The Collection of Digital Evidence

761 Words2 Pages

1. Describe at least 5 steps in a process to collect digital evidence to the time you testify that you consider important. Please explain why they are important. For this particular example we will assume that the warrant for search and seizure was requested and executed lawfully and did not violate any part of the Fourth Amendment. 1. First and Foremost… Having the right person to do the job. Computer forensic investigators have the tough job of finding a “binary” smoking gun. In order to do this, the investigator must be trained, qualified and have an “eye” for things that others may not see. The investigator must take into consideration that each computer examination is unique (Solomon 2011). Understanding the hardware, its operating system and other peripheral or network devices make this job that more difficult. 2. Methodical Search A structured standardized approach to any evidence collection is going to be the best course of action. Any well-training computer forensic technicians should not jump into a search without some kind approved policy procedure which will include a checklist or standard operating procedure that will methodically guide them throughout the examination procedure. The cyber forensics should not be taken lightly and it starts with its collection methods. 3. Evidence Gathering and Identification Going into a crime scene with a plan in place makes it is easier to sort through what pieces of evidence could be relevant to the offense. The purpose of the evidence should be to build a case based on its content and what role that evidence played in the case. Regardless of hardware or software evidence being examined the investigator should take into consideration all possible outcomes if any steps of search... ... middle of paper ... ...ion Criminal Division. Retrieved from http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf Solomon, M. (2011). Computer Forensics Jumpstart. Indianapolis, Ind.: Wiley. United States Department of Justice, National Institute of Justice. (Nov 5, 2010) Digital Evidence Analysis Tools. Retrieved from: http://nij.gov/topics/forensics/evidence/digital/analysis/Pages/welcome.aspx References: Department of Justice. Prosecuting Computer Crimes Computer Crime and Intellectual Property Section Criminal Division. Retrieved from http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf Solomon, M. (2011). Computer Forensics Jumpstart. Indianapolis, Ind.: Wiley. United States Department of Justice, National Institute of Justice. (Nov 5, 2010) Digital Evidence Analysis Tools. Retrieved from: http://nij.gov/topics/forensics/evidence/digital/analysis/Pages/welcome.aspx

Open Document