People asked for this stuff so here are a few that I have found..Both are very interesting.
David Westerfield case; Computer forensic examination
US V. Zacarias Moussaoui; CART analysis of Laptop
From the Moussaoui case...looky here...dd!
The FBI uses three different methods to duplicate or image a hard drive:
(1) GNU/Linux routine dd command via Red Hat Linux 7.1 (hereafter Linux dd );
The second case study makes for a good read. The first one though.. I kinda lost it after the first 3 pages.. but then, I never was too good at sustained reading of the minutes of a court session..
Thanx for the links.
The first one doesn't get good until you get further in to it. the beginning is a bunch of babbling..he gets in to the computer investigation piece later.