ext_116649 ([identity profile] trom.livejournal.com) wrote in [personal profile] doc_strange 2004-01-26 03:05 pm (UTC)

I've seen our top forensic expert explain to a system owner in detail the actions that had been (lied about) and taken to hide data, obscure data, and wipe data, the programs the defendant had used to do it, the day and time each action was taken, and what the defendant had said in IM and email right around each action.

Forensic analysis at this level is definitely one my weaker points. While some of this is having the right tools (e.g. EnCase), finding good information on how to do this has been incredibly challenging. Do you (or your expert) have any good pointers?

-Mort

Post a comment in response:

This account has disabled anonymous posting.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting