O'Reilly logo

Hiding Behind the Keyboard by John Bair, Brett Shavers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

Closing Thoughts

Abstract

Privacy should concern every investigator since privacy is protected by local, state, and federal laws. Technology is also a concern, since the content of some communications are practically inaccessible if secure methods have been used. Both privacy and secure communications issues do not mean that investigations are hamstrung by over restricted rules or unbreakable technology. It only means that investigators must rely on their training, instincts, and flexibility to uncover that which can be uncovered, decipher that which can be deciphered, and accept that some things may be left undone due to technical impossibilities or legal restrictions.

Keywords

Arrests; Cell phone; Electronic intercepts; Encryption; Intuition; ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required