Pardon me for blogging what amounts to a classified advertisement, but I’m wondering if there are any VC readers who are computer forensics experts and might be willing to spend a bit of time explaining the forensics process to me. I am writing a law review article on how the Fourth Amendment should apply to the computer forensics process; the big question is, what steps should forensics investigators be allowed to take to find particular evidence stored on a hard drive? Before answering this, I need to make sure I understand the tech side of how the process works, what steps investigators (especially law enforcement investigators) take, how the different kinds of software work, and the like. If this is your field and you might have some time next week, please send me an e-mail at okerr [at sign] law.gwu.edu. Thanks in advance — and for everyone else, my apologies for the off-topic post.
Comments are closed.