The O'Reilley book Computer Crime is nice. They actually have a table for the rules of evidence. Nice! I just did a check for "computer crime" on Amazon and got a bunch of likely hits... V/R Jim "Chris St. Clair" wrote: > > Any pointers to recommended reading regarding state or federal > laws that stipulate how evidence must be handled to hold water > in court? > > Thanks. > > -chris > > >You still have to be able to attest to the integrity of the >information > >collected.. other requirements would be proper timestamping, hashing, > >encryption of the data. Otherwise, you'd better have a hidden camera > >with the correct date/time on display pointed at the suspect's >keyboard > >and face that you can correlate with the keylogger or sniffer output > >or whatever.. Corroborating physical evidence is the key when doing > >covert investigations.. > > _________________________________________________________________ > Get your FREE download of MSN Explorer at http://explorer.msn.com > > ----------------------------------------------------------------- > > This list is provided by the SecurityFocus ARIS analyzer service. > For more information on this free incident handling, management > and tracking system please see: > > http://aris.securityfocus.com -- James W. Meritt, CISSP, CISA Booz, Allen & Hamilton phone: (410) 684-6566 ----------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Sat Jun 30 2001 - 09:36:54 PDT