KGhaleon wrote: Good points. I never actually accepted the job, but rather, I explained to the client that I would take a look at it and see what I could do. I told him that I didn't think it would be a good idea to bring the work to me, but he simply replied saying that it wouldn't break the chain of custody if the man's wife presented the computer to me. She dropped it off.
KGhaleon wrote: I don't know enough about Law or computer forensics to turn the client away, since I never turn clients away without first attempting to help them. I'm going to contact him and see if he would be willing to try one of these other businesses. though hasn't he broken the chain of custody by leaving the machine with me?
KGhaleon wrote: I don't have any real plans to work in Forensics or security. I just run a small business dealing with virus removal, data-recovery, computer repair/network maintenance, etc I can see where people might misunderstand.
jdmurray wrote: I just had a very similar thing happen to me. A friend asked if I could recover erased files from an MP3 recorder. Having a copy of File Scavenger, I was confidant that I could. I plugged the recorded in my computer's USB port and browsers through its file system noting that there were no MP3 files on it (the Erase button had been used to delete it's contents). I ran File Scavenger on it and saw that no files were recovered. I assumed that the recorder's Erase button completely over-writes the file table, making recovery only possible by imaging the disk and locating files using an image editor. Anyway, the surprising part of this to me is after I tell my friend that I can't recover any data from the recorder, he tells me that the recordings are being requested by a law enforcement agency as part of criminal litigation against his former employer, and that a law enforcement officer asked him to retrieve the MP3 files himself. I informed my friend that the officer should have immediately collected the device and sent it off to a forensics lab for a proper data recovery procedure, but he was certain that the agents he was working with didn't want to go to all that trouble. Who do you blame for this situation? The field agents who don't have easy access to the resources for handling digital forensics data? Or the case mangers at the three-letter-agency that is attempting to nail the perp?
damsel_in_tha_net wrote: » wow, i'm dying to know how this ended.
Paul Boz wrote: » Anyone got any good "quick reads" on digital forensics? I'm not really looking for a SANS level review, just something to keep me interested
dynamik wrote: » Dude, I started reading my Hackers Challenge books this weekend, and now I'm totally enthralled. I can't went to get into the IA and IH material
Paul Boz wrote: » Kinda wanted something a bit smaller that I could check out on airplanes
veritas_libertas wrote: » I saw those on Amazon the other day and wondered if they were any good.