Preview of Member Only Content
For full access: or Become a Member
Computer forensics: how to obtain and analyze electronic evidence
By Wade Davies
Computers (and the people who work
with them) are strange and wonderful things. Whether we like computers or not,
all of us who handle criminal cases have to learn how to deal with them as
pieces of evidence. This rule applies not only to computer crime or pornography
cases. In most business and home searches now, the government seizes computers.
The government is looking not just at what our clients have on their computers.
They are also analyzing what used to be there; when information was “deleted”
and how it was deleted.
In many ways, computerized evidence
must be dealt with the same way as any other type of evidence. It is subject to
the same need for defense inspection, the same chain of custody requirements,
and the same rules of admissibility. Defense counsel have to inspect
computerized evidence as carefully as they would a stack of documents that were
seized or the evidence taken after a barroom brawl.
In other ways, counsel’s role in
inspecting computerized evi
Want to read more?
The Champion archive is reserved for NACDL members.
NACDL members, please login to read the rest of this article.
Not a member? Join now.
Or click here to see an overview of NACDL Member benefits.
See what NACDL members say about us.
To read the current issue of The Champion in its entirety, click here.
- Media inquiries: Contact NACDL's Director of Public Affairs & Communications Ivan J. Dominguez at 202-465-7662 or email@example.com
- Academic Requests: Full articles of The Champion Magazine are available for academic and research purposes in the WestLaw and LexisNexis databases.