Rooting a device for forensic access can be risky business. Data can be lost during the process. This is not good for forensics because you lose user data while attempting to access it! Make sure that all roots for forensic use are tested on devices prior to trying it on evidence, where possible. Pixel may erase the user partition before the bootloader is unlocked to install the root. This is a huge risk. Heather Mahalik’s website smarterforensics.com has a white paper written by Julie Desautels, a Champlain student, on Google Glass Forensics available in the Reading Room. Even with a root that matches your exact model and revision, you may find that you destroy the device and that it is inaccessible for acquisition. Rooting should always be your last step, and you need to ensure you have permission to proceed. Make sure your company understands that evidence could be destroyed during the rooting process. Keep in mind, it is possible to root devices without wiping the device, but data is commonly lost in the process.