Insights

Q&A with Blair Joynson: Digital Forensics in Practice - Timelines, Strategy and Emerging Risks | Part 2

Written by Blair Joynson | May 7, 2026 4:43:00 AM
Beyond identifying what digital evidence exists, the real investigative value lies in what that evidence can reveal when properly analysed. Large datasets, system logs and communications do not speak for themselves. It is digital forensics, applied with investigative intent, that can establish timelines, reveal patterns of behaviour and shed light on issues like knowledge, intent and opportunity. In this final part of the Q&A, Blair Joynson, CEO and Founder of Conseek explains how digital forensics turns raw data into meaningful evidence, the immediate steps organisations should take when digital material may be relevant, and how the role of digital forensics is continuing to evolve as technology becomes embedded in every aspect of organisational life.
 

Q5. How does digital forensics help establish timelines, intent, or patterns of behaviour that might not be obvious at first glance?

In simple terms, digital forensics helps turn large amounts of raw data into something meaningful.

On its own, digital information is just data. Emails, logs, documents, access records and device information do not automatically explain what happened. Good digital forensics is about collecting that information properly, understanding it in context, and then explaining what it actually shows.

I generally think about digital forensics in three parts.

The first part is acquisition. This is the technical process of extracting data from devices and systems in a way that preserves accuracy and reliability. It involves understanding device states, using appropriate tools, and making sure the data collected is complete and defensible. If this part is done poorly, everything that follows is compromised.

The second part is analysis. This is where digital forensics really starts to add value to an investigation. By correlating different sources of data, you can establish timelines, identify patterns of behaviour, and work out who knew what and when. This is rarely obvious from a single document or system. It usually comes from piecing together multiple data points and mapping them against the issues being investigated.

This is also where investigative experience matters. It is not enough to simply present data. You need to understand what the evidence is meant to establish. Is it knowledge? Intent? Opportunity? Compliance with an obligation? Digital evidence needs to be analysed with those  questions in mind. Otherwise, you are left with information that looks impressive but does not actually prove anything.

At Conseek, this overlap between investigations and digital forensics is deliberate. We are all exlaw enforcement, and I personally ran investigations as a detective. That background means we approach digital evidence strategically. We focus on how it supports or challenges allegations, whether it is inculpatory or exculpatory, and how it fits into the broader case theory.

The third part is reporting and explanation. This is just as important as collecting the data itself. Digital forensics often involves technical concepts that are not immediately obvious to lawyers, courts or decision-makers. Explaining timelines, metadata, system behaviour, IP addresses or device activity in clear, plain language is just as important as the information itself.

In many matters, the real value of digital forensics is not just establishing facts, but making those facts understandable and usable. That is what allows timelines, intent and patterns of behaviour to be properly assessed and relied upon.

When done properly, digital forensics provides independent, objective evidence that can confirm or contradict accounts of events. It often reveals connections and sequences that would otherwise be missed, and it gives investigations a level of clarity that is very difficult to achieve through witness evidence alone.

Q6. Based on your experience, what immediate steps should organisations take when they suspect digital evidence may be relevant?

The first thing to understand is that digital evidence is almost always relevant. The real question is not whether it exists, but whether it is worth pursuing and how it fits into what you are trying to establish.

At that early stage, organisations should be asking practical questions. What are we trying to prove or disprove? What information might exist? Where does it sit? And will it actually move the matter forward?

One of the most important early steps is making sure the right people are involved. Digital evidence sits at the intersection of technology and investigations. A lawyer may understand the legal issues but not the technical detail. An IT professional may understand the systems but not the investigative strategy. Not all investigators have the same skill sets either.

That is why having someone involved who understands digital evidence in an investigative context is important. Someone who can look at the matter strategically and work out what evidence matters, what does not, and what needs to be preserved early.

Where devices are involved, basic steps such as securing them, removing them from networks, and preventing remote access can be important. But there is no one-size-fits-all approach. What you do depends on the device, the system, the permissions, and the risks involved.

In practice, the most effective step an organisation can take is to have trusted expertise available ahead of time. Someone they can call early, talk the situation through with, and get clear guidance before irreversible decisions are made. Early advice can prevent mistakes that are difficult or impossible to undo later.

Q7. As technology continues to evolve, how is the role of digital forensics changing?

Digital forensics is no longer something that only appears at the end of a matter.

In the past, it was often used primarily as expert evidence for court, to explain technical issues after everything else had already happened. That has changed. We are now being engaged much earlier, often before formal proceedings even begin.

This shift has happened because almost every matter now has a digital component. Early decisions about systems, access, data collection and strategy can significantly influence the outcome. What is done, or not done, in the early stages has real knock-on effects later.

We are increasingly asked to assist law firms and investigation teams at the front end. Not necessarily to extract data or provide expert reports, but to help shape the approach. To identify what questions should be asked, what risks exist, and what inform ation may be critical before it is lost.

It is difficult to ask the right questions about technology if you do not understand it. Digital forensic specialists can provide that bridge between legal, technical and investigative thinking. That early guidance helps teams stay on the right path and avoid outcomes that could undermine a matter further down the track.

As more systems move online and more activity becomes digitally recorded, this trend will only continue. Finance, communications, business operations and even assets are increasingly digital. That means digital forensics will keep moving earlier in the lifecycle of disputes and investigations.

With that comes a responsibility on experts in this space to stay current. Cyber-enabled activity, emerging technologies and evolving systems all change how evidence is created and stored. To provide real value, digital forensic practitioners must keep pace with those changes and understand how they affect investigations in the real world.

 

Blair Joynson, CEO and Founder, Conseek 

Blair Joynson is the Founder and CEO of Conseek, a specialist advisory firm providing independent financial and digital evidence expertise in complex, contested and high‑stakes matters. Before founding Conseek, Blair spent more than a decade with the NSW Police Force as a Detective, investigating fraud, cybercrime and complex digital behaviour, and providing evidence under cross‑examination in adversarial proceedings. Following his departure from law enforcement in 2025, he established Conseek to address the growing gap between increasingly complex financial and digital material and the need for clear, defensible decision‑making. Today, Blair works alongside law firms, law enforcement and other professionals on digital forensics, financial investigations, cryptocurrency matters and expert witness engagements.