By Jennifer Graeser Dornbush
When I was growing up, evidence meant fingerprints, fibers, and blood spatter.
Today, we also find enormous amounts of evidence in our digital prints: browser histories, cell phone pings, and metadata buried in a cloud server halfway around the world.
Crime scenes have a giant presence online.
I’ve spent years learning how investigators read the physical world for truth. But in the last decade, a new kind of evidence has changed everything. The next big clue isn’t under a microscope, it’s inside a smartphone.
For storytellers, that shift opens an entirely new frontier. If you’re writing crime fiction and ignoring digital forensics, you’re leaving some of your richest material untapped. But it’s also tricky because what we “watch” or “observe” on a screen isn’t very action-focused as a plot line.
Today, we’re stepping into the world of cyber forensics and how to use this evidence in your next crime fiction.
What Is Cyber Forensics?
In the simplest terms, cyber or digital forensics is the process of identifying, preserving, analyzing, and presenting data from electronic devices in a way that stands up in court.
If traditional forensics examines fingerprints and fibers, digital forensics examines pixels and packets, the trails left by our phones, laptops, GPS units, and cloud accounts.
The real-world process
When a device is seized, investigators create a “forensic image,” a bit-by-bit copy that captures everything: deleted files, timestamps, cached data, and metadata. That image becomes the foundation for analysis. Information Analysts then use specialized software to reconstruct timelines, recover communications, and verify authenticity of an individual’s usage.
Every action is documented to maintain the chain of custody and keep evidence tracked, secure, and court-admissible.
Digital forensics branches into specialties:
● Computer forensics – analyzing desktops and hard drives.
● Mobile forensics – recovering data from phones, tablets, and wearables.
● Network forensics – tracking online traffic, hacking, and IP traces.
● Cloud forensics – locating and authenticating data stored on remote servers.
The process may sound technical, but at its heart, it’s still detective work. Each byte is a breadcrumb, and every breadcrumb tracks a trail where a criminal or victim has been.
Where Digital Evidence Hides
A great mystery writer knows how to hide a clue in plain sight. The same is true of digital evidence.
1. Smartphones
Modern phones are portable black boxes. They store call logs, texts, deleted images, app data, GPS trails, and even sensor information that can pinpoint motion and location. In fiction, a single recovered text or photo can flip a plot.
Example: A victim’s fitness app records 200 extra steps at 2 a.m. proof she was still alive hours after the suspect claimed she was dead.
2. Laptops and Cloud Storage
Documents, emails, cached passwords, and file-creation times often reveal motive or premeditation. Cloud backups extend that reach: deleting something locally rarely means it’s gone.
3. Social Media and Messaging Apps
Posts, private messages, likes, and geotags create a map of a suspect’s or victim’s personal life. For writers, social platforms can expose contradictions: the killer who posts a cheerful vacation photo minutes after committing a crime. The victim who texted an irate boyfriend before disappearing.
4. Smart Devices
Doorbell cameras, smart speakers, thermostats, and watches all record direct evidence of where a victim or criminal has been. Investigators now recover voices, motion data, even room temperatures to build timelines.
5. The Digital Silence
Sometimes what isn’t there matters most, a phone suddenly powered off, an erased drive, an hour missing from security footage. In storytelling, absence of evidence can shout louder than its presence.
Every byte is a witness; the challenge is deciding which ones are telling the truth.
Turning Data into Drama
As a writer I often worry that using too much digital forensics bogs my story down, makes it uninteresting, or relies on telling instead of showing. After all, we want our characters in action. And watching someone stare at a screen or pick through files is very passive and very boring.
The secret to treating digital discovery is to use as little exposition as possible– sometimes you have to describe video footage or a computer file. Where we can get the most punch is when we use digital evidence as revelation… aka: a turning point in the plot. The found digital evidence can be a small, medium, or big turning point. But it has to count as something that shifts the plot investigation in a new direction.
● Anchor the data to emotion. A recovered voicemail is about the message, but also the emotional meaning to the person who hears it.
● Pace the reveal. Instead of unloading a list of findings, let information surface gradually, each clue raising new questions.
● Show the cost. What does it feel like to invade a victim’s inbox or scroll through a dead child’s messages? Use sensory detail to humanize the act of investigation as the investigator is uncovering the evidence.
● Avoid jargon overload. Let characters translate for the reader: “The timestamp’s off. Someone changed it.” That’s all you need. Unless your character is a digital analyst. Then, lean into the jargon as part of her character
The Emotional Edge
Behind every password and pixel is a person. And humans are driven by emotion. Use that in writing. Here’s how:
Bringing Humanity to the Data
The best crime stories are seeded in motive. Digital evidence should never replace emotion; it should reveal it.
● A deleted text exposes regret.
● A GPS trail shows obsession.
● A search history lays bare guilt.
● A detective scrolls through a suspect’s messages, what do they feel? Curiosity? Pity? Revulsion?
● Think of each digital discovery as a confession waiting to be interpreted.
● What is a detective’s reaction when she hacks into a victim’s private photos?
● What happens when a journalist exposes data meant to stay sealed?
● How do loved ones feel when a phone becomes evidence instead of memory?
Use emotional reactions of characters to heighten empathy, build the plot, and ratchet up suspense as they uncover a digital footprint.
Realism Without the Textbook
You don’t need to be a hacker to write digital authenticity. You just need to understand procedure and respect accuracy.
Start with credible sources
● The U.S. Department of Justice’s Digital Evidence Guide outlines best practices for law enforcement.
● The National Institute of Standards and Technology (NIST) publishes clear, publicly available frameworks.
● The FBI Cyber Division offers summaries of current threats and tools.
● Podcasts such as Darknet Diaries or The Forensic Lunch reveal real cases in accessible language.
Write lean
A single correct detail is worth more than pages of exposition. If you know what a “write-blocker” or “hash value” is, mention it once to show expertise, then move on. An easy hack for this is to have the digital expert character explain it to a non-techie character.
Consult real experts
A quick interview with a local cyber-crime investigator can provide nuances no textbook will, tone, pressure, emotional toll.
Authenticity doesn’t come from showing off what you know. It comes from knowing just enough to stay believable.
The Digital Detective
Every generation of investigators develops new instincts. The digital detective, whether real or fictional, reads data like body language.
They’re patient, analytical, and often brilliant. They see patterns others miss. But make sure yours is more than a brain behind a keyboard.
Give them the full range of character depth:
● A cyber expert who still keeps notes by hand.
● A genius coder who’s terrible at reading people.
● A hacker turned consultant wrestling with guilt.
Common Mistakes to Avoid
1. Tech magic. Don’t let characters “trace the IP in seconds” or “hack the Pentagon before lunch.” Real analysis takes time, warrants, and patience.
2. One-click evidence. Data rarely tells a single truth. Circumstantial evidence here requires that investigators put all together all the evidence to create a line of reasoning that leads to a single suspect.
3. Static scenes. Fiction can quickly turn into non-fiction with digital evidence trails. But no one wants to read computer analysis. BORING! Keep it quick, fast, and show how data changes the direction of plot.
4. Outdated references. Technology evolves fast. Double-check that the apps, devices, and terminology in your story still exist.
5. Emotionless experts. Readers connect to people, not software. Give your digital detectives personal reactions to what they discover.
The Forensic Thread
When I teach writing workshops, I remind authors that fictional forensics is about culling what is possible, not what isprobable. Whatever thread you pull on doesn’t have to be probable. It only has to be possible. Have fun with evidence and technology! Be inventive!
In my own fiction, I use cyber forensics the way I use autopsies, not for shock value, but to reveal truth. A recovered email can carry much emotional weight when it’s tied to character and motive.
Science gives us technology; humanity gives us connection. When you use cyber forensics, balance both.
The Future of Digital Crime
The frontier keeps expanding. Artificial intelligence can now detect manipulated images and generate false ones. Blockchain records are being introduced as tamper-proof evidence. Entire crime scenes can be reconstructed in virtual reality.
That evolution is thrilling for real life investigators… as much as it is for storytellers. Imagine writing a case where the killer uses deepfakes to create an alibi, or where investigators chase a suspect across multiple metaverses in VR.
But beneath the technology, the essential human question never changes: Why?
Technology will always change how crimes can be carried out… and solved. The corruption of human heart will always determine motive. And motive will always be the pulse of every great crime story.
Jennifer Dornbush is an author, screenwriter, and forensic specialist who brings crime stories to life with authenticity and heart. With a background rooted in real-world forensics and a passion for crafting unforgettable mysteries, Jennifer offers readers and viewers a front-row seat to the intersection of science, justice, and human nature. Jennifer’s crime expertise has made her a sought-after speaker, consultant, and educator. Through her webinars and master courses, Jennifer guides writers in melding suspenseful storytelling with forensic realism to the screen and page. Meet her at www.jenniferdornbush.com

I’m bookmarking this! Practically everyone has a cell phone now, and in some ways technology has made it harder for your villain to get away with a crime. Takes a lot more work to get the details right.
Makes me extra glad I write historical before there was a digital footprint. But this post is extremely informative if I ever decide to take the leap into the modern age for fiction.
I love a good old historical crime 🙂
Thank you so much, Jennifer. This is so timely. I’ve printed it out (my version of bookmarking, lol). Technology surrounding texts is critical to the romantic suspense story my agent is currently shopping. It was tough finding information on whether what I needed my homicide detective to be able to do was actually possible. Ironically, I found confirmation in a newspaper article about a cheating politician who had an affair with a staff member who later killed herself (set herself on fire!). Local law enforcement used a private firm that specializes in retrieving not just the telephone numbers associated with texts but their content. They were able to show that the politician lied about not having an affair. He resigned (not that he was charged with anything, of course). For those of us who are navigating technology in our crime fiction, your blog is invaluable!
Thanks Kelly! I think you and I have talked about how many trees we kill by printing stuff out! 🙂 I have boxes of “bookmarked” ideas and articles. And I actually use them! Those trees do not go to waste! I love the research you did… and wow… what a way to kill oneself. I mean, there are so many less painful ways… just saying. 🙂 xx Write on!
Good blog, Jennifer, and extremely useful. It’s getting more difficult to go anywhere without leaving a digital footprint, and there are cameras almost everywhere.
Wow, Jennifer, this is pure gold! Thank you! I’m not tech savvy but tech plays inevitable roles in my contemporary thrillers.
Keeping up to date with ever-increasing capabilities is difficult. My book Deep Fake Double Down dealt with use of deep fake video as false evidence against an innocent person. i ran the first draft past an expert. Nine months later, I ran the finished draft past another expert. In that time, practices had changed so much and so quickly that I had to rewrite parts of the book.
Deep fakes were improving so quickly that there was no way I could keep the book current. Finally I had to decide the story takes place in a particular set timeframe and freeze it there.
Do you have ideas how to keep such details current in your stories?
Wow.. that’s incredibly fast digital progress… but not surprising… and jus think.. during the time from book submission to publication, so much could change digitally… we live in interesting times.
I have a writing buddy who’s a computer programmer, and I’ve been relying on him to correct me when I either do the impossible or forget to include what to him is obvious. This post will help.