Provide 2 pages identifying the following:
2 recommended examples of authentication acceptable in the investigative process of identity theft
2 recommended examples of chain of custody techniques of digital evidence
Provide 2 pages explaining the following:
What is considered legal or illegal under the guidelines of the First and Fourth Amendments in relation to the identity theft investigation