CHAPTER 5

Getting the Goods

    After completing this chapter, you should be able to

 

        • Summarize the steps involved in searching and seizing computers, with or without a warrant, under the tenets of the Fourth Amendment and the Privacy Protection Act

        • Define consent and voluntary disclosure, and discuss the scope of consent

        • Describe drafting the warrant and affidavit, basic strategies for executing computer searches, and explain post-seizure issues

        • Describe the Electronic Communications Privacy Act and its effect on electronic surveillance in communications networks, and the differences between content and addressing information

        • Describe the role of first responder, the first responder’s toolkit, ...

Get CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.