Tuesday, April 2, 2019
Criminal Investigation: Electronic Evidence Collection
pitiful Investigation Electronic Evidence CollectionAccording to the U.S. plane section of rightness defines digital evidence as information and data stored on, received, or catching by an electronic device and unflinching to be of value to an investigation. digital evidence can be latent, time-sensitive, easily changed, damaged, or destroyed, and can transverse jurisdictional borders (National launch of Justice, 2008). As with both evidence, to be useful in proving or disproving criminal arrangeions, the evidence and how it is obtained and analyzed essential be reliable. Therefore, the processes utilise to obtain, handle, and analyze digital evidence should conform to accepted practices and utilize intentness recognize and accepted tools. Additionally, persons responsible for identifying, collecting, transporting, storing, and analyzing digital evidence must(prenominal) be knowledgeable and right on trained in this field as nearly as having a good understanding of t he legal requirements for search and transport of electronic evidence.Digital evidence is found on a contour of electronic devices and many of these are utilized daily in near all societies and enable people to interact with from each one other some(prenominal) near and far. This form of instant communications and e-mail provides a authority for criminals to send with each other as puff up as with their victims (U.S. Department of Homeland protective cover U.S. Secret Service, 2007). When used in the planning and explosive charge of a crime, the digital evidence stored on estimators, network servers, storehouse devices and media, digital cameras, and other such digital devices can be valuable in solving crimes. Digital forensic investigators must also be aware(predicate) that additional digital evidence may exist away from the photo, such on network servers used by email providers or sociable media sites or stored in online storageFor digital evidence to be useful in solving crimes, it must be relevant and its reliability must be maintained throughout the process of search, seizure, examination, and compendium. scratch, and foremost, the search and seizure of any evidence must be conducted using a legal means, by either executing a search warrant or by one of the exceptions to a search warrant (National show of Justice, 2008). Once it is determined or suspected that digital evidence is involved in the complaint of a crime, it is paramount that the shooting is controlled and any digital devices and electronic storage media at the scene be secured to prevent potential damage, corruption, or ravaging of any digital evidence. The scene should be fully documented to become an official record of the scene for later use by investigators and to attention in reconnecting any computers or devices seized. Care should be taken when documenting the scene to check into running computers are non bureaued down or any evidence moved until the entire scene is documented. Once the scene has been documented by either sketch, photograph or video, any devices to be seized should be either powered off or left with power on, according to departmental or agency procedures. This will best ensure any digital evidence contained on these devices is left intact and not damaged, corrupted, or destroyed by improperly powering off a device. both electronic device seized should be properly labeled and packaged out front transporting to preserve any digital evidence. If it is determined that computers in a powered-on resign be powered down, then power must be withdraw by unplugging the power connector at the back of the computers power leave or by removing the battery on laptop computers. Packaging must include using the proper materials, such as cardboard boxes, authorship bags, and anti-static bags to prevent the creation of static electricity or the buildup of humidity and wet that could damage sensitive electronic components. Devices su ch as cell phones should be left in a powered-on state if found that way and should be transported in specialized packaging that prevents the reception of any signals (National Institute of Justice, 2008). A complete inventory of all items seized must be completed and each item must be entered on a chain of work force form. Personnel should also take care to preserve any traditional evidence that may exist on these devices such as fingerprints or body fluids (National Institute of Justice, 2008).Once seized items have been properly packaged and transported, tho persons trained and qualified in digital forensics procedures should conduct examinations and analysis of digital evidence. Anytime evidence is transferred to another person, the release and receipt of the evidence must be annotated on a chain of custody log. Additionally, forensic tools used to elate and recover any digital evidence should be court-approved or recognized by the forensic community and any examination or an alysis of digital evidence must be performed on a re-create of the original digital image. (National Institute of Justice, 2007).Electronic devices, especially those used to communicate with others, are in widespread use and often times, crimes are attached with these electronic devices. Digital evidence is not limited to cyber or computer crimes. Digital evidence can exist in a categorization of instances where criminals, and sometimes victims, communicate using computers, social media, and cellular phones, as well as someone simply posting a criminal act on social media. The existence of digital evidence can be overwhelming in some cases, however, for evidence to be useful, it must be relevant, admissible, and reliable. To ensure digital evidence meets these requirements, agencies and department must ensure persons collecting, handling, transporting, and analyzing digital evidence follow department or agency procedures and that they are properly trained and utilize industry and court accepted procedures and tools.ReferencesNational Institute of Justice. (2007, January). Digital Evidence in the Courtroom A Guide for equity Enforcement and Prosecutors. Retrieved from National Criminal Justice Reference Service https//www.ncjrs.gov/pdffiles1/nij/211314.pdfNational Institute of Justice. (2008, April). Electronic Crime Scene Investigation A Guide for First Responders, Second Edition. Retrieved February 13, 2017, from National Institute of Justice https//www.ncjrs.gov/pdffiles1/nij/219941.pdfU.S. Department of Homeland Security U.S. Secret Service. (2007). Best Practices for Seizing Electronic Evidence v.3 A sacque Guide for First Responders. Washington D.C., USA.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment