Computer Forensics 101 (8/2010)
This presentation provides attendees with the basic information that they need to understand the terminology, concepts, and technology of computer forensics. Among the topics covered: why computer forensics is possible (hint: the delete key is a myth); how to read a law enforcement forensics report; deposing and cross examining a computer forensics expert; when to hire an independent computer forensics examiner in criminal or civil cases; and, trends in computer forensics court decisions.
These presentations were recorded October 13-14, 2011, during the Criminal Justice Act Panel Training for the Southern Federal Defender Program in Mobile, Alabama. The seminar is the yearly training program offered by the defender office for the local CJA panel. It addressed a number of criminal legal topics of both local and national interest.
The following presentations were recorded and are available for viewing:
These presentations were recorded October 13-14, 2011, during the Criminal Justice Act Panel Training for the Southern Federal Defender Program in Mobile, Alabama. The seminar is the yearly training program offered by the defender office for the local CJA panel. It addressed a number of criminal legal topics of both local and national interest.
The following presentations were recorded and are available for viewing:
-
Motions In Limine: New Areas of Attack When At the Threshold
- Computer Forensics 101
- Peer-to-Peer Crimes and Investigations: An Overview
- 3553(a): Two Stories, One Goal
- Defending Those Who Defend Us - Considerations When Defending Veterans
- Defending Against Sentencing Enhancements in Immigration Case
- Sentencing: Deconstructing Drug Guidelines
Seminar Date:
October 13, 2011
Minutes: 81.00


On-Demand
This Seminar is presented free of charge.