Chain of Custody is a procedure in the handling of evidence in a series of investigations. According to [1], chain of custody is a procedure for performing documentation to the evidence in chronological events. Meanwhile according to [2], chain of custody is an important part of the investigation process that will ensure evidence can be accepted in the court system. In this case, chain of custody will document the terms related with where, when, why, who, how in the use of evidence at any stage of the investigative process. The issues of chain of custody become very important as authenticity of evidence must be maintained in accordance with the condition when it was first discovered until later presented in the court. The scope of chain of custody includes all individuals involved in the process of acquisition, collection, analysis of evidence, time records as well as contextual information which includes case labeling, and the unit and laboratory that process evidence. In today’s digital society era, the issue of digital chain of custody becomes important considering the number of cybercrime activities that appear. This is one of the consequences of development in information technology and telecommunication infrastructure improvement that make …show more content…
Digital evidence is also very possible to cross countries and legal jurisdictions. For this reason, according to [13], the handling of chain of custody for digital evidence is much more difficult than the handling of physical evidence, in general. In contrast to physical evidence, digital evidence is very dependent on the interpretation of its content. Therefore, the integrity of the evidence and the ability of the expert to interpret the evidence will be influential in sorting digital documents available to serve as evidence
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
Evidence analysis and ranging is the most crucial stage of investigation. The success of the case exposure lies in the gradual evidence research and collecting prior to the laboratory analysis. The CSI systematically makes his way through the crime scene collects all potential evidence, tagging, logging and packaging so it remains intact on its way to the lab. Depending on the task breakdown of the CSI unit he may or may not analyze the evidence in the lab.
In the United States, local, state, and federal law enforcement agencies, including FBI, Department of Homeland Security, among others, have taken on roles to fight computer crimes and terrorism. The roles and responses of these law enforcement agencies concerning digital crime have created challenges that limit enforcement efforts against digital crime.
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Crime scenes are known to have many clues left behind. The obvious would be a the body or bodies, clothing, and sometimes even the murder weapon. While these are great way to solve a case there's another kind of evidence; trace evidence. Trace evidence are small pieces of evidence that are laying around a crime scene. There are many types of trace evidence some of them include metal filings, plastic fragments, gunshot residue, glass fragments, feathers, food stains, building materials, lubricants, fingernail scrapings, pollens and spores, cosmetics, chemicals, paper fibers and sawdust, human and animal hairs, plant and vegetable fibers, blood and other body fluids, asphalt or tar, vegetable fats and oils, dusts and other airborne particles, insulation, textile fibers, soot, soils and mineral grains, and explosive residues. Although these are the most common found elements, they are not the only ones. The Trace Evidence Unit is known to examine the largest variety of evidence types and used the biggest range of analytical methods of any unit. materials are compared with standards or knowns samples to determine whether or not they share any common characteristics. In this paper I will discuss the different kinds of trace evidence and how crime scene investigaros use it to solve cases and convict criminal.
Investigators must ensure the integrity of all evidence collected, analyzed, processed and presented to a courtroom and jury. The reason that this is important is because the improper collection and analysis of evidence can lead to compromised data and potential damage to a prosecution. The seizure and analysis of digital evidence can be particularly challenging but is just as critical to a case as physical evidence. There are specific procedures that must be met to ensure the successful collection and analysis of digital media and guidelines or best practices for collection of all evidence, both physical and digital that must be followed. Conducting the proper steps in an investigation regarding the collection and processing of evidence and the proper chain of custody requirements can ensure a successful outcome in solving a case and a successful prosecution.
The evidence collected from the scene should be properly packaged, labeled and sealed before it is delivered to the laboratory for testing. Proper labeling is essential for laboratory applications as well as for court usage. All the items to be submitted to the laboratory should have the name or the names of the suspects or victims, a brief description of the contents of the package, the location the item was collected, the investigator's name and the date and time the items were collected. It is also imperative to place different items in different packages to avoid cross contamination. The packaging containers should be properly selected according to the items to be packaged. Sealing the outer packages of the evidence helps in maintaining the quality of evidence and ensures that the evidence is not tampered with while being delivered to the laboratory. It is also significant to take into consideration safety issues while packaging the evidence. Where the contents of the packages contain items that are likely to be hazardous it is critical to label such packages appropriately to avoid harm.
Robert Moore’s Cybercrime: Investigating High-Technology Computer Crime is an informative text that supplies the reader with basic understandable knowledge of increasing cybercrimes and strategies that law enforcement are taking in order to catch cyber criminals. Moore’s work has a total of thirteen chapters that are full of information that help the reader better understand the different cybercrime threats such as, hacking, identity theft, child pornography, and financial fraud. Moore also goes into detail on different law enforcement tactics that help catch cyber criminals such as, the seizing of digital evidence, executing search warrants for digital evidence, computer forensics, and cybercriminology. Moore’s main goal is to help the reader grasp a better understanding of cybercrime that faces the world today. Through reading this book, I can validly say that Moore’s thorough work, perspectives, and examples helped me better understand high-technology computer crime and investigative strategies as well.
In order to understand how to compile evidence for criminal cases, we must understand the most effective types of evidence. This topic is interesting because there are ample amounts of cases where defendants have gotten off because of the lack of forensic evidence. If we believe forensic evidence is so important and it affects our decisions, then maybe we need to be educated on the reality of forensic evidence. If we can be educated, then we may have a more successful justice system. If we have a more successful justice system than the public could gain more confidence that justice will be served. In order to do this, we must find what type of evidence is most effective, this can be done by examining different types of evidence.
Forensic evidence can provide just outcomes in criminal matters. However, it is not yet an exact science as it can be flawed. It can be misrepresented through the reliability of the evidence, through nonstandard guidelines, and through public perception. Forensic science can be dangerously faulty without focus on the ‘science’ aspect. It can at times be just matching patterns based on an individual’s interpretations. This can lead to a miscarriage of justice and forever alter a person’s life due to a perceived “grey area” (Merritt C, 2010) resulting in a loss of confidence in the reliability of forensic evidence.
In todays fast pace world of technology many of us leave ourselves vulnerable to become victims of a cybercrime. With people using the internet to do everything from paying bills, personal banking, and on-line shopping their financial and personal information is available at the stroke of a key to a hacker. Often someone is unaware that they have been attacked and had their information stolen. The use of the internet has grown exorbitantly throughout the world. Nelson Online reported that as of December 31, 2014, there were 360,985,492 users of the internet throughout the world. (2015) With so many users in so many countries accessing the internet, prosecuting cybercrimes is nearly impossible.
A forensic interview is a structured conversation with a child or minor with the intention of eliciting detailed information about a possible event (s) that the child many have experienced or witnessed. Concurrently, for Van Heerden (1977: 8) forensics refer to the computerized activities or scientific knowledge employed by law enforcement agents to serve justice. In the study, forensic investigation is used to refer to any computer-related activities or methods used by police, investigators, prosecutors and all other law enforcement agents to gather facts, track down criminals, arrest or detain them, gather information, preserve information and finally present it in the court of law.
The transitional growth in the forensic science sector has not been without challenges. Though the world has experienced increased capabilities and scientific knowledge, which has led to faster investigations and results, many forensic experts have argued that forensic laboratory testing, in the light of 21st century technological advancements, is yet to meet the expected rate in quick available testing and analysis (Mennell & Shaw, 2006). This is with respect to the growing rate of crime and the high demand of quick crime scene testing and analysis. In the science of crime scene, analysis and interpretation of evidence is majorly dependent on forensic science, highlighting the change in the role of forensic sciences (Tjin-A-Tsoi, 2013). In the business of forensic science, time is beginning to play important role in the evidence testing and analysis which is becoming crucial in reducing ...
Forensic science has now been recognized as an important part of the law enforcement team to help solve crimes and cold cases. The advances in technology are being used each day and we must continue to strive to develop better advances in this field. The recent discovery of using DNA in criminal cases has helped not only positively identify the suspect, but it has helped exonerate hundreds of innocent individuals. “With new advances in police technology and computer science, crime scene investigation and forensic science will only become more precise as we head into the future.” (Roufa, 2017) Forensic science and evidence helps law enforcement officials solve crimes through the collection, preservation and analysis of evidence. By having a mobile crime laboratory, the scene gets processed quicker and more efficiently. Forensic science will only grow in the future to be a benefit for the criminal justice
There are different groups, from law enforcement agencies to the U.S. Secret Service, that are attempting to combat the problem through cooperation and preemptive efforts. If these groups combined with the public to protect themselves and the country from criminals that commit cybercrime, the nation’s network and technology servers would be much safer for technology users. Clearly, cybercrime is a problem because it puts internet users at risk of being taken advantage of or harmed. The advantages of technology and the internet have led more criminals to use cyberspace to commit crimes. The threat of cybercrime is increasing as globalization continues to spread across the world.