Abstract
In our last column we took a look at analysing evidence. There are lots of other issues to consider in the analysis process that, by the nature and brevity of this column were not addressed. However, no one expects that after reading a few narrowly focused columns on electronic forensics to have become an electronic forensics expert or practitioner. There’s a bit more to it than that. This column will raise some of the issues and problems faced by investigators who encounter data encryption as part of a specific investigation. We’ll discuss some administrative remedies. Then we’ll focus on some other more proactive techniques that can be attempted in the event that the administrative procedures fail to produce results.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have