Introduction The following paper will be prepared so that any team can handle a forensic investigation that has had wireless devices introduced to the crime scene. I will be walking through the steps that a forensic team will take when handling a wireless device. There will be a comprehensive list of each step an investigator will take in the investigative process. By the end of this report the forensic technicians in front of me will know each step and procedure they must take when extracting evidence from a wireless device.
Wireless Network Investigations This paper …show more content…
are some of the major steps performed during this phase. It is our job as forensic investigators to be able to prove the evidence we collected is valid and that the techniques that we use can cause no damage or altering of any of the media devices we gathered. We must prove to the court that the evidence we collected has maintained the integrity of the court by following evidence check in and check out rules, date, time and investigator name and the mathematical techniques that are used to maintain the authentication of the wireless device. Phase ten is Analysis, here the forensic team performs a technical review of the results from the investigation, so that any relationships can be formed between fragments of data, hidden data is also analyzed, basically the information obtained during the examination phase is gone over so a timeline can be built and the event is then reconstructed. The National Institute of Justice guidelines recommend timeframe analysis, hidden data analysis, application analysis and file analysis of the extracted data so by using a combination of these types of analysis your results are complete and …show more content…
Our report must be written with no mistakes grammatically and no spelling error, this report is a professional view of a crime that was committed with the use of wireless devices. All of the evidence that was found on said devices has been captured using the proper forensic tools as to no cause any integrity problems with the original and copied evidence. This report along with supporting materials like copies of digital evidence, chain of custody document, printouts of various items of evidence etc. should also be submitted. Once this is completed we move onto the final phase in Ramabhadran (2013) twelve