Jan Collie, The Digital Detective

Jan, how did you get started in computer forensics?

I decided to specialise in forensics after meeting a bunch of lads from the Hi-Tech Crime Unit at a conference in London in about 2002. For a start, they had all this groovy kit on their stand, which induced serious Gadget Envy. But when they described what they actually did, I was totally sold. I’d spent a long time in undercover investigations, so the idea of snooping around systems for dodgy deeds really appealed to me. I also jump at any chance to get my screwdrivers out and take stuff apart. It was a dream combination.

Can you tell us something about the type of work you do now?

I mostly do Corporate and Legal investigations. Largely, these involve fraud, IP theft and staff computer misuse though I have also turned up evidence of drug dealing and software piracy.I also take on Criminal cases. Sadly, these usually involve child exploitation issues, but I’ve also dealt with Blackmail and Terrorism.

What tools do you use? What do you like about them? What aspects do you think could be improved?


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

I use all the regulars – EnCase, FTK, XWays – plus lots of smaller applications for specials, such as parsing Prefetch. The tools are fantastic for getting you up and running on a case straight away. Automatic carving also saves an awful lot of time. I never completely trust any of them, though. I like to compare and contrast results. I like to follow my own instincts, too. As for how the tools could be improved, like most examiners, I’d like some to be a lot more stable. Nothing worse than waiting a couple or three days for a case to process then coming in to find the software’s locked itself solid. Processing time is the other big issue but with Terabyte drives becoming commonplace, I don’t see that improving soon.

Jan, you have an impressive array of qualifications and training courses under your belt – how do you feel about the training on offer in computer forensics? What advice would you give to someone looking for training?

Two prongs to this one: I think the standard of training offered by vendors such as Access Data and Guidance is excellent. They have some very knowledgeable presenters, so you get way more than a load of hands-on with the forensic tools involved, though this, too, is important. The standard of training on some of the so called ‘Computer Forensics’ courses offered by Universities, is a different matter. Important basics, such as correct forensic procedure, are frequently overlooked. Students come away knowing a lot about Information Risk and Security but hardly anything about how to handle a suspect box in the field. Advice for people looking for training: You won’t go wrong with Guidance or Access Data,. Buy a Training Passport to offset the extreme pain of what it’s going to cost if you’re not Law Enforcement.

I'd like to ask (almost inevitably!) about women in computer forensics, of whom you seem to be one of very few at the moment. Can you tell us something about your experience as a woman working in this field?

Things are changing and more women are getting into forensics in this country. In the past, like most things with a science / technology bent, I think it’s been seen as a man’s job. Also, it used to be difficult to get the training unless you were in Law Enforcement or the Military and, let’s face it, both of those arenas have been pretty male-dominated.

In my experience, it’s still a shock to the majority of people when a women grabs a computer, pops it on the floor and starts taking it apart. They just don’t expect it. Especially if you’re not in black trousers and built like a stevedore. However, research has yet to prove that skirts and high heels impair either your manual dexterity or mental acuity.

The ingraincd perceptions hang on, nevertheless. In these PC days, it’s an unspoken undercurrent, but it’s there all the same. An example was the time, a couple of years ago, when prominent women members of a certain well-known security body were asked to speak at a day-long event. These events were always very well attended. This time, though, hardly anyone showed and after lunch, the room was an embarrassment. Afterwards, I spoke privately to some trusted males and asked whether the reaction hadn’t been just a tintsy bit gender specific. In every case, the answer was a shuffling of feet and, “Yes, well, you know… ” Yes, well, I do, actually. Guys generally still think they have diddly-squat to learn from women.

What qualities do you think are most important for anyone working in computer forensics?

Attention to detail and thinking outside the box.

What is the most rewarding part of your job? What aspect of your job do you find most challenging?

Results are the most rewarding part! I particularly enjoy outsmarting the computer user who thinks they’ve covered their tracks. The most challenging aspect is proof – can you really prove whose hands were on the keyboard? As computer analysts, we’re actually dealing with circumstantial evidence. Building a compelling case that a certain person was responsible for certain actions is difficult.

What do you do to relax when you're not working?

That’s a bit personal, isn’t it ? ((-:

Also, I have a big, fast, ex-racing Thoroughbred. We go for a good gallop most days.

Leave a Comment

Latest Videos

Throughout the past few years, the way employees communicate with each other has changed forever.

69% of employees note that the number of business applications they use at work has increased during the pandemic.

Desk phones, LAN lines and even VOIP have become technologies of the past workplace environment as employees turn to cloud applications on their computers and phones to collaborate with each other in today’s workplace environment.

Whether it’s conversations in Teams, file uploads in Slack chats, or confidential documents stored in Office 365, the amount of data stored and where it is stored, is growing quicker than IT and systems administrators can keep up with.

Corporate investigators and eDiscovery professionals need to seamlessly collect relevant data from cloud sources and accelerate the time to investigative and discovery review.

With the latest in Cellebrite’s remote collection suite of capabilities, investigators and legal professionals can benefit from secure collection with targeted capabilities for the most used workplace applications.

Join Monica Harris, Product Business Manager, as she showcases how investigators can:

- Manage multiple cloud collections through a web interface
- Cull data prior to collection to save time and money by gaining these valuable insights of the data available
- Collect data from the fastest growing cloud collaboration applications like Office365, Google Workspace, Slack and Box
- Login to a single source for workplace app collection without logging into every app and pulling data from multiple sources for every employee
- Utilize a single unified collection workflow for computer, mobile and workplace cloud applications without the need to purchase multiple tools for different types of collections – a solution unique to Cellebrite’s enterprise solution capabilities

Throughout the past few years, the way employees communicate with each other has changed forever.

69% of employees note that the number of business applications they use at work has increased during the pandemic.

Desk phones, LAN lines and even VOIP have become technologies of the past workplace environment as employees turn to cloud applications on their computers and phones to collaborate with each other in today’s workplace environment.

Whether it’s conversations in Teams, file uploads in Slack chats, or confidential documents stored in Office 365, the amount of data stored and where it is stored, is growing quicker than IT and systems administrators can keep up with.

Corporate investigators and eDiscovery professionals need to seamlessly collect relevant data from cloud sources and accelerate the time to investigative and discovery review.

With the latest in Cellebrite’s remote collection suite of capabilities, investigators and legal professionals can benefit from secure collection with targeted capabilities for the most used workplace applications.

Join Monica Harris, Product Business Manager, as she showcases how investigators can:

- Manage multiple cloud collections through a web interface
- Cull data prior to collection to save time and money by gaining these valuable insights of the data available
- Collect data from the fastest growing cloud collaboration applications like Office365, Google Workspace, Slack and Box
- Login to a single source for workplace app collection without logging into every app and pulling data from multiple sources for every employee
- Utilize a single unified collection workflow for computer, mobile and workplace cloud applications without the need to purchase multiple tools for different types of collections – a solution unique to Cellebrite’s enterprise solution capabilities

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_g6nTjfEMnsA

Tips And Tricks Data Collection For Cloud Workplace Applications

Forensic Focus 9 hours ago

In this episode of the Forensic Focus podcast, Si and Desi explore the cutting-edge technology of deepfake videos and image manipulation. In addition to discussing the latest technological developments and efforts being made to detect manipulated media, they also examine the associated legal and ethical implications.

Show notes:

Boris Johnson image - https://www.theguardian.com/politics/2023/jan/10/spot-the-difference-boris-johnson-appears-scrubbed-from-photo-posted-by-grant-shapps

Deep Fake Neighbour Wars - https://m.imdb.com/title/tt21371376/

Stalin image - https://www.history.com/news/josef-stalin-great-purge-photo-retouching

Nvidia eye contact AI - https://www.polygon.com/23571376/nvidia-broadcast-eye-contact-ai and https://www.youtube.com/watch?v=xl87WTDrReo

Birthday problem - https://en.wikipedia.org/wiki/Birthday_problem

Same frightening woman in AI images - https://petapixel.com/2022/09/09/the-same-frightening-woman-keeps-appearing-in-ai-generated-images/

Inherent mysogeny of AI portraits - https://www.theguardian.com/us-news/2022/dec/09/lensa-ai-portraits-misogyny

Midjourney - https://www.midjourney.org/

Deepfake porn legality - https://www.theverge.com/2022/11/25/23477548/uk-deepfake-porn-illegal-offence-online-safety-bill-proposal and https://www.technologyreview.com/2021/02/12/1018222/deepfake-revenge-porn-coming-ban/

AIATSIS - https://aiatsis.gov.au/cultural-sensitivity

Fake tiger porn story - https://www.dailydot.com/unclick/tiger-porn-britain-law/

Group photo with no blinking - https://www.countrylife.co.uk/comment-opinion/curious-questions-group-photo-179102

Emma Watson deefake audio - https://www.thetimes.co.uk/article/ai-4chan-emma-watson-mein-kampf-elevenlabs-9wghsmt9c

Domestika - https://www.domestika.org/en/courses/981-introduction-to-interviewing-the-art-of-conversation

Investigative Interviewing - https://www.amazon.co.uk/dp/0199681899?ref=ppx_pop_mob_ap_share

Forensic Focus events calendar - https://www.forensicfocus.com/events/

Si Twitter - https://twitter.com/si_biles

In this episode of the Forensic Focus podcast, Si and Desi explore the cutting-edge technology of deepfake videos and image manipulation. In addition to discussing the latest technological developments and efforts being made to detect manipulated media, they also examine the associated legal and ethical implications.

Show notes:

Boris Johnson image - https://www.theguardian.com/politics/2023/jan/10/spot-the-difference-boris-johnson-appears-scrubbed-from-photo-posted-by-grant-shapps

Deep Fake Neighbour Wars - https://m.imdb.com/title/tt21371376/

Stalin image - https://www.history.com/news/josef-stalin-great-purge-photo-retouching

Nvidia eye contact AI - https://www.polygon.com/23571376/nvidia-broadcast-eye-contact-ai and https://www.youtube.com/watch?v=xl87WTDrReo

Birthday problem - https://en.wikipedia.org/wiki/Birthday_problem

Same frightening woman in AI images - https://petapixel.com/2022/09/09/the-same-frightening-woman-keeps-appearing-in-ai-generated-images/

Inherent mysogeny of AI portraits - https://www.theguardian.com/us-news/2022/dec/09/lensa-ai-portraits-misogyny

Midjourney - https://www.midjourney.org/

Deepfake porn legality - https://www.theverge.com/2022/11/25/23477548/uk-deepfake-porn-illegal-offence-online-safety-bill-proposal and https://www.technologyreview.com/2021/02/12/1018222/deepfake-revenge-porn-coming-ban/

AIATSIS - https://aiatsis.gov.au/cultural-sensitivity

Fake tiger porn story - https://www.dailydot.com/unclick/tiger-porn-britain-law/

Group photo with no blinking - https://www.countrylife.co.uk/comment-opinion/curious-questions-group-photo-179102

Emma Watson deefake audio - https://www.thetimes.co.uk/article/ai-4chan-emma-watson-mein-kampf-elevenlabs-9wghsmt9c

Domestika - https://www.domestika.org/en/courses/981-introduction-to-interviewing-the-art-of-conversation

Investigative Interviewing - https://www.amazon.co.uk/dp/0199681899?ref=ppx_pop_mob_ap_share

Forensic Focus events calendar - https://www.forensicfocus.com/events/

Si Twitter - https://twitter.com/si_biles

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i41eg24YGZg

Deepfake Videos And Altered Images - A Challenge For Digital Forensics?

Forensic Focus 13th February 2023 10:30 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...