Cyber Security Technologies Corporation (CST) is the innovation leader in affordable software products for computer investigations. CST was formed by industry veterans who see the need for new investigative tools designed for the changing investigative environment. We are dedicated to delivering technically advanced but easy-to-use software products for corporations, government agencies, service providers and law enforcement, as well as related training and certification. CST is an affiliate of Architecture Technology Corporation, a technology company specializing in software-intensive solutions for complex problems in IT security and high-security network computing applications. Learn more...
Rather than acquiring additional files, Miller would like to examine the file he has just
acquired. Instead of selecting the "file browser" link on the screen, shown in Figure 19, he selects the "view the acquired file" link below it, which brings him to the Acquired File Display screen, shown in Figure 20.
Figure 20 - Acquired File Display
At the top of the screen the file's full path is displayed. Miller was right to be suspicious. The file appears to contain credit card numbers, expiration dates, and names, as well as the date each credit card number was obtained. Miller now has enough evidence to present to his superiors. However, as a trained investigator, Miller believes that it is unlikely that Wallace is using the stolen credit cards purely for his own gain. Based on past experiences, Miller is suspicious that Wallace may be working with an outside party.