Investigators must ensure the integrity of all evidence collected, analyzed, processed and presented to a courtroom and jury. The reason that this is important is because the improper collection and analysis of evidence can lead to compromised data and potential damage to a prosecution. The seizure and analysis of digital evidence can be particularly challenging but is just as critical to a case as physical evidence. There are specific procedures that must be met to ensure the successful collection and analysis of digital media and guidelines or best practices for collection of all evidence, both physical and digital that must be followed. Conducting the proper steps in an investigation regarding the collection and processing of evidence and the proper chain of custody requirements can ensure a successful outcome in solving a case and a successful prosecution.
The first and most important step in the entire process for collecting evidence is to document the scene. It is extremely critical that an investigator capture as accurate a depiction of a crime scene as possible (Solomon, Rudolph, Tittel, Broom, & Barrett, 2011). This can be accomplished in a number of ways. These include taking a photograph of the scene to preserve the original image of the scene for a judge and jury. Investigators can also take images of a computer system. It is necessary to take hash images of volatile data first as volatile data relies on a constant flow of electricity to keep in system memory. Things that are considered volatile are registers, the system casche, routing tables, kernel statistics, memory, temporary file systems, disks and archived media (Soloman, Rudolph, Tittel, Broom, & Barrett, 2011). The first thing an investigator s...
... middle of paper ...
...atastrophe for the prosecution in the courtroom. Not only must they understand how to collect and analyze evidence, they must also know how to properly store, tag and account for all evidence in order to preserve the integrity of the evidence. Knowledge of how the defense will respond to presented evidence is also helpful in helping forensic experts explain their actions while conducting forensic testing.
Computer Learning Center, N. (2009). Comp tia security +. Rochester, NY: Element Corporation.
National Forensic Science Technology Center. (n.d.). A simplified guide to digital evidence. Retrieved from http://tychousa10.umuc.edu/CCJS321/1402/6383/class.nsf/Menu?OpenFrameSet&Login
Solomon, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics Jumpstart (2nd ed.). Indianapolis, IN: Wiley Publishing Inc..
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... Lastly in “seizing stand-alone computers and equipment” first responders should take necessary steps like calling a forensic expert if the computer is still on or immediately plucking away the power to the computer if any destruction software is running which will help to preserve information on the machine (National Forensic Science Technology Center, n.d.). These are steps most trained investigators know. However the concern is to level the playing field with criminals. A recent NIJ needs-assessment study found that many senior managers, police chiefs, and those who make funding and resource allocation decisions do not have the level of expertise or tools needed to investigate and prep... [tags: evidence, cyber, digital]
3293 words (9.4 pages)
- Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet is essentially a guide on how to collect and process digital evidence in any situation. In this book, digital evidence is defined as “any data stored or transmitted using a computer that support or refute a theory of how an offense occurred or that address critical elements of the offense such as intent or alibi” (Casey, 7). Most crimes today have some kind of digital element to them, from the crime itself to the criminal’s use of computer systems to communicate, store incriminating data, or search for ways to commit a crime and this creates new challenges for those in law enforcement (Casey, 3).... [tags: science, data, system, internet, technology]
1732 words (4.9 pages)
- 1. Describe at least 5 steps in a process to collect digital evidence to the time you testify that you consider important. Please explain why they are important. For this particular example we will assume that the warrant for search and seizure was requested and executed lawfully and did not violate any part of the Fourth Amendment. 1. First and Foremost… Having the right person to do the job. Computer forensic investigators have the tough job of finding a “binary” smoking gun. In order to do this, the investigator must be trained, qualified and have an “eye” for things that others may not see.... [tags: forensics, search, equipment]
761 words (2.2 pages)
- 1. Introduction The aim of this report is to theoretical cover data preservation, examination of digital evidence, tools and techniques for data capture, preservation and examination with a list of recommendations. In our modern society, computers and other digital devices are becoming ubiquitous. In the late 1970’s the number of crimes that involved digital devices and computers has been increasing rapidly. As a result of that, computer experts specified the need for permanently improving digital forensic tools and practices.... [tags: materials found in digital devices]
2655 words (7.6 pages)
- Potential Digital Evidence As you can see in the photograph provided, Mr. Didit’s workspace contained numerous digital evidence items. There were two (2) computer towers on the floor that contained emails between Mr. Didit and Kazuki Corporation discussing the smartphone design along with image files of classified coding for the smartphone operating system. These towers were sealed within large anti-static evidence bags, establishing the chain-of-custody, and transported to the off-site facility for investigation.... [tags: Mr Didit, workspace, photograph]
961 words (2.7 pages)
- Digital forensic tools are used globally by law enforcement agencies and the military services. As cyber crimes continue to climb, so does the development of tools. Smart phones are portable computers with the endless capabilities used for hacking and to transport intelligence. Many court cases are solved by incriminating evidence discovered through computers and smart phone devices. Two tools used in digital forensics are the Secure View and the XRY. A breakdown of the tool’s function capability, operating systems, cost effectiveness, and training requirements are discussed.... [tags: Mobile phone, Personal digital assistant]
1068 words (3.1 pages)
- Technical. The expansion of this organization in the cybersecurity arena has established a necessity to construct a digital forensics laboratory to expand the organization’s evolution in the digital forensics field. To achieve this, Nelson, Steuart, and Phillips (2014) articulates that it is imperative to get an account of information systems and software utilized in the critical infrastructure sectors (p. 67). According to the Department of Homeland Security (2014), the nation’s critical infrastructure encompasses the subsequent sectors depicted in Table 1.... [tags: Forensic science, Computer forensics]
1005 words (2.9 pages)
- ... The judge and jury that hear a case have become familiar with some of the terminology that is being used because many of them own the type of devices that are being used to commit the crimes. In early days of digital recovery, law enforcement would seize the equipment and take it back to be analyzed. They soon realized that once the device is shut down, some of the data can be lost. This new process emphasis on capturing as much as they can while still at the crime scene and the device is still running (Office of Justice Programs, 2010).... [tags: technology, criminal, evidence]
1899 words (5.4 pages)
- Digital Forensics Sachin Durgaiah University of Texas at Dallas Abstract: This paper starts with the history of Digital Forensics since when it is being used. The paper then moves to the process of digital forensics and its limitation. We shall look into the legal methods of computer forensics and also how to overcome the disadvantages of computer forensics. Introduction: Digital forensics is mainly used in investigating the data found on electronic devices. Digital forensics has its core application in computer crime.... [tags: Forensic science, Computer forensics]
1978 words (5.7 pages)
- Digital Forensics: Potential for Miscarriages of Justice Madhavi Chandra Saladi 706630 ISYS90051 email@example.com Introduction Digitisation has substantially transformed traditional forensic procedures including the way evidences are collected, preserved and produced in the court of Law. Electronic records from digital devices are being accepted in courts as proofs during trials and several digital forensic tools are employed for use by forensic practitioners on a day to day basis within military, law enforcement and government organisations.... [tags: Forensic science, Computer forensics, Conviction]
1184 words (3.4 pages)