Abstract

How critical is it for the computer crime investigator to show the operating capabilities of a suspect's computer or to prove how a specific file or document was used? Consider the following scenario for a newly trained computer forensic analyst: Having recently been trained in computer forensics and practicing your file recovery techniques for co-workers, you begin an investigation for a client where you can use all those hard-learned skills. You make an image of the suspect's drive, look for the incriminating document, and eureka! You find it, recently deleted,but easy to recover. You undelete the file (maybe feel a little guilty because it was so easy), announce your success, and write up the results for your case file. It may be a child porn picture, or a document with industrial secrets, but when you appear in court later, you lose the case because you haven't proven that the suspect's system was even capable of viewing the picture or editing or printing the document.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.