The invention is directed to techniques for allowing a user to remotely
interrogate a target computing device in order to collect and analyze
computer evidence that may be stored on the target computing device. A
forensic device receives input from a remote user that identifies
computer evidence to acquire from the target computing device. The
forensic device acquires the computer evidence from the target computing
device and presents a user interface for the forensic device through
which the remote user views the computer evidence acquired from the
target computing device. In this manner, forensic device allows the user
to interrogate the target computing device to acquire the computer
evidence without seizing or otherwise "shutting down" the target device.