Preview

Should The Correct Procedures In Evidence Collection

Good Essays
Open Document
Open Document
460 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Should The Correct Procedures In Evidence Collection
Before any digital evidence is collected and analysed it is essential computer forensic investigators have a methodology in place. There are many different methodologies available such as DFRWS, ADAM and IDIP, to name a few. Although this chapter is discussing the correct procedures for evidence collection, it is important to remember the successfulness and effectiveness of evidence collection comes down to having a methodology in place. According to (Sansurooah, 2016), computer forensic analysts or specialists will follow clear, well defined methodologies and procedures, and flexibility is expected and encouraged when encountering with the unusual. It can be said methodologies provide guidance during the forensic process much like a compass gives a sense of direction to an explorer (Kuchta, 2002).

(InfoSec Institute, 2016)

CORRECT PROCEDURES IN EVIDENCE COLLECTION.
This chapter will discuss the correct procedures in evidence collection and will examine the ethics and Law surrounding digital forensic analysts. It is imperative ‘good procedures’ are followed because
…show more content…

Before any investigation is authorised many questions needs to be answered such as; do we have the correct tools required, investigators appropriately qualified who have extensive knowledge and does the forensic team have the facilities to examine evidence. The ACPO guideline states that “Persons with inadequate training or unable to comply with the principles must not carry out the investigation” (Williams QPM, 2012). If during any part of the investigation the case gets complicated or beyond an investigator/analyses knowledge, it is expected the forensic investigator must either ask for “assistance from an experienced specialist investigator or undergo training in that particular field to enhance his or her

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    The Crime Scene 02.01 The Crime Scene 02.02 Evidence 02.03 Recording the Scene 02.04 Searching for Evidence 02.05 Submitting Evidence 02.06 Review and Critical Thinking 02.07…

    • 788 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    The fact that by time a lot of the evidence is examined it’s normally too late and can’t even be used. A lot of forensic examiners do not understand investigation, causing them to overlook relevant information and expand resources (Charles L Cohen, n.d.). This is why training is so important but lack of funds can be another limitation because there is only so much money to spend on training and resources.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The evidence collection process is very extensive and must be accurately recorded and preserved. First there should be a plan of action. This includes making sure everyone at the scene knows how the evidence will be documented. If not all are on the same course of action important evidence could be damaged or removed. For example if an investigator walks on a footprint that was left by the suspect it probably won’t be able to get an accurate picture of the evidence and it is lost.…

    • 673 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In the criminal justice investigation process forensic science and the scientific method are used. The collecting of the evidence is a very important procedure and should be done with…

    • 1471 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Dna Evidence

    • 397 Words
    • 2 Pages

    NAFS. 2008. Codes of Ethics of the Northwest Association of Forensic Scientists. Retrieved February 26, 2009. Available Online:…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Often times lines become blurred regarding inductions and deductive reasoning as they apply to forensic sciences. Inductions are described by Thornton (1997b, p. 13) as an inference that is derived by specific observations to a generalization, or an assumption that may not always be valid. On the other hand, a deductive reasoning is defined as a forensics-evidence-based, process-oriented method of investigative reasoning based off of the behavioral patterns of a particular offender (Turvey, 1999). Historically, forensic scientists have failed to recognize the importance of inductions and deductive reasoning as a critical process in conducting investigations. Thus resulting in a hypothesis being falsely categorized as a deductive conclusion; when in fact it remains nothing more than a statement until supported by follow on testing (Thornton & Kirk, 1997).…

    • 519 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The three advantages of having an evidence collection unit process a crime scene instead of a patrol officer or detective would be that the unit has extensive experience, they have the equipment needed, and lastly they are dedicated to only doing.…

    • 337 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The suspect’s (Paul Giering) computer had the user name “Test” and contained the type of video files that were located on Agent Sutehall’s initial investigation. An eMule file was also located on the computer. This evidence was supported by Giering’s admission to having at least 50-100 child pornography video files on his laptop computer under the user name “Test”. The evidence that was collected from the other occupant’s rooms, helped to eliminate them as suspects.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Better Essays

    The criminal investigation process is a complex aspect of the legal system that has had mixed levels of success in achieving justice lawfully, justly and in the accordance with the rights of the victims, accused and society. The criminal investigation process encapsulates the powers of police to; search and seize (e.g. drug detection dogs); arrest (including the use of tasers); use of technology (DNA evidence); and entails the rights of suspects, such as bail and remand and the right to counsel during interrogation. One integral piece of legislation is the Law Enforcement (Powers and Responsibilities) Act 2002 (NSW) (LEPAR), which has consolidated police powers.…

    • 1020 Words
    • 5 Pages
    Better Essays