{"id":1527,"date":"2017-05-04T17:38:35","date_gmt":"2017-05-04T17:38:35","guid":{"rendered":"http:\/\/ediscovery.drivesaversdatarecovery.com\/?p=1001"},"modified":"2026-03-09T02:58:47","modified_gmt":"2026-03-09T09:58:47","slug":"digital-forensics-process-identificationn","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/digital-forensics-process-identificationn\/","title":{"rendered":"Digital Forensics Process\u2014Identification"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><i><span style=\"font-weight: 400;\">By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Identification is an extremely important first step in the forensic examination process. It directly impacts efforts to develop a plan of action and ultimately the success of the project. It also allows the customer to control <a href=\"\/ja-jp\/drivesavers-pricing-and-recovery-costs\/\">cost<\/a>. <\/span><!--more--><\/p>\n<h2>Identification<\/h2>\n<p><span style=\"font-weight: 400;\">Before any digital forensic examination begins, the scope of actions must be identified. Who are the key players and custodians? What are the best sources of potential electronic evidence that will need to be accessed for collection? This information is needed for many reasons, including:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">So that no essential evidence is missed that might affect a case<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">So costs can be estimated in advance and the scope of the case can be adjusted to fit actual needs<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">So potential sources of evidence identified later will have smaller impact in cost increases<\/span><\/li>\n<\/ol>\n<h2>\u30a4\u30f3\u30bf\u30d3\u30e5\u30fc<\/h2>\n<p><span style=\"font-weight: 400;\">Conducting interviews is a very important early step in a successful digital forensic examination. When determining relevant devices from which to collect data for a case, these individuals must be interviewed at a minimum:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Custodians<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Site administrators<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Users\u2014when available<\/span><\/li>\n<\/ol>\n<h2>Identify<\/h2>\n<p><span style=\"font-weight: 400;\">Look at the range of variables and determine what factors are at play in the case, including:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">To what extent does legal authority exist to make a search?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Is there an administrator who can identify devices and custodians?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How many and what type of devices may be involved?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Are any peripheral devices involved, such as flash drives, printers, scanners or memory cards?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What types of electronically stored information (ESI) are potentially involved? It could be photographs, documents, spreadsheets, emails, text messages, databases and many other types of ESI.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How was ESI communicated and who was communicating? We may be looking for email addresses, text numbers, IP addresses and other similar information.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Has information been stored in an offsite location? On backup media? In the cloud? In remote locations?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Are there devices involved that have potential remote login capabilities?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What different operating systems may be involved?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Do any devices require continuous electric power to operate?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Other variables?<\/span><\/li>\n<\/ol>\n<h2>Document<\/h2>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Interviews, including:<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Names and titles of interviewees<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The number and types of primary and peripheral devices to be included in the collection and search<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Any locations from which peripheral devices may have been removed or where they were found<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Whether or not any kind of network is present<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">File types involved<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Any off-site storage that is used <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What different types of software are present, including any proprietary software<\/span><\/li>\n<\/ul>\n<h2>Revise if Necessary<\/h2>\n<p><span style=\"font-weight: 400;\">If it is determined that additional electronic evidence (not included in the original plan) needs to be gathered, it\u2019s important to determine if there is a need for a legal warrant, amended consent form or any other changes to the original scope of work.<\/span><\/p>\n<h2>Measure Twice, Cut Once<\/h2>\n<p><span style=\"font-weight: 400;\">Digital evidence needs to be thoroughly assessed with respect to the scope of the case. The scope of a forensic examination cannot include \u201ceverything.\u201d At least, not unless there is unlimited time and budget involved. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is important to spend time at the very beginning to more accurately determine the true scope of the examination, narrow down what digital evidence is needed for a case and where to find it. Otherwise, costs will grow and grow as the investigation moves forward, as will the amount of time required for the investigation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Taking the extra time and attention to accurately determine necessary devices and custodians prior to proceeding with the next steps in the forensic process will dramatically impact the investigation as a whole and, therefore the outcome of the case.<\/span><\/p>\n<p><a href=\"\/ja-jp\/2017\/06\/08\/digital-forensic-process-preservation-collections\/\"><span style=\"font-weight: 400;\">Click for your lesson in preservation and collection! <\/span><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics Identification is an extremely important first step in the forensic examination process. It directly impacts efforts to develop a plan of action and ultimately the success of the project. It also allows the customer to control cost.<\/p>","protected":false},"author":3,"featured_media":48008,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[11465],"post_series":[],"class_list":["post-1527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-digital-forensic","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Digital Forensics Process\u2014Identification<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/digital-forensics-process-identificationn\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Forensics Process\u2014Identification\" \/>\n<meta property=\"og:description\" content=\"&nbsp; By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/digital-forensics-process-identificationn\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-04T17:38:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T09:58:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/05\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex Hagan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Hagan\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/\"},\"author\":{\"name\":\"Alex Hagan\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/70300a1f6ae9c2cdfe661c8214b5ff59\"},\"headline\":\"Digital Forensics Process\u2014Identification\",\"datePublished\":\"2017-05-04T17:38:35+00:00\",\"dateModified\":\"2026-03-09T09:58:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/\"},\"wordCount\":601,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg\",\"keywords\":[\"digital forensic\"],\"articleSection\":[\"DriveSavers Blog\"],\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/\",\"name\":\"Digital Forensics Process\u2014Identification\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg\",\"datePublished\":\"2017-05-04T17:38:35+00:00\",\"dateModified\":\"2026-03-09T09:58:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg\",\"width\":1200,\"height\":625},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/digital-forensics-process-identificationn\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Forensics Process\u2014Identification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/70300a1f6ae9c2cdfe661c8214b5ff59\",\"name\":\"Alex Hagan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g\",\"caption\":\"Alex Hagan\"},\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/ja-jp\\\/author\\\/alexhagan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Digital Forensics Process\u2014Identification","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/digital-forensics-process-identificationn\/","og_locale":"ja_JP","og_type":"article","og_title":"Digital Forensics Process\u2014Identification","og_description":"&nbsp; By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics","og_url":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/blog\/digital-forensics-process-identificationn\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2017-05-04T17:38:35+00:00","article_modified_time":"2026-03-09T09:58:47+00:00","og_image":[{"width":1200,"height":625,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/05\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg","type":"image\/jpeg"}],"author":"Alex Hagan","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"\u57f7\u7b46\u8005":"Alex Hagan","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"3\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/"},"author":{"name":"Alex Hagan","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/70300a1f6ae9c2cdfe661c8214b5ff59"},"headline":"Digital Forensics Process\u2014Identification","datePublished":"2017-05-04T17:38:35+00:00","dateModified":"2026-03-09T09:58:47+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/"},"wordCount":601,"commentCount":0,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/05\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg","keywords":["digital forensic"],"articleSection":["DriveSavers Blog"],"inLanguage":"ja","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/","name":"Digital Forensics Process\u2014Identification","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/05\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg","datePublished":"2017-05-04T17:38:35+00:00","dateModified":"2026-03-09T09:58:47+00:00","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/05\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/05\/DF-DIGITAL-FORENSICS-PROCESS\u2014IDENTIFICATION.jpg","width":1200,"height":625},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/digital-forensics-process-identificationn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Digital Forensics Process\u2014Identification"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers\u30c7\u30fc\u30bf\u5fa9\u5143\u30b5\u30fc\u30d3\u30b9","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers\u30c7\u30fc\u30bf\u5fa9\u5143","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/70300a1f6ae9c2cdfe661c8214b5ff59","name":"Alex Hagan","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g","caption":"Alex Hagan"},"url":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/author\/alexhagan\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/posts\/1527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/comments?post=1527"}],"version-history":[{"count":1,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/posts\/1527\/revisions"}],"predecessor-version":[{"id":82552,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/posts\/1527\/revisions\/82552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/media\/48008"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/media?parent=1527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/categories?post=1527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/tags?post=1527"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/ja-jp\/wp-json\/wp\/v2\/post_series?post=1527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}