Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Digital evidence
Digital evidence
Issues relating to capturing and preserving digital evidence
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Digital evidence
This report is to give a brief, but an informative report of the chapters in the book Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. The chapters that will be focused on are chapter one which talks about different types of potential evidence that can be found in devices that store information. The next chapter that will be looked at is chapter three which details how and what to do when securing and evaluating evidence. Following this the chapter with will be looked at is chapter four which is focused on documenting the electronic crime scene and how it should be done to cover all bases. Finally, the final chapter that will be looked at is chapter five which looks at evidence collection and how to do it …show more content…
The chapter begins with talking about computer systems and its different types such as PCs, Macs, and laptops and that they have the potential of having valuable information for an investigation this can include photos, emails, financial records, event logs, and other information that will be useful for an investigation. After this, the chapter continues to talks about different kind of storage devices such as hard drives which can be found inside a computer, external hard drives which are found outside a computer, and this also includes removable media such as different kinds of disks, thumb drives, and memory cards. Like computer systems, these storage devices have great potencies in providing valuable information for an investigation. Following this, the chapter talks about handheld devices and it potentiation for providing important information such as contact information, GPS data, and internet and chat information that will be useful for an investigation. The chapter after this then talks about peripheral …show more content…
In this chapter, it begins by warning that if an encrypted device is shut off improperly the data will become unacceptable. After this warning the chapter talks about a variety of situations to see if the computer is on, the two main points that come from this section are to document any activity done on the computer or any devices and to check the power state of the computer to make sure when it is moved it is not on. Later the chapter gives instructions on what to do when the computer is turned off these include steps like photographing and documents all wires, cables, and devices connected to the computer. As well as this the steps that must be followed are to label everything that is relevant to the investigation and photograph it as well. After this doesn't the steps are to carefully disconnect and secure anything that is needed for their invitation and to record any important information such as make, model, serial numbers. Then finally to record and log all the evidence that is being taken and follow procedures to make sure everything is done by the book. Following this, the chapter talks about if a laptop is involved these steps are pretty much identical to the previous steps. The chapter continues to state that if the computer is found
From a trial strategy point of view, you always start with the piece(s) of evidence you believe are most damaging to the client's case and work backwards looking for an exploitable flaw in the search and seizure procedure that would make that or those item(s) inadmissible. The further back in the series of events you can argue a fatal flaw, the more likely that the evidence and any additional materials which flowed from that particular item of evidence will be excluded. This is the practical analysis of all the times we see or hear of law enforcement arguing that there was some technical item which drew their attention and suspicion and justifies their hunch that criminal activity is afoot.
Evidence analysis and ranging is the most crucial stage of investigation. The success of the case exposure lies in the gradual evidence research and collecting prior to the laboratory analysis. The CSI systematically makes his way through the crime scene collects all potential evidence, tagging, logging and packaging so it remains intact on its way to the lab. Depending on the task breakdown of the CSI unit he may or may not analyze the evidence in the lab.
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
The crime scene was then examined and a list of possible pieces of evidence were recorded down. Including a sketch of the crime scene, Anna Garcia’s house, with the locations of all of the pieces of evidence. All of these items listed help develop a theory about Anna’s death. This theory then helped establish a list of possible suspects. The person of interest list included a number of four individuals and each one had a relation with Anna. The list included (1) Alex Garcia- Anna’s ex-husband. They had an unpleasant divorce the year before and in a result Alex quickly remarried a much younger woman, while Anna remained single. Alex and his newlywed wife are expecting to have a baby soon. Although, Alex may be suffering from a few financial
Lyman, D. Michael; Criminal Investigation, The Art and Science; 3rd edition, 2002 Prentice Hall. Pgs. 188-200.
Dutelle, Aric W. An Introduction to Crime Scene Investigation. Sudbury, MA: Jones and Bartlett, 2011. Print.
Collecting evidence from a crime scene is a crucial aspect of solving crimes. Before evidence can be seized, there must first be a court order approving the search of the crime scene and the seizure of the evidence found at the scene. Standard protocol for officers is for them to always use latex gloves, avoid plastic bags, double wrap small objects, package each object separately, and to collect as much evidence as possible. It is better to have too much evidence than to not have enough. There are countless amounts of evidence that can be found at a crime scene.
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
In most crimes committed today criminals’ leave behind digital evidence that can be recovered by digital forensic experts and digital forensic tools.
Crime Scene Investigation For my assignment, I will be looking into the case of James Bulger, aged 2 years old, who was kidnapped and murdered by John Venables and Robert Thompson on February 12th 1993. Through evidence found at the crime scene and testimonial statements, the police saw that the two boys, ages 11, abducted James from Bootle Strand Shopping Center, Liverpool. They took him on a long, aimless walk where they brutally attacked him and left him for dead. In my assignment I will show how work done by the police, forensic scientists and Investigators helped to convict Jon and Robert.
Live acquisition: The future of data acquisitions is shifting toward live acquisitions because of the use of disk encryption with newer operating systems (OSs). In addition to encryption concerns, collecting any data that’s active in a suspect’s computer RAM is becoming more important to digital investigations. The processes and data integrity requirements for static and live acquisitions are the same. The only shortcoming with live acquisitions is not being able to perform repeatable processes, which are critical for collecting digital evidence.
Information about any item, related to the criminal, found at the crime scene (weapons, proofs, if any)
Gaensslen, R. E., Harris, H A., & Lee, H. (2008). Introduction to Forensic Science and Criminalistics. New York, NY: The McGraw-Hill Companies, Inc. .
Song, Sora. (2002, October). Body of evidence: all the high-tech gadgets and tests won't matter a bit if evidence isn't meticulously gathered at the scene of a crime. Time, 160(17), 28-29. Retrieved January 21, 2011, from ABI/INFORM Global. (Document ID: 633215341).
Since the old times primary investigations do not typically yield enough information to prosecute a criminal case. The information yielded in criminal investigations may be used to prosecute a criminal case or can even assist in a federal case. Even though primary investigations can identify a lot of evidence and information, a secondary investigation will usually identify further details and allows for a second look at everything pertaining to the investigation. This paper is to explain criminal investigations and the necessary tools and skills needed to conduct and thorough investigation.