Preview

Computer Evidence Processing Guidlines

Powerful Essays
Open Document
Open Document
1674 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Evidence Processing Guidlines
FOUR GENERAL EVIDENCE PROCESSING GUIDELINES

Four General Evidence Processing Guidelines
Jennifer Farmer
American InterContinental University

Abstract
The best way to preserve digital forensic evidence is to follow the four guidelines created. The four guidelines pertain to evidence collection, storage, processing, retrieval and documentation.

Four General Evidence Processing Guidelines Digital forensic evidence is extremely fragile and should be handled with care in order to avoid alteration which is why guidelines and procedures are created. There are four guidelines that should be followed in order to keep evidence in its most original state. Guideline One Digital evidence is not readable; however a printout is can be submitted as evidence under the "best evidence rule". The best evidence rule applies when a person wants to submit a copy of a document because the original document is unavailable (Nolo Dictionary, 2011).
**Collection**Any and all investigating officers should keep this in mind as well as have a warrant baring the proper wording and language that adheres to search and seizure of a personal computer in order to avoid violating any privacy rights. First the officer should check to see if the computer is on or off. If an officer finds that the computer is not on, he or she should not turn it on the evidence must not be altered; however if the officer finds the computer on then the officer should photograph the screen even if the screen is in sleep mode. Once the computer is photographed the power should be disconnected. In other words the modem should be drained of power by unplugging it. Next the officer should be sure to insert a police disc into the CD or DVD drive; bear in mind the disc should be blank and after inserting it the drive should be sealed. All other hardware connected to the system should be photographed in order to have a record of how the system was



References: Ashcroft, Daniels & Hart, (2004), Examination of Digital Evidence: A Guide for Law Enforcement, retrieved from http://www.ncjrs.gov/pdffiles1/nij/199408.pdf Civil action Group, (2006), 2006 Federal Rules of Civil Procedure Impact upon Digital Evidence, retrieved from http://www.aps-international.com/index.php?pr=LCFS_Auth Daniels, L. (n.d), Digital Forensics, retrieved from http://www.ncids.org/Defender%20Training/2006%20Investigators%20Conference/Com puter%20Forensics%20Prsentation.pdf File Slack, (2008), retrieved from http://www.forensics-intl.com/def6.html Indiana University Information Technology Services, (2010), In Windows, what is a swap file? Retrieved from https://kb.iu.edu/data/ahbb.html King, Bertram & Whiten, (n.d.), Procedures for Obtaining and Managing Computer and Electronic Evidence, retrieved from http://docs.google.com/viewer?a=v&q=cache:z8IhtYAbit0J:personal.georgiasouthern.ed u/~cwhiten/portfolio/Forensics.docx+four+general+evidence+processing+guidelines+to+ ensure+investigators+understand+the+steps+of+processing+computer+evidence&hl=en &gl=us&pid=bl&srcid=ADGEESjayTtvuT4l7sOi92KZgCokUGrP0HXyh1jrhgyUhhnV Ho3GCB9Ekx0VXDqvMA7A3vkA167W2KieePNSh3ueaLLM7sRu- 9B5rNoJoYzNw7gNJB5BTuD6dB6UuFZP0sFYvLKC84Kq&sig=AHIEtbQ3cQC6HRY Q-LsDAen85jC5jNG7TA Nolo Dictionary, (2011), Best Evidence Rule, retrieved from http://www.nolo.com/dictionary/best-evidence-rule-term.html

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    The factors that have limited local law enforcement’s efforts against digital crime are lack of training, lack of diagnostic equipment, lack of management level recognition and support, and a lack of specialized personnel. First off, training is a paramount need for local law enforcement. Many of the officers appointed to computer crimes at the local level do not have the requisite knowledge to deal with these types of crimes. Some of these officers are even put into these roles when they don’t even want to. Also, the lack of training to patrol officers could lead to valuable evidence being inadvertently destroyed. Most local agencies lack the equipment necessary to conduct digital forensics. Many local experts have even been reported to have purchased their own equipment to do their job (Taylor, et. al., 2011). The lack of management support and recognition of computer crime analysis has led to the lack of funding for these local cyber units. With a lack of funding comes a lack of equipment, training, and the ability for personnel to specialize in digital forensics.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    digital forensics: acquire the evidence without changing) authenticate your recovered evidence is the same as original…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It provides details in chronological order recorded. It shows how this evidence was retrieve, brought in as evidence, filed, assess, transfer, and disposed of. Is important to authenticate the digital media evidence inside the courtroom. For the evidence to be admissible in court. 2.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    forensic science module 1

    • 464 Words
    • 2 Pages

    1.Why do you think it is so important to use proper methods when collecting evidence from a crime scene? It is important to use proper methods when collecting evidence from a crime scene so you can get the correct information and analyze the evidence properly. The criminal may get away if you don’t use the proper methods and get the right information, because without the proper evidence even the best forensic scientist cant analyze it.…

    • 464 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Give a brief description of the order in which evidence should be documented, collected, and preserved. Your answer should include the role of potential contamination in your decision-making process.…

    • 673 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Beaufort-Moore, D. (2009) Crime Scene Management and Evidence Recovery. Oxford: Oxford University Press. Chapter 2 (p26- 37)…

    • 1293 Words
    • 6 Pages
    Best Essays
  • Good Essays

    1.06 Review

    • 379 Words
    • 2 Pages

    1. Why do you think it is so important to use proper methods when collecting evidence from a crime scene?…

    • 379 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit One Text Questions

    • 338 Words
    • 1 Page

    1. Why do you think it is so important to use proper methods when collecting evidence from a crime scene?…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Forensic Science 1

    • 353 Words
    • 2 Pages

    I think that it is important to use proper methods when collection evidence from a crime scene because if you don’t you risk contaminating the evidence and then it will not be able to be used in court.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Laws of Evidence

    • 2574 Words
    • 11 Pages

    I. Is the computer disk that contains a twenty six step guide on how to carry out a murder and was found in the defendant’s desk admissible evidence in this case?…

    • 2574 Words
    • 11 Pages
    Good Essays