>> My name is Nick Lebucks.
I'm a retired police officer.
I'm originally from San Jose California.
I now live in Friedberg Virginia.
I'm mainly concentrating in digital forensics.
That's what I studied here [inaudible] was
computer security and computer forensics.
So I do government contracting, government
consulting, and information security
and the retrieval of data for
litigation and evidence support.
Well forensics is a broad body that applies to
computers as well as anthropology, medicine,
you name it, there's a forensic
field for everything.
Forensics just means that something
will hold up in the court of law.
So for computers it says this evidence is
electronic and digital usually was obtained
by the standards of the court in a
pure [inaudible] way and can be used
for criminal and civil litigation.
I would say most of the job its
either collection of evidence, I log,
there's a lot of logging lots of evidence that
comes in and then once I log things I process,
I process usually computer or some
kind of hard drive for examination
and second [inaudible] is
creating, drafting report.
So I do this entire examination and then
I go ahead and make a long police report
or crime report of what I did and I said I
opened the computer, I examined the computer,
I plugged this cable into this cable, I
opened up this software program and I examined
for all these types of files and the
third thing is testimony in court.
A busy day would be a full investigation
or multiple investigations of evidence,
typing in multiple reports for court later,
and then having to go to court to testify based
on previous examinations would
be the three part busy day.
I mean there's two types of cases usually.
There's either cases where people aren't
trying to hide their tracks and they're cases
where people are trying to
hide their tracks and usually
with child porn investigations these people
know what they're doing, they know it's illegal,
they know that they can go to prison
for a long time if they're caught,
and there's a lot of information to
these suspects as to hide their tracks,
how to hide files, how to make it look
like evidence doesn't exist and have
to make my job really difficult
to find that evidence.