Encountering Encrypted Evidence (potential)
暂无分享,去创建一个
Investigative activities involving computer related cases occasionally encounter files that have been encrypted. Encryption is a valid and legal process that enables anyone to protect the privacy of his or her data and/or communications. If the suspect is cooperative and provides not only the key but also the specific encryption software, investigation is simple. However, without that cooperation, analysis of potential evidence may not be practical or possible. This paper discusses alternatives where the suspect is not cooperative and keys are not provided. The outcome of the investigation may as well depend on what resources are available to the investigator.
[1] Peter Stephenson,et al. Investigating Computer-Related Crime , 1999 .
[2] Franklin Clark,et al. Investigating Computer Crime , 1996 .
[3] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[4] Kevin Mandia,et al. Incident Response: Investigating Computer Crime , 2001 .