<<< Computer intrusion example | Index | The Investigative Process >>> |
The examiner can explain that
the files located in a particular directory on suspect's computer
have date-time stamps that coincide with the time periods when the defendant was connected to the Internet.
The court will decide whether to
accept the above evidence as a satisfiable explanation of the fact that
the files were indeed downloaded from the Internet.
<<< Computer intrusion example | Index | The Investigative Process >>> |