Although this method is forensically intrusive, it may be used for acquiring data from already rooted LG watches. Furthermore, to root the LG G watch, the watch has to be reset to its factory settings which is alarming because the process may delete data of forensic relevance. Our results show that we can recover a swath of digital evidence directly form the watches when compared to the data on the phone that is synced with the watches. We further outline a methodology for physically acquiring data from the watches after gaining root access to them. In our work, we examined the forensic artifacts that are left on a Samsung Galaxy S4 Active phone that was used to sync with the Samsung Gear 2 Neo watch and the LG G watch. We posit that as smart watches are adopted by more users, the potential for them becoming a haven for digital evidence will increase thus providing utility for this preliminary work. These wearable computing devices have the form factor of watches and sync with smart phones to display notifications, track footsteps and record voice messages. This work presents preliminary forensic analysis of two popular smart watches, the Samsung Gear 2 Neo and LG G.