![]() ![]() This article should always be followed to avoid any alteration of the evidence collected.Įxplain to the client the Helpline’s approach, limitations, and scope regarding this kind of cases. Read Article #252: Forensic Handling of Data before proceeding with any action related to this kind of cases. Probably, you will need to reach out to a company specialized in forensics who has experience with the laws of the specific country.Ĭase 2: Malware analysis or other scenarios: Clarify the primary goal of the analysis before proceeding with further actions: does the client only want to verify the file information? Do they want to know if the video or images could have been manipulated or modified? Do they suspect that the file is infected? ![]() Videos or images have been delivered to the Helpline with a request to get information about these files to use them as digital evidence or identify malware.īesides the problems highlighted in Article #252: Forensic Handling of Data, we must also consider the Helpline’s limitations and scope regarding these cases, and that we might not qualify as expert witnesses despite the findings obtained from the analysis.Ĭase 1: Acquire and preserve evidence to present in a court: please check with the Helpline management to decide how to proceed with this kind of cases. Edit me Forensic Analysis of Videos and Images How to handle and analyze a video or image to use it as digital evidence Problem ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |