3072 views|0 replies

606

Posts

0

Resources
The OP
 

Electronic evidence can be used to protect rights, and email chat records can be used as evidence in disputes [Copy link]

This post was last edited by jameswangsynnex on 2015-3-3 19:59

A young computer engineer, greedy for deciphering the data of mobile phone recharge cards, "produced" more than 7,000 recharge cards and sold them online, making a profit of more than 740,000 yuan. After investigation, a computer forensic appraisal agency recently found important electronic evidence left by the engineer during the computer operation, which basically restored the truth of the whole incident. Electronic evidence has also become an important basis for judging the case. Industry insiders said that with the increasing popularity of computer applications, electronic evidence has become an effective weapon for resolving many disputes. Citizens should pay attention to retaining key information.

Nowadays, citizens can hardly leave their computers, and many business transactions are also conducted through the Internet. Therefore, once a dispute occurs, electronic evidence can play a key role in resolving the conflict. According to current regulations, all kinds of information such as e-mails, QQ chat records, software, and electronic documents can become electronic evidence, but the prerequisite is that they must first be identified by a designated agency.

Wu Enping, deputy director of the technical department of the Municipal Computer Virus Prevention Service Center, reminded citizens that in daily life, if they encounter malicious online attacks by hackers, they can immediately notify professional computer forensic identification agencies and ask technicians to collect evidence on the spot. If hackers continue to harm others after gaining control of a computer, professional departments will reverse the search based on clues and set up a formation to "capture" the operator.

If citizens do not deliberately save relevant information, they do not need to worry too much. Professionals can restore relevant operations or data under certain conditions, and solidify, search, extract, and analyze evidence on computer hard drives, floppy disks, as well as data in network environments such as web pages, BBS, and blogs to ensure that the evidence is properly preserved.

In addition, based on analysis of previous cases, mobile phone text messages can also serve as evidence of loans, and QQ chat records can also be used as a basis to prove some infringements or even criminal acts.

Methods of Collecting Electronic Evidence

●Observe the status of the host and display (switch standby).

●Record the operations performed, take photos if necessary, or record them by video.

●Determine the host's external data channel, such as network cable, broadband access cable, etc.

●Take out the floppy disks and CDs and pack them separately.

●Normal shutdown may cause the swap files on the disk to be deleted or even trigger other mechanisms. It is recommended to cut off the power directly.

●Disconnect all original external data cables, restart the computer, and analyze and extract relevant information.

●There should be at least two people at the scene as witnesses. It is best if one person operates and the other records. Sensitive scenes should be videotaped during the investigation.

This post is from Mobile and portable
 
 

Just looking around
Find a datasheet?

EEWorld Datasheet Technical Support

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews

Room 1530, Zhongguancun MOOC Times Building, Block B, 18 Zhongguancun Street, Haidian District, Beijing 100190, China Tel:(010)82350740 Postcode:100190

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
快速回复 返回顶部 Return list