


Prodiscover Basic Education Edition Professional Conduct 2
But the trial judge determined that Amex failed to authenticate its electronic records, and therefore Amex could not admit its own business records into evidence. Vinhnee had failed to pay his credit card debts, and took legal action to recover the money. Four different version of F-Response.Objectives Define computer forensics Describe how to prepare for computer investigations and explain the difference between law enforcement agency and corporate investigations Explain the importance of maintaining professional conduct 2 2Definition: Involves obtaining and analyzing digital information, often as evidence in civil, criminal, or administrative cases Computer forensics: Investigates data that can be retrieved from a computer’s hard disk or other storage media Task of recovering data that users have hidden or deleted and using it as evidence Evidence can be inculpatory (“incriminating”) or exculpatory 3 34 Computer Forensics Versus Other Related DisciplinesNetwork forensics Yields information about how a perpetrator or an attacker gained access to a network Data recovery Recovering information that was deleted by mistake, or lost during a power surge or server crash Typically you know what you’re looking for 4 45 Computer Forensics Versus Other Related Disciplines (continued)Disaster recovery Uses computer forensics techniques to retrieve information their clients have lost Investigators often work as a team to make computers and networks secure in an organization 5 56 Digital Evidence Locard’s principle: “every contact leaves a trace”Any information, stored or transmitted in digital form, that a party to a court case may use at a trial To be accepted in court, digital evidence must meet certain criteria … Admissibility Authenticity7 Case study In this case, American Express (Amex) claimed that Mr. With ProDiscover Basic you can.

When he was accused of molesting a child, police seized his computers and other physical evidence. Investigators must be familiar with recent rulings to avoid making similar mistakes.” case law does not involve creating new criminal offenses15 Developing Computer Forensics ResourcesKnow more than one computing platform Such as DOS, Windows 9x, Linux, Macintosh, and current Windows platforms Join many computer user groups - Computer Technology Investigators Network (CTIN) Meets monthly to discuss problems that law enforcement and corporations face High Technology Crime Investigation Association (HTCIA) Exchanges information about techniques related to computer investigations and security 15 1516 Developing Computer Forensics Resources (continued)User groups can be helpful Build a network of computer forensics experts and other professionals And keep in touch through Outside experts can provide detailed information you need to retrieve digital evidence 16 1617 Case Study A user group helped convict a child molester in Pierce County, Washington, in The suspect installed video cameras throughout his house, served alcohol to young women to intoxicate them, and secretly filmed them playing strip poker. As a result, all evidence regarding the pictures was excluded. Instead of waiting for a new warrant, he kept searching.
Two distinct categories Public investigations Private or corporate investigationsInvolve government agencies responsible for criminal investigations and prosecution Organizations must observe legal guidelines Law of search and seizure: Protects rights of all people, incl. As a result, the suspect received a longer sentence than if he had been convicted of molesting only one child.Typically includes collecting computer data securely, examining suspect data to determine details such as origin and content, presenting compute-based information to courts, and applying laws to computer practice. On the suspect’s computer, the investigator found a diary detailing the suspect’s actions over the past 15 years, including the molestation of more than 400 young women. The investigator contacted a local user group, which supplied the standard commands and other information needed to gain access to the system.
