Order of volatility and evidence collection
Digital evidence varies enormously in how long it persists. The order of volatility determines which evidence to collect first before it disappears. Registers, cache, and running processes in CPU and memory are gone the moment the system is powered off or reboots. Running network connections close in seconds if the system loses connectivity. Swap and virtual memory on disk disappears when the OS clears it. Disk data is the most durable, persisting until actively overwritten. Remote logs and archived data are the most durable of all.
The practical implication: capture live memory before taking a disk image. A forensic memory dump captures running processes, encryption keys loaded in RAM, active network connections, and malware that exists only in memory. Turning off the system first destroys all of this. For fileless malware that leaves no disk artifacts, the memory dump may be the only evidence.
The order from most volatile to least: CPU registers and cache, RAM and live processes, network connections, running OS state, disk contents, remote logging, archived backup data. Collect in this order without exception.
Chain of custody, imaging, and write blockers
Chain of custody is the unbroken documented record of who possessed, handled, or accessed evidence from the moment of collection through courtroom presentation. Every transfer of custody is logged with the date, time, reason, and identities of both parties. If the chain of custody is broken or unverifiable, a defense attorney can argue that the evidence could have been tampered with and have it excluded from court.
Forensic imaging creates a bit-for-bit copy of a storage device without changing a single bit on the original. You analyze the image, never the original. This preserves the original in its unmodified state for chain of custody purposes. Write blockers are hardware or software devices that physically prevent any write commands from reaching the original disk during imaging. Without a write blocker, simply connecting the drive to a forensic workstation can modify timestamps or journal entries on the original.
Hash verification confirms the image is an exact copy. Calculate a SHA-256 hash of both the original and the image. Matching hashes prove the image is identical to the original. Document the hash values in the case file as part of the chain of custody record.
How to choose the correct answer
Order of volatility from most to least: registers/CPU cache, RAM, network connections, disk, remote logs, backups. Always collect more volatile evidence first.
Write blocker: required before connecting any drive to prevent accidental modification of the original evidence.
Forensic image: bit-for-bit copy of original storage. Verify with matching hash values before and after imaging.
Chain of custody: document every hand the evidence passes through. A gap in documentation can make evidence inadmissible.
Live forensics: capturing evidence from a running system while it is still powered on, to preserve volatile data before shutdown.