done properly, digital forensics provides independent, objective evidence that can confirm or contradict accounts of events. It often reveals connections and sequences that would otherwise be missed, and it gives investigations a level of clarity that is very difficult to achieve through witness evidence alone.
Q6. Based on your experience, what immediate steps should organisations take when they suspect digital evidence may be relevant?
The first thing to understand is that digital evidence is almost always relevant. The real question is not whether it exists, but whether it is worth pursuing and how it fits into what you are trying to establish.
At that early stage, organisations should be asking practical questions. What are we trying to prove or disprove? What information might exist? Where does it sit? And will it actually move the matter forward?
One of the most important early steps is making sure the right people are involved. Digital evidence sits at the intersection of technology and investigations. A lawyer may understand the legal issues but not the technical detail. An IT professional may understand the systems but not the investigative strategy. Not all investigators have the same skill sets either.
That is why having someone involved who understands digital evidence in an investigative context is important. Someone who can look at the matter strategically and work out what evidence matters, what does not, and what needs to be preserved early.
Where devices are involved, basic steps such as securing them, removing them from networks, and preventing remote access can be important. But there is no one-size-fits-all approach. What you do depends on the device, the system, the permissions, and the risks involved.
In practice, the most effective step an organisation can take is to have trusted expertise available ahead of time. Someone they can call early, talk the situation through with, and get clear guidance before irreversible decisions are made. Early advice can prevent mistakes that are difficult or impossible to undo later.
Q7. As technology continues to evolve, how is the role of digital forensics changing?
Digital forensics is no longer something that only appears at the end of a matter.
In the past, it was often used primarily as expert evidence for court, to explain technical issues after everything else had already happened. That has changed. We are now being engaged much earlier, often before formal proceedings even begin.
This shift has happened because almost every matter now has a digital component. Early decisions about systems, access, data collection and strategy can significantly influence the outcome. What is done, or not done, in the early stages has real knock-on effects later.
We are increasingly asked to assist law firms and investigation teams at the front end. Not necessarily to extract data or provide expert reports, but to help shape the approach. To identify what questions should be asked, what risks exist, and what inform ation may be critical before it is lost.
It is difficult to ask the right questions about technology if you do not understand it. Digital forensic specialists can provide that bridge between legal, technical and investigative thinking. That early guidance helps teams stay on the right path and avoid outcomes that could undermine a matter further down the track.
As more systems move online and more activity becomes digitally recorded, this trend will only continue. Finance, communications, business operations and even assets are increasingly digital. That means digital forensics will keep moving earlier in the lifecycle of disputes and investigations.
With that comes a responsibility on experts in this space to stay current. Cyber-enabled activity, emerging technologies and evolving systems all change how evidence is created and stored. To provide real value, digital forensic practitioners must keep pace with those changes and understand how they affect investigations in the real world.
Blair Joynson, CEO and Founder, Conseek