Table of Contents

System Forensics, Investigation, and Response Day 4 to end

Day 5

Computer Investigative Law for Forensic Analysts..1

Topics Overview

Who Can Investigate:

Crimes of Damage Outsider (Hacker or Trespasser)Insider Some Authority
Intentional DamageFelonyFelony
Reckless DamageFelonyNo Crime
Other DamageMisdemeanorNo Crime

Acquiring Data:

contents of communicationsHeaders, logs, and other information
Access to stored communicationsECPAECPA
Real-time interceptionWiretap ActPen/Trap statute

* Network Devices..60

Your use of this network constitutes consent to monitoring and disclosure of the fruits of monitoring. You have no reasonable expectation of privacy on this network

Post Collection: Data Preservation..85

Data Analysis Investigative Report..88

Report Writing Fundamentals..91

Presentation in Court