Computer Forensics 101 (8/2010)
Access to these recorded training sessions and any accompanying materials is restricted to employees of federal public and community defender organizations; CJA panel attorneys who accept court appointments to federal criminal cases; and investigators, paralegals and other defense team members who work on CJA panel cases.
This presentation provides attendees with the basic information that they need to understand the terminology, concepts, and technology of computer forensics. Among the topics covered: why computer forensics is possible (hint: the delete key is a myth); how to read a law enforcement forensics report; deposing and cross examining a computer forensics expert; when to hire an independent computer forensics examiner in criminal or civil cases; and, trends in computer forensics court decisions. 

These presentations were recorded October 13-14, 2011, during the Criminal Justice Act Panel Training for the Southern Federal Defender Program in Mobile, Alabama. The seminar is the yearly training program offered by the defender office for the local CJA panel. It addressed a number of criminal legal topics of both local and national interest.

The following presentations were recorded and are available for viewing:
  • Motions In Limine: New Areas of Attack When At the Threshold
  • Computer Forensics 101
  • Peer-to-Peer Crimes and Investigations: An Overview
  • 3553(a): Two Stories, One Goal
  • Defending Those Who Defend Us - Considerations When Defending Veterans
  • Defending Against Sentencing Enhancements in Immigration Case
  • Sentencing: Deconstructing Drug Guidelines
Seminar Information
Seminar Date:
October 13, 2011
Computer Forensics 101
Speaker Information
Frederick Lane Esq.   [ view bio ]
Individual topic purchase: Selected
Defender Services Office Training Division
Minutes: 81.00
Preview Computer Forensics 101Preview Computer Forensics 101
This Seminar is presented free of charge.