Computer Forensics: Pre-Search Activities

834 Words2 Pages

Pre-search Activities jasmine Perkins Computer Forensics January 25,2015 To start the report off a meeting with the lead detective of the case as well the forensics team to figure everything out and set the take down of these trafficers. In oder for us to get a search warrant for the evidence that we will need we first have to A search is requested in relation to an offense substantially described as follows: A confidential informant has provided your department with detailed information related to a human trafficking operation. The informant has identified and confirmed that the operation is involved in smuggling teenage girls and boys out of the U.S. and force them into prostitution. …show more content…

TITLE (IF ANY)Human Trafficing ........................................................................................................................... ADDRESS .................................................................................................................... Once we obtained the search warrant we need to come up with a plan for once we obtain the computer for which the evidence is being stored. The key to effective data searches is to prepare and plan carefully. Poor preparation in the early stages of an investigation can lead to failures in prosecution because information can be ignored, destroyed, or compromised. Take time to understand and carefully plan what is critical to the investigation or case. The following tasks need to be performed to maximize search results. ■ Interview members of the IT staff to learn how and where data has been stored, if applicable. ■ Confirm or define the objective of the investigation. ■ Identify relevant time periods and the scope of the data to be searched. ■ Identify the relevant types of …show more content…

Is it active data? well theres a chance that we are on to them by now, so they probably deleted the files that we need. If not better believe that everything we has been Hidden, Encrypted, and Password-Protected Files by now. We also need to look at the emails and maybe instant messages that may been sent back and forth between the group members. That has probably been deleted as well, remember guys we need to look for the background information to these emails. find a trial of supicious emails that might leads us to what we need. Now lets think about the removeble data that we probably will need to get. We should document all aspects of any forensic investigation, including taking pictures of the subject computer and its surrounding environment. A good rule of thumb is to document everything within reach of the person using that computer. This includes all peripherals, books, and removable media within a 20-foot radius. Investigators can deduce many things by simply looking around a suspect’s work area. If you notice a ZIP drive on the system, then by deduction you should also look for any ZIP disks. The following checklist is useful for handling removable

Open Document