A man of many talents and he is a brill investigator xx amy 26

From GunGame5 Documentation

Jump to: navigation, search

Gathering evidence away from PCs is part of computer forensics.

Computers are used inside crimes daily; therefore, any PC or electronic device at a crime scene may contain priceless proof. Investigators or law enforcement agency officers must record these devices within their condition and location at the time regarding seizure. They should also carefully dismantle plus preserve the computers to transport to the evidence locker. This preserves potential evidence and establishes a effectively-documented chain of evidence for the court system. Whether gathering evidence by a crime scene or as portion about a research plus seizure with a warrant, it's important to supply detailed documentation later on.

Difficulty: Moderate

Directions

Things You'll Need

Log publication Digital camera Recorder Gloves Colored labels Twist ties Plastic bags, various sizes Cardboard boxes with lids Transport vehicle

1 Evaluate the entire crime scene for size, scope and likely proof. Visually identify and record placement of PCs also related apparatus, including printers, copiers, scanners, routers, switches, servers plus wireless access points. Operate a journal, log, recorder or camera to aid in your documentation procedure.

3 Photograph the scene by some digital camera. Receive photographs of all parts of each and every PC and internet gadget. Take on a 360-degree view of the entire crime scene. Take photos indicating placement and condition of computer and internet devices. Word the positions of keyboards, mouse devices plus peripheral equipment by means of photos. Require photos indicating whether a gadget was on or off at the time of seizure plus what the PC monitor displays at the time, if possible.

5 Attach matching color-coded labels to the different cables regarding every device and their interfaces. This makes reassembling the device later considerably easier. Place the wires about each device in separate bags and label them. Don't forget to attach evidence tags to the cables.

6 Remove the battery from any laptops in the scene. Label and bag these batteries individually.

7 Cover the power receptacle on each device, with a layer regarding masking tape. This yous part of standard procedure which helps indicate whether the device was later plugged back in and turned on.

8 Collect and location wireless devices like as PDAs and cell phones into a Faraday Bag. This bag remains made of woven copper, nickel and silver and disables wireless communications.

9 Look around for paperwork also printouts related to computer work. Suspects now and then create down their computer symbols and other imperative data so they don't forget it. Photo its placement, file it, shop it and tag it. Before seizing each and every paperwork, check the warrant to make sure you are allowed to collect paperwork.

11 Transport all to the evidence locker in headquarters.

Tips & Warnings

Place on gloves before touching any equipment. This helps preserve fingerprints and other corporeal evidence.

References

NCJRS: Internet Crime Scene Investigation Computer Forensics: Seizing a Computer; Priscilla Oppenheimer Symantec: Field Manual - Part 3; Timothy Wright

Resources

New York Computer Forensics: The Computer Forensic Examination Method

Picture Credit Burke/Triolo Creations/Make X Pictures/Getty Images ;

Read Next:

Personal tools