Chain of custody
Code analysis
Computer forensics
Digital evidence
Forensic duplicate image
Fruit of the poisonous tree doctrine
Hearsay
Locard’s exchange principle
Media analysis
Network analysis
Network banner
Objection
Pen register devices
Persistent data
Probative evidence
Trap and trace devices
Volatile data