Investigators: Digital Evidence Essay

1410 words - 6 pages

Field Report
Investigators must ensure the integrity of all evidence collected, analyzed, processed and presented to a courtroom and jury. The reason that this is important is because the improper collection and analysis of evidence can lead to compromised data and potential damage to a prosecution. The seizure and analysis of digital evidence can be particularly challenging but is just as critical to a case as physical evidence. There are specific procedures that must be met to ensure the successful collection and analysis of digital media and guidelines or best practices for collection of all evidence, both physical and digital that must be followed. Conducting the proper steps in an investigation regarding the collection and processing of evidence and the proper chain of custody requirements can ensure a successful outcome in solving a case and a successful prosecution.
The first and most important step in the entire process for collecting evidence is to document the scene. It is extremely critical that an investigator capture as accurate a depiction of a crime scene as possible (Solomon, Rudolph, Tittel, Broom, & Barrett, 2011). This can be accomplished in a number of ways. These include taking a photograph of the scene to preserve the original image of the scene for a judge and jury. Investigators can also take images of a computer system. It is necessary to take hash images of volatile data first as volatile data relies on a constant flow of electricity to keep in system memory. Things that are considered volatile are registers, the system casche, routing tables, kernel statistics, memory, temporary file systems, disks and archived media (Soloman, Rudolph, Tittel, Broom, & Barrett, 2011). The first thing an investigator should do aside from photographing the scene is to take a system hash image of seized digital items. If a system is in the process of deleting what could be valuable evidence, it should be immediately unplugged to try and preserve data. Before removing digital evidence from a business or a home, a forensic investigator should also take note of network connections in use, open ports, applications and the date and time of the system. When digital items are removed and transported, they should never be transported in plastic. The battery in cell phones should be removed and the items should be placed in paper anti-static bags. Any interference from cell towers and other electronic devices could damage evidence. Investigators always want to maintain the last known state of digital items. Any changes to the date and time of a system or new data being transmitted to a system could overwrite existing data and that could jeopardize an investigation (National Forensic Science Technology Center, n.d.).
Preserving evidence collected and conducting proper analysis of systems for extraction of evidence is a very meticulous process. There are many ways in which forensic examiners can extract information from computer systems. All...

Find Another Essay On Investigators: Digital Evidence

Cyber Crime Investigations: The Obstacles for Law Enforcement Officials

1578 words - 6 pages , the skills and experience needed to investigate a cyber crime is beyond the common knowledge of "line investigators"; therefore, agencies should have, at a minimum, one investigator that is an expert in dealing with cyber crimes, and should provide training for all officers on basic knowledge for preserving digital evidence. For example, hidden files, encryption, password-protected files, swap files and slack space are all relevant to an

Electronic Toolkits and Investigating Windows Computers

2974 words - 12 pages computer and internet crime.In today's digital age the crime scene has a new component; In order to use these tools, you need to know how to use them. In many cases evidence gathered from computers and computer networks has been the key to criminal investigations. Computer forensics involves the identification, preservation, extraction, documentation and interpretation of this digital evidence. Also, the tools define the business research and its

The Constitutionality of the USA Patriot Act

2119 words - 8 pages Patriot Act’s “sneak and peek” provision to swab his car for chemicals and to search his laptop for information. Evidence was secretly collected against Zazi and is going to be used against him in court. (Temple-Raston, “Range of Investigator’s Tools”) In 2002, the FBI arrested 6 al-Qaeda supporters, known as the Lackawanna Six. The arrest was successful because drug and counter-terrorism investigators relayed important information to FBI

First Act of Tyranny

957 words - 4 pages After the incident on September 11, 2001, the public, in a state of fear, clamored for more security. The United States Government was all too happy to oblige them. The passage of a series of laws bound together under a single act, known as the Patriot Act, compromised the people’s right to free speech as well as many other rights laid forth by the bill of rights. And through digital media the privacy of those subject to this act would be almost

Web Fingerprinting: A New Threat to Privacy

918 words - 4 pages , it will result in a change of the browser fingerprint (Peter Eckersley, 2010). Another facet were this device fingerprinting fails, is in the diversity of the software and hardware settings. If the basic the configurations are equal in two or more browsers, it is impossible to uniquely distinguish one. Fingerprinting is a mechanism used against people who have blocked or limited their cookies or IP addresses. The lack of evidence it leaves is

Deterministic Automata And Freewill

1234 words - 5 pages factors relevant to the operation of the brain are by no means understood2 nor is it at all clear that the laws of physics which govern them are really deterministic3. But secondly, it is now known that almost all complex analogue systems with non-linear interactions are non-deterministic, even if all the components are subject to deterministic laws.Ilya Prigogine is one of the leading investigators of these questions, which are a direct

Research Regarding Types of Fingerprint Revealing Powder on Glass Surfaces

2740 words - 11 pages the visibility of the fingerprint. “Fingerprint is a form of biometric and forensic science that uses physical characteristics for identification.” “The technique of fingerprinting is known as dactyloscopy.” Detectives, crime scene investigators and forensic scientists often reveal fingerprints using different methods to detect criminals, since a fingerprint is often regarded as a unique form of identity and hence no two persons share the same

This is The Zodiac Speaking

2303 words - 10 pages lying (Arthur Leigh Allen 5). However, to catch the Zodiac Killer, there must be new approaches to unveiling the truth. Investigators must stop wasting time on impossible scenarios and theories. The Zodiac is not a Vietnam veteran, multiple people, or Arthur Leigh Allen. If the evidence is not in the open, there must not be accusations. The focus should not be convicting someone, but locating the Zodiac. Investigating the obvious is the most

Firearm and Tool Mark Analysis

2442 words - 10 pages tool mark is any impression, cut, gouge, or abrasion caused by a tool coming into contact with another object (Saferstein, 481). Depending on the stage of the investigation, the science can be performed by crime scene investigators, CSIs, as well as experts that analyze the firearms or tool marks in a laboratory setting. If the crime scene is being evaluated and combed for bullets, weapons, or tool marks, it is up to the crime scene investigator

Trends And Current Problems In Aviation: Cockpit Voice And Flight Dat

2786 words - 11 pages . Investigators are unsure about who entered the flight deck, and exactly what went on in there. Cameras could have helped to solve the mystery. A company called Sight Recorder has developed a video recording system that it claims could have solved every recent crash mystery by providing investigators with full color digital images. Sight Recorder allows the crew to view color images from mounted cameras in the tail, belly, cabin and cockpit in

Cyber-Warfare: The Importance of the New Digital Battlefield

2258 words - 9 pages sponsorship when attacks hardly leave conclusive forensic evidence and China refuses to assist investigators. Even though it may be near to impossible to prove China was involved in the attack, the size and scope of the cyber-attack follows estimates made by military and intelligence sources about the nature of China’s cyber-forces (Schaap 2009, 132). The type of information copied and transmitted out of the United States further implies Titan

Similar Essays

Computer Forensics: Issues In Preserving Digital Evidence And Forensic Investigation

1931 words - 8 pages Technology is constantly changing, and as the capabilities change, so do the issues in Forensic information technology (FIT). FIT is defined as the scientific use or application of information technology (IT) that is used to generate and present digital evidence to be used in courts, legal or other formal proceedings (Volonio). While the use of technology helps get things done faster, it also can present many issues if the proper procedures and

Artificial Intelligence Applied To Computer Forensics

952 words - 4 pages with correlation feature showed an effective way to open important evidence by checking data separately without analysis phase. Furthermore this impressive feature also expanded to include all variety range of situations and addition new agents. Learning CBR mechanisms also an evaluating feature in future conducts.The distributed process combined experiment evidence study by experts with the reducing of evidence volume also reduce distributed time taken shown the power of this tool, provide computer forensic experts and investigators faced with the problem of growing digital evidence volume.

Criminal Investigations Unit Essay

934 words - 4 pages follow-up investigation of all criminal offenses reported to the police department (Dantzker, 2003). The investigators receive specialized training and equipment designed to enhance the investigator's abilities to better serve the citizens of the police department. The investigators usually work closely with the Patrol Division and the State Attorney's Office to ensure a positive disposition on each case investigated. (Dantzker, 2003)The Evidence and

Computer Forensics Essay

861 words - 3 pages PAGE PAGE 5 Surname [Writer's name][Professor's name][Course Title][Date]United StatesDescribe the CompanyAccessData is a computer forensic company, it's head quarters is in Utah. It uses the most up-to-date tools for it's digital investigations There are a number of key areas that an organisation needs to think about when considering protection, including investment in prevention and detection systems (e.g. firewalls), education of its