Requesting help (information and references)on the 2 questions below.
1) The federal law enforcement agency is preparing for a court appearance. They need assistance in how to explain the forensic process and techniques used to uncover and prove criminal activity. When challenging the admissibility of the digital evidence the defense examiner will evaluate the authentication and chain of custody techniques used. The accused made a blog on the Internet site threatening a false bomb attack. He is on camera seated at the computer, and the video is being examined by investigation experts after someone gave a tip that she saw some of the message on accident. There are also log-ins used at the Library. Identify in a whitepaper the possible authentication and chain of custody techniques used to ensure an acceptable forensics investigative process.
2) In an investigation being conducted by the state crime lab, senior investigators have called DC Investigative to request advice concerning the interception of wire, electronic, or oral communications. The current suspected source of the crime in one of the cases used a library computer to send and receive e-mails. The librarian walked up on the e-mail account while the suspect was away and found incriminating information in an open e-mail, which was reported to law enforcement. Identify the procedures based on the Electronic Communications Privacy Act of 1986 and the Wiretap Act concerning how investigators should approach this case.