SlideShare a Scribd company logo
5/4/2018 Computer Forensics Basics | HowStuffWorks
https://computer.howstuffworks.com/computer-forensic1.htm 1/4
How Computer Forensics Works
BY JONATHAN STRICKLAND
 
Computer Forensics Basics
What's brewing in this lab?
Computer forensics.
©ISTOCKPHOTO/JAMES STEIDL
The field of computer forensics is relatively young. In the early days of computing, courts considered evidence from
computers to be no different from any other kind of evidence. As computers became more advanced and
sophisticated, opinion shifted -- the courts learned that computer evidence was easy to corrupt, destroy or change.
Investigators realized that there was a need to develop specific tools and processes to search computers for
evidence without affecting the information itself. Detectives partnered with computer scientists to discuss the
appropriate procedures and tools they'd need to use to retrieve evidence from a computer. Gradually, they
developed the procedures that now make up the field of computer forensics.
Usually, detectives have to secure a warrant to search a suspect's computer for evidence. The warrant must include
where detectives can search and what sort of evidence they can look for. In other words, a detective can't just serve
a warrant and look wherever he or she likes for anything suspicious. In addition, the warrant's terms can't be too
general. Most judges require detectives to be as specific as possible when requesting a warrant.
Carbon Black Endpoint Security -
From the Experts at CDW
Complete Endpoint Protection from
Modern-Day Cyber Attacks. Watch Our Video …
cdw.com
Learn more
Ad
Tech 
 PREV NEXT 
5/4/2018 Computer Forensics Basics | HowStuffWorks
https://computer.howstuffworks.com/computer-forensic1.htm 2/4
Citation & Date | Reprint
For this reason, it's important for detectives to research the suspect as much as possible before requesting a
warrant. Consider this example: A detective secures a warrant to search a suspect's laptop computer. The detective
arrives at the suspect's home and serves the warrant. While at the suspect's home, the detective sees a desktop PC.
The detective can't legally search the PC because it wasn't included in the original warrant.
Every computer investigation is somewhat unique. Some investigations might only require a week to complete, but
others could take months. Here are some factors that can impact the length of an investigation:
The expertise of the detectives
The number of computers being searched
The amount of storage detectives must sort through (hard drives, CDs, DVDs and thumb drives)
Whether the suspect attempted to hide or delete information
The presence of encrypted files or files that are protected by passwords
What are the steps in collecting evidence from a computer? Keep reading to find out.
IN PLAIN VIEW
The plain view doctrine gives detectives the authority to gather any evidence that is in the
open while conducting a search. If the detective in our example saw evidence of a crime on
the screen of the suspect's desktop PC, then the detective could use that as evidence
against the suspect and search the PC even though it wasn't covered in the original warrant.
If the PC wasn't turned on, then the detective would have no authority to search it and would
have to leave it alone.
 1 … 6 7 
 
MORE TO EXPLORE
by TaboolaSponsored Links
EverQuote Insurance Quotes
Tophatter
Mortgage Quotes | Fetcharate
Phoenix, Arizona: This Unbelievable, Tiny Company Is Disrupting a $200 Billion Industry
It’s Like eBay, But Everything Sells in 90 Seconds.
Arizona: Gov't May Pay Off Your Mortgage If You Have No Missed Payments
Mama Bear Pleads To Man To Save Her Drowning Cubs
2
 PREV NEXT 
5/4/2018 Computer Forensics Basics | HowStuffWorks
https://computer.howstuffworks.com/computer-forensic1.htm 3/4
KiwiReport
Home Chef
Gundry MD
Play this for 1 minute and see why everyone is addicted
Throne: Free Online Game
New Bathroom Trend? Walk In Tubs, and The Prices Might Surprise You
Walk In Tub Search | Sponsored Links
Phoenix: This Meal Service is Cheaper Than Your Local Store
U.S. Cardiologist: I Urge Americans To Quit 3 Foods
RELATED CONTENT
Can you hack a drone?
2016 Broke the Record for Stolen Data
'Security Selfies' May Make Passwords Obsolete
 PREV NEXT 
5/4/2018 Computer Forensics Basics | HowStuffWorks
https://computer.howstuffworks.com/computer-forensic1.htm 4/4
Advertise With Us
About • Podcasts • Privacy • Ad Choices • Terms
Store • Careers • Contact Us • Help • Reprints
Copyright © 2018 HowStuffWorks,
a division of InfoSpace Holdings LLC,
a System1 Company
Newsletter
Get the best of HowStuffWorks by email. Keep up to date on:
Latest Buzz ǀ Stuff Shows & Podcasts ǀ Tours ǀ Weird & Wacky
Sign Up Now!
Enter email >
 PREV NEXT 

More Related Content

Similar to Computer forensics basics

computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
DaniyaHuzaifa
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
BoyarMiller
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
gitagrimston
 
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
William782Delaney
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
BoyarMiller
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
ShanaAneevan
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
satyabwati
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
forensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
Tiago Henriques
 
DOJ
DOJDOJ
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
John Intindolo
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
Teja Bheemanapally
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
Felipe Prado
 
The Investigative Lab - White Paper
The Investigative Lab - White PaperThe Investigative Lab - White Paper
The Investigative Lab - White Paper
Nuix
 

Similar to Computer forensics basics (20)

computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
 
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
DOJ
DOJDOJ
DOJ
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
The Investigative Lab - White Paper
The Investigative Lab - White PaperThe Investigative Lab - White Paper
The Investigative Lab - White Paper
 

Recently uploaded

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 

Recently uploaded (20)

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 

Computer forensics basics

  • 1. 5/4/2018 Computer Forensics Basics | HowStuffWorks https://computer.howstuffworks.com/computer-forensic1.htm 1/4 How Computer Forensics Works BY JONATHAN STRICKLAND   Computer Forensics Basics What's brewing in this lab? Computer forensics. ©ISTOCKPHOTO/JAMES STEIDL The field of computer forensics is relatively young. In the early days of computing, courts considered evidence from computers to be no different from any other kind of evidence. As computers became more advanced and sophisticated, opinion shifted -- the courts learned that computer evidence was easy to corrupt, destroy or change. Investigators realized that there was a need to develop specific tools and processes to search computers for evidence without affecting the information itself. Detectives partnered with computer scientists to discuss the appropriate procedures and tools they'd need to use to retrieve evidence from a computer. Gradually, they developed the procedures that now make up the field of computer forensics. Usually, detectives have to secure a warrant to search a suspect's computer for evidence. The warrant must include where detectives can search and what sort of evidence they can look for. In other words, a detective can't just serve a warrant and look wherever he or she likes for anything suspicious. In addition, the warrant's terms can't be too general. Most judges require detectives to be as specific as possible when requesting a warrant. Carbon Black Endpoint Security - From the Experts at CDW Complete Endpoint Protection from Modern-Day Cyber Attacks. Watch Our Video … cdw.com Learn more Ad Tech   PREV NEXT 
  • 2. 5/4/2018 Computer Forensics Basics | HowStuffWorks https://computer.howstuffworks.com/computer-forensic1.htm 2/4 Citation & Date | Reprint For this reason, it's important for detectives to research the suspect as much as possible before requesting a warrant. Consider this example: A detective secures a warrant to search a suspect's laptop computer. The detective arrives at the suspect's home and serves the warrant. While at the suspect's home, the detective sees a desktop PC. The detective can't legally search the PC because it wasn't included in the original warrant. Every computer investigation is somewhat unique. Some investigations might only require a week to complete, but others could take months. Here are some factors that can impact the length of an investigation: The expertise of the detectives The number of computers being searched The amount of storage detectives must sort through (hard drives, CDs, DVDs and thumb drives) Whether the suspect attempted to hide or delete information The presence of encrypted files or files that are protected by passwords What are the steps in collecting evidence from a computer? Keep reading to find out. IN PLAIN VIEW The plain view doctrine gives detectives the authority to gather any evidence that is in the open while conducting a search. If the detective in our example saw evidence of a crime on the screen of the suspect's desktop PC, then the detective could use that as evidence against the suspect and search the PC even though it wasn't covered in the original warrant. If the PC wasn't turned on, then the detective would have no authority to search it and would have to leave it alone.  1 … 6 7    MORE TO EXPLORE by TaboolaSponsored Links EverQuote Insurance Quotes Tophatter Mortgage Quotes | Fetcharate Phoenix, Arizona: This Unbelievable, Tiny Company Is Disrupting a $200 Billion Industry It’s Like eBay, But Everything Sells in 90 Seconds. Arizona: Gov't May Pay Off Your Mortgage If You Have No Missed Payments Mama Bear Pleads To Man To Save Her Drowning Cubs 2  PREV NEXT 
  • 3. 5/4/2018 Computer Forensics Basics | HowStuffWorks https://computer.howstuffworks.com/computer-forensic1.htm 3/4 KiwiReport Home Chef Gundry MD Play this for 1 minute and see why everyone is addicted Throne: Free Online Game New Bathroom Trend? Walk In Tubs, and The Prices Might Surprise You Walk In Tub Search | Sponsored Links Phoenix: This Meal Service is Cheaper Than Your Local Store U.S. Cardiologist: I Urge Americans To Quit 3 Foods RELATED CONTENT Can you hack a drone? 2016 Broke the Record for Stolen Data 'Security Selfies' May Make Passwords Obsolete  PREV NEXT 
  • 4. 5/4/2018 Computer Forensics Basics | HowStuffWorks https://computer.howstuffworks.com/computer-forensic1.htm 4/4 Advertise With Us About • Podcasts • Privacy • Ad Choices • Terms Store • Careers • Contact Us • Help • Reprints Copyright © 2018 HowStuffWorks, a division of InfoSpace Holdings LLC, a System1 Company Newsletter Get the best of HowStuffWorks by email. Keep up to date on: Latest Buzz ǀ Stuff Shows & Podcasts ǀ Tours ǀ Weird & Wacky Sign Up Now! Enter email >  PREV NEXT 