In preparation for a court appearance, the federal law enforcement agency wants to
ensure proper forensic processes and techniques are used in a computer crime case
involving identify theft.
When challenging the admissibility of the digital evidence, the defense examiner will
evaluate the authentication and chain of custody techniques used. The federal law
enforcement agency would like your company, AB Investigative Services (ABIS), to identify
in a report the possible authentication and chain of custody techniques acceptable in the
investigative process, including issues relating to First and Fourth Amendment privacy