Establishing the parties to a communication is far more problematic with increased reliance by all members of society on electronic forms of communication such as email, text messaging, PIN to PIN, Internet-based communications, etc. See R v Fraser, 2011 BCSC 32. Circumstantial evidence will often be the only means by which to establish identification of who is speaking or communicating. The following methods have proved helpful: proving possession of the communication device (seizure upon arrest or execution of a warrant), subscriber information, surveillance (pursuant to a court authorization, where required), analysis of the content of the communication and forensic examination of the communication device. In circumstances when a suspect is known to be technologically sophisticated and will take measures to destroy, delete or encrypt electronic evidence (often triggered by automated computer programs or modified electronic devices), traditional investigative techniques such as knocking on a suspect’s door on a ruse (e.g. making a delivery) at a time when the police know the computer is in use (for example, during the commission of an offence) may help preserve evidence, particularly when it is collected by trained computer forensic investigators.