DEVCE CIC<p>Time for a break from asking you fill in our little survey about reliability of computer evidence ( <a href="https://forms.gle/ZiXtaE8LoCAY4Vbo6" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">forms.gle/ZiXtaE8LoCAY4Vbo6</span><span class="invisible"></span></a> ).</p><p>We've been commissioned to do some work on "judicial malware" - the deployment of something that looks like malware in order to retrieve evidence. What are the questions we should be asking? (and what are your answers?)</p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DigitalEvidence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalEvidence</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/Law" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Law</span></a> <a href="https://infosec.exchange/tags/Evidence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Evidence</span></a> <a href="https://infosec.exchange/tags/JudicialMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JudicialMalware</span></a> <a href="https://infosec.exchange/tags/Academia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Academia</span></a></p>