CHAPTER 5
Getting the Goods
After completing this chapter, you should be able to
• Summarize the steps involved in searching and seizing computers, with or without a warrant, under the tenets of the Fourth Amendment and the Privacy Protection Act
• Define consent and voluntary disclosure, and discuss the scope of consent
• Describe drafting the warrant and affidavit, basic strategies for executing computer searches, and explain post-seizure issues
• Describe the Electronic Communications Privacy Act and its effect on electronic surveillance in communications networks, and the differences between content and addressing information
• Describe the role of first responder, the first responder’s toolkit, ...
Get CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.