40 likes | 137 Views
Chapter 17. Figure 17.1 Links between victim and suspect established using an SMS message and the location of the mobile telephone at given times.
E N D
Figure 17.1 Links between victim and suspect established using an SMS message and the location of the mobile telephone at given times.
Figure 17.2 A folder named “tk” contained important evidence. The tk folder is visible using a newer version of a digital evidence examination tool (left) but not an older version containing a bug (right).
Figure 17.3 Windows Security Event log from May 2005 contains entries with January date stamps, indicating that the clock was backdated.