Forensic Examination of Digital Evidence
FORENSIC EXAMINATION OF DIGITAL EVIDENCE: A GUIDE FOR LAW ENFORCEMENT Steganography: The art and science of communicating in a way that hides the existence of the communication. It is used to hide a file inside another. For example, a child pornography image can be hidden inside another graphic image file, audio file, or other file format. System administrator: The individual who has legitimate supervisory rights over a computer system. The administrator maintains the highest access to the system. Also can be known as sysop, sysadmin, and system operator. Unallocated space: Allocation units not assigned to active files within a file system. Write protection: Hardware or software methods of preventing data from being written to a disk or other medium. 41
Appendix C. Sample Worksheets These worksheets are specific to the Drug Enforcement Administration and are provided as examples. 43
- Page 1 and 2: APR. 04 U.S. Department of Justice
- Page 3 and 4: APR. 04 Forensic Examination of Dig
- Page 5 and 6: Foreword Developments in the world
- Page 7 and 8: Technical Working Group for the Exa
- Page 9 and 10: Michael Finnie Forensic Specialist
- Page 11 and 12: Contents Foreword . . . . . . . . .
- Page 13 and 14: SPECIAL REPORT / APR. 04 Examinatio
- Page 15 and 16: SPECIAL REPORT / APR. 04 ongoing tr
- Page 17 and 18: Chapter 2. Evidence Assessment Prin
- Page 19 and 20: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 21 and 22: Chapter 3. Evidence Acquisition Pri
- Page 23 and 24: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 25 and 26: SPECIAL REPORT / APR. 04 ■ File c
- Page 27 and 28: SPECIAL REPORT / APR. 04 ■ Analyz
- Page 29 and 30: SPECIAL REPORT / APR. 04 During the
- Page 31 and 32: Appendix A. Case Examples The follo
- Page 33 and 34: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 35 and 36: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 37 and 38: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 39 and 40: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 42 and 43: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 44 and 45: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 46 and 47: Appendix B. Glossary The following
- Page 50 and 51: SPECIAL REPORT / APR. 04 Computer E
- Page 52 and 53: SPECIAL REPORT / APR. 04 Hard Drive
- Page 54 and 55: SPECIAL REPORT / APR. 04 Removable
- Page 56 and 57: Appendix D. Examples of Request for
- Page 58 and 59: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 60 and 61: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 62 and 63: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 64 and 65: Appendix F. Technical Resources Lis
- Page 66 and 67: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 68 and 69: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 70 and 71: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 72 and 73: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 74 and 75: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 76 and 77: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 78 and 79: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 80 and 81: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 82 and 83: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 84 and 85: FORENSIC EXAMINATION OF DIGITAL EVI
- Page 86 and 87: SPECIAL REPORT / APR. 04 High Techn
- Page 88 and 89: Appendix H. List of Organizations T
- Page 90 and 91: About the National Institute of Jus
Appendix C. Sample Worksheets<br />
These worksheets are specific to the Drug Enforcement Administration and are<br />
provided as examples.<br />
43