Free Essay

Evidence Collection Cases

In:

Submitted By terra26
Words 1243
Pages 5
Evidence Collection Cases 1. In this case the first thing that first responders need to recognize is that the computer was on when the suspect was arrested and there may be evidence that they need to collect right away. If data of apparent evidentiary value is in plain view onscreen. The first responder should seek out personnel who have experience and training in capturing and preserving volatile data before proceeding. First responders should also be alert to the crime scene environment. They should look out for pieces of paper with handwritten notes, passwords, usernames, and software and hardware manuals. These forms of evidence also should be documented and preserved in compliance with departmental policies. In this case the computer should also be checked for DNA so investigators can match the suspects DNA to the arson crime scenes. Also TimeFrame Analysis can be used to link any files of interest to the timeframes of the investigation. All these things can help link the suspect to the crimes, and in doing so can help tell the insurance company whether the claims are valid. 2. Case 4-4 (bomb threat)
A list of what items should be included in an initial response field kit to ensure preservation if digital evidence.

The initial response field kit should be lightweight and easy to transport. With this kit, you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible. * Small computer toolkit * Large-capacity drive * IDE ribbon cable * SATA cables * Forensic boot media containing an acquisition utility * Laptop IDE 40 to 44-pin adapter, other adapter cables * Laptop or tablet computer * FireWire or USB dual write-protect external bay * Flashlight * Digital Camera with extra batteries * Evidence log forms * Notebook or digital dictation recorder * Computer evidence bags (antistatic bags) * Evidence labels, tape, and tags * Permanent marker * External USB devices or a portable hard drive
With the home and IP address located these tools should be all the first responder needs to collect the digital evidence needed to bring criminal charges against the suspect. 3. With the field of digital forensics growing rapidly there are many issues out there that can disrupt and discredit even the most experienced forensic examiner. One of the issues that continues to be of utmost importance is the validation of the technology and software associated with performing a digital forensic examination. Knowing how to design and properly maintain a good validation process is a key requirement for any digital forensic examiner. According to NSIT test results must be repeatable and reproducible to be considered admissible as electronic evidence. Digital forensics test results are repeatable when the same results are obtained using the same methods in the same testing environment. Digital forensics test results are reproducible when the same test results are obtained using the same method in a different testing environment. There are four steps involved with validating a new forensics software package. Those four steps include: Develop the plan, develop a controlled data set, conduct tests in a controlled environment, and validate the test results.
Developing the plan: Developing the scope of the plan may involve background and defining what the software or tool should do in a detailed fashion. Developing the scope of the plan also involves creating a protocol for testing by outlining the steps, tools, and requirements of such tools to be used during the test. This may include evaluation of multiple test scenarios for the same software or tool. To illustrate, if validating a particular forensic software imaging tool, that tool could be tested to determine whether or not it successfully creates, hashes, and verifies a particular baseline image that has been previously setup.
Develop a controlled data set: this is the most involved step in the process. This is because it involves setting-up specific devices and baseline images and then adding data to the specific areas of the media or device. Acquisitions would then need to be performed and documented after each addition to validate the primary baseline. This baseline may include a dummy mobile phone, USB thumb drive, or hard drive depending on the software or hardware tool you are testing.
Conduct tests in a controlled environment : Outside all the recommendations and standards set forth by NIST and the legal community, it only makes sense that a digital forensics examiner would perform an internal validation of the software and tools being used in the laboratory. In some cases these validations are arbitrary and can occur either in a controlled or uncontrolled environment.
Validate test results: testing is conducted against the requirements set for the software or tool in the previous steps. The results generated through the experimentation and validation stage must be repeatable. Validation should go beyond a simple surface scan when it comes to the use of those technologies in a scientific process. Each requirement should be tested at least three times. If there are any variables that may affect the outcome of the validation (e.g. failure to write-block, software bugs) they should be determined after three test runs

After going through these steps you should have validated a new forensic software package, with no worries that it might fail.

4. Advanced hexadecimal editors offer many features not available in digital forensics tools, such as hashing specific files or sectors. With the hash value in hand, you can use a forensics tool to search for a suspicious file that might have had its name changed to look like an innocuous file. Using the hexadecimal editors can be faster and easier that with a digital forensic tool. The advantage of recording hash values is that you can determine whether data has changed, which can be important in an investigation. Password recovery is becoming more common in digital forensics analysis. Several password cracking tools are available for handling password-protected data or systems. Some of these products are integrated into a digital forensics tool, such as OSforensics. Others, are stand-alone tools that typically require extracting password files or accessing a suspects disk or image file directly. Some of these tools are as follows: * Last Bit * AccessData PRTK * Ophcrack * John the Ripper * Passware
Most of these tools use a dictionary attack or brute-force attack to crack passwords. Brute-force attacks use every possible letter, number, and special character found on the keyboard, eventually cracking any password. However this method can require a lot of time, and processing power. In a dictionary attack, the program uses common words found in the dictionary and tries them as passwords. With many of these programs, you can build profiles of a suspect to help determine his or her password. These programs consider names of relatives or pets, favorite colors, and schools attended. The principle behind these programs is that people have a habit of using things their comfortable with, especially when it comes to memorization. Many password- protected OS and applications store passwords in the form of MD5 or SHA hash values. A brute-force attack requires converting a dictionary password from plaintext to a hash value. Because of the hash values a Rainbow Table has been developed. This table is a file containing the hash values for every possible password that can be generated from a computers keyboard. This method is much faster than the dictionary or brute-force methods. For the drive that is being investigated there are many options for cracking the passwords associated with the drive.

Similar Documents

Free Essay

Test1

...Dayani Herrera * Week 2 Assignment The Chain of Custody Process Limiting Access to the Evidence * When a piece of evidence is collected, there are numerous individuals who will have access to it before the case goes to trial. The investigator, evidence technician,
property officer, laboratory technician, prosecutor and defense attorney all may have custody. Each individual in this chain has a responsibility for the safe-keeping and preservation of the evidence while it is in their possession.

 Initial Collection * Before any evidence is removed from the crime scene, there should be an evidence custodian designated as the person in charge of initiating and maintaining all evidence. This person needs to document the crime scene location, as well as his time of arrival. There should also be a crime scene log established, witness list and documentation of identification, arrival and departure times of all law enforcement crime scene personnel.

 Record Keeping * The investigator who handles the evidence initially should affix her name, badge number and assignment to the package containing the evidence. When the evidence leaves the officer's possession, a record should be made in her case notes identifying to whom the evidence was given, the date and time, and the reason it was turned over. A signed receipt should be obtained from the person accepting the evidence and another signed receipt should be obtained when the item is returned. When the item is returned...

Words: 667 - Pages: 3

Free Essay

Forensic Testimony in Court

...Examine Forensic Testimony Forensic evidence has become more and more important in the court case for proving the guilt or innocence of a criminal defendant. Due to new technology the world of forensics is becoming more and more advanced providing law enforcement with all types of new investigatory tools and ways for the court to prove or disprove guilt. It is essential for law enforcement agencies to have trained forensic personnel with the skills to properly collect the evidence first to ensure the evidence does not become lost, destroyed, or damaged and the forensic evidence is accepted in a court of law. Improper collection of evidence is only one of many potential challenges associated with forensic evidence but it is an important challenge that must be addressed. Forensic evidence is collected at the crime scene. If the evidence is not properly documented and collected it can be found to be unreliable in the court process. In order for forensic evidence to be accepted in a court of law it must be documented through sketches, photographs, and video tapings and it must be collected using accepted standard forensic collection methods. If evidence is not properly documented or collected the chain of evidence is broken and the court will exclude the evidence from the court case. The chain of evidence refers to an important aspect of forensic involving the movement of evidence. In order to show the court the evidence was located and collected at the scene and...

Words: 1538 - Pages: 7

Premium Essay

Crime Scene Investigator

...preserving, reconstructing and presenting evidence. It is their job to examine any physical evidence that could remotely shed any light on what happened and who is responsible. There are no typical crime scenes, evidence or investigative approaches and every crime scene should be approached in a systematic sense. According to Robert R. Ogle Jr., a crime scene search is defined as a systematic, methodical search for any physical evidence at a crime scene. Before the job of CSI can begin, there has to be a crime committed. For instance, CSI are on call for murder scene investigations to collect and examine evidence. When CSI is contacted, their job begins. Evidence is a major part in any investigation. Without evidence, a case can grow cold quick. Anything can be evidence and when in a crime scene, everything should be treated as such. Evidence has many different categories: trace, firearm, impression, drug and alcohol, document, and biological fluids. All of these categories of evidence play an important part in finding out valuable information towards solving a case. The most important aspect of evidence collection and preservation is protecting the crime scene. When first approaching a crime scene, first responders should secure the scene after detaining any suspects and seeking medical for any injured party. (Ogle, Jr.) Police officers are typically the first to arrive at a crime scene and are responsible for securing the scene so no evidence is contaminated or destroyed. After...

Words: 1445 - Pages: 6

Free Essay

Criminology Level 3

...(CSI) Level 3 COURSE CODE – OSC532(V1.0) COURSE CODE – OSC532(V1.0) UNIT 5 – EVIDENCE HANDLING zoe wRIGHT UNIT 5 – EVIDENCE HANDLING zoe wRIGHT 2015 2015 Introduction This unit will be discussing the various packaging techniques in handling evidence taken away from crime scenes with the most appropriate ones being considered for each type of evidence found. It will be discussed having the implications of poor packaging and the results which lead to contamination of all evidence if not packaged properly and the outcome when it is taken to court also the reliability of the CSI’s involved. It is also the job of the CSI to make sure all health and safety procedures are in place before handling and taking any piece of evidence as there are varying risks involved like sharps, contamination of evidence, weather conditions other witnesses interfering with the scene, other personnel and any form of biological hazards. These must be taken seriously and analysed before any search. Unit 5 1. Detail the forensic evidence that would have been taken away from the scene by the perpetrator. The crime scene is probably the most important part of any criminal investigation. It is where forensic science starts. Locard’s Principle states that every contact leaves a trace (Locard, 1928). This is the primary rule of scene investigation – you are looking for ‘contact’ evidence that will help solve the crime. This trace may be in the form of a specific recoverable...

Words: 2900 - Pages: 12

Premium Essay

Integrated Case Study

...I ~ i APPLIED SOCIAL RESEARCH METHODS SERIES CASE Series Editors LEONARD BICKMAN, Peabody College, Vandelbilt University. Nashvine DEBRA J. ROO. Vanderbilt UnillelSity. Washington. DC I. SURVEY RESEARCH METHODS (ThIrd Edition) by FlOYD J. FOWLER, Jr. 2. SYNTHESIZING RESEARCH (ThIrd edition) by HARRIS COOPER 3. METHODS FOR POUCY RESEARCH by ANN MAJCHRZAK 4. SECONDARY RESEARCH (Second Edition) by DAVID W. STEWART and MICHAEL A. KAMINS 5. CASE sruDY RESEARCH (ThIrd edition) by ROBERT K. YIN 6. META-ANALY11C PROCEDURES FOR SOCIAL RESEARCH (Revl'" Edition) by ROBERT ROSENTHAL 7. TELEPHONE SURVEY METHODS (Second Edition) by PAUL J. LAVRAKAS 8. DIAGNOSING ORGANlZAnoNS (s.cond Edition) by MICHAEL I. HARRISON 9. GROUP TECHNIQUES FOR IDEA BUILDING (Second Edition, by CARL M. MOORE 10. NEED ANALYSI9 by JACK McKilliP II. UNKING AUDmNG AND META EVALUAnON by THOMAS A. SCHWANDT and EOINARD S. HALPERN 12. ETHICS AND VALUES IN APPUED SOCIAL RESEARCH by ALLAN J. KIMMEL 13. ON nME AND METHOD by JANICE R. KEllY and JOSEPH E. McGRATH 14. RESEARCH IN HEALTH CARE SEmNGS by KATHLEEN E. GRADY and BARBARA STRUDLER WALlSTON 15. PARnCIPANT OBSERVAnON by DANNY JORGENSEN 16. INTERPREnVE INTERACllONISM (Second Edition) by NORMAN K. DENZIN 17. ETHNOGRAPHY (Second Edition) by DAVID M. FETTERMAN 18. STANDARDIZED...

Words: 15482 - Pages: 62

Premium Essay

Criminal Investigation Process

...The Criminal Investigation Process is a very important aspect of the criminal justice system in today’s society. The smallest mistake in any investigation can allow a dangerous criminal to walk free. The process sets guidelines for law enforcement officers and forensic investigators to follow when processing a scene, collecting evidence, and reporting their findings. The essential steps for any investigations team to follow are: Determine team composition, control contamination, document the scene, prioritize evidence collection, and collect, preserve, inventory, package, and transport and submit evidence. After all of that is accomplished the team has to get together to debrief about the crime scene, perform the final survey of the scene and document it. From there the evidence is processed, lab tests are performed, and all the information is submitted to the district attorney’s office so that charges can be filed. Following the process carefully and correctly is very important to the investigation; any missed steps can result in overlooked evidence and can bring the investigation to a standstill. The investigation process is vital to an investigation’s success and to the conviction of the criminals involved. The first step in the criminal investigation process is to determine the team composition. This step requires the lead investigator to assess the scene quickly and determine what resources and how many personnel will be necessary to process the scene efficiently. The...

Words: 1575 - Pages: 7

Premium Essay

Research Guide

...1 A (VERY) BRIEF REFRESHER ON THE CASE STUDY METHOD The case study method embraces the full set of procedures needed to do case study research. These tasks include designing a case study, collecting the study’s data, analyzing the data, and presenting and reporting the results. (None of the tasks, nor the rest of this book, deals with the development of teaching case studies—frequently also referred to as the “case study method”—the pedagogical goals of which may differ entirely from doing research studies.) The present chapter introduces and describes these procedures, but only in the most modest manner. The chapter’s goal is to serve as a brief refresher to the case study method. As a refresher, the chapter does not fully cover all the options or nuances that you might encounter when customizing your own case study (refer to Yin, 2009a, to obtain a full rendition of the entire method). Besides discussing case study design, data collection, and analysis, the refresher addresses several key features of case study research. First, an abbreviated definition of a “case study” will help identify the circumstances when you might choose to use the case study method instead of (or as a complement to) some other research method. Second, other features cover the choices you are likely to encounter in doing your own case study. Thus, the refresher discusses the •• definition of the “case” in case study research, •• benefits of developing a theoretical perspective in conjunction with your...

Words: 8092 - Pages: 33

Free Essay

Forensic Evidence

...application of science to the law. In recent years the use of forensic science has become increasingly necessary to help with criminal and civil investigations. Although forensic evidence is admissible in court one must keep in mind how that evidence made its way to the court system. I will take you through the process. For there to be admissible evidence for a court case there must be physical evidence which would have been collected at a crime scene therefore there must have been some kind of crime committed. A crime with physical evidence doesn’t necessarily mean something violent but it can be. Theft, arson, car accident and murder are just a few examples of what a crime can be. The process begins when the crime has been committed, to the officers arriving on the scene, to surveying the scene, collecting the evidence, submitting it to the lab, submitting it as evidence and finally the acceptance of the evidence. When a call is sent out regarding a possible crime and the first officer arrives on scene it is that officer’s obligation to do a few things as precise as possible: 1. seek medical attention for those who may need it, 2. arrest or detain any perpetrators, and 3. secure the crime scene. Securing the crime scene is extremely important because you want to be able to retrieve as much evidence as possible. By securing the crime scene you are blocking off the area from unauthorized personnel. You want to keep the foot traffic to a minimum to prevent tampering and...

Words: 1263 - Pages: 6

Premium Essay

California V. Simpson Case Summary

...of Case (California v. Simpson) O.J. Simpson was a start NFL player who was tried on two counts of murder for the June 12th, 1994 deaths of Nicole Brown Simpson, his ex-wife and her friend, Ronald Goldman. Nicole Brown Simpson and Ronal Goldman were fatally stabbed on June 12th, 1994, and discovered the next morning on her property in Los Angeles. (OJ Simpsons murder, n.d.) OJ Simpson did not turn himself in but instead became the center of attention in a pursuit in his white Bronco SUV. Simpson was charged and pleaded not guilty to both murders and he was held without bail as per the Judge. Multiple hearings were held, presenting evidence against Simpson in which many were overlooked. Many flaws were exposed in the trials and the judicial...

Words: 1157 - Pages: 5

Premium Essay

A Career In Jenny O Connell's Forensic Nurse

...The forensic nurse is responsible for providing compassionate care to victims while collecting pertinent evidence which can later be used to prosecute perpetrators. In addition to evidence collection, the nurse may also serve as an expert witness by testifying in civil or criminal cases in a court of law. Without forensic nurses, many criminals would get away with the crime they committed and would remain on the streets putting the community at risk for future attacks. There are several areas of forensic nursing in which a Nurse can specialize including Sexual Assault Nurse Examiner, domestic violence, child abuse and neglect, elder mistreatment and death...

Words: 1566 - Pages: 7

Free Essay

Yayaya

...understand what research design is and what it is not. We need to know where design ®ts into the whole research process from framing a question to ®nally analysing and reporting data. This is the purpose of this chapter. Description and explanation Social researchers ask two fundamental types of research questions: 1 2 What is going on (descriptive research)? Why is it going on (explanatory research)? Descriptive research Although some people dismiss descriptive research as `mere description', good description is fundamental to the research enterprise and it has added immeasurably to our knowledge of the shape and nature of our society. Descriptive research encompasses much government sponsored research including the population census, the collection of a wide range of social indicators and economic information such as household expenditure patterns, time use studies, employment and crime statistics and the like. Descriptions can be concrete or abstract. A relatively concrete description might describe the ethnic mix of a community, the changing age pro®le of a population or the gender mix of a workplace. Alternatively 2 WHAT IS RESEARCH DESIGN? the description might ask more abstract questions such as `Is the level of social inequality increasing or declining?', `How secular is society?' or `How much poverty is there in this community?' Accurate descriptions of the level of unemployment or poverty have historically played a key role in social policy reforms (Marsh, 1982). By demonstrating...

Words: 5593 - Pages: 23

Free Essay

English

...Technology Can Save Money and Help Win Cases Prepared and Presented by: Michael J. Glick, Esq. Encore Legal Solutions Paralegal│Resource How The Effective Application of Technology Can Save Money and Help Win Cases People say that we live in a litigious society. There is some truth to that. Litigation often comes unexpectedly, is costly, messy and the outcome isn’t always predictable. But as business concerns, we strive to understand our costs and factor them into comprehensive models to assure profits. The role of in-house counsel has grown in recent years in an effort to become more proactive in limiting exposure and controlling the costs which can threaten profits. Much of this effort is focused on managing outside counsel to improve adherence to case budgets. However, there has been a reluctance to provide the tools to the outside counsel that can truly enhance efficiency, particularly within the area of discovery. This article will provide an understanding of how new tools and procedures can help to make the litigation process more efficient. Perhaps even more importantly, we show how these tools will provide a better understanding of potential liability earlier on to enable better decision making, more predictability and even help promote economies of scale in the ongoing battle to contain legal costs. One of the areas of largest expense is discovery: the identification, acquisition, management and analysis of evidence. Today, evidence takes many forms: paper, electronic...

Words: 3968 - Pages: 16

Premium Essay

David Trobisch and David Parker on the Origin of the New Testament the Historical Jesus, and How Manuscripts Can Reveal What Texts Conceal

...grew up with a picture of Paul traveling through Asia and Europe, founding congregations, counseling and teaching the men and women who had given their life to Jesus. If he could not visit them, he sent letters. When Paul died, his letters were kept as treasures. Each church that had received one of his letters saved it, had it read during worship services, and exchanged copies of the letter with other congregations close by. Later the congregations tried to complete their collection. But this view does not match the uniformity of manuscript evidence. --David Trobisch 1 It is even more remarkable that attempts to reconstruct the supposed document 'Q' (the lost collection used by both Matthew and Luke postulated by those who argue that Matthew and Luke are independent) use text-critical terminology to describe their activities. However, since all they are doing is making selections from a twentieth-century printed text, which does not even presume to provide confidently the text of the four-Gospel collection, never mind that of the independent first-century texts, this use of language must be dismissed as illusory. --David Parker 2 Modern scholarship has produced detailed biographies of Paul, massive multi-volume inquiries into “the historical Jesus,” and mountains of exegetical literature that claims to extract the author’s meaning from each word of each New Testament book. Typically, this literature analyzes the scriptural texts with little reference to actual manuscripts. Exegetes...

Words: 12334 - Pages: 50

Free Essay

Hair Banding: Casey Anthony Case

...Casey Anthony Case Dixit and Gothwal (2015) define criminal law as a rule that control the social conduct and prohibits the acts that are harmful to the people and as such, threatening the safety and the welfare of societal members. Morse (2015) contends that criminal laws define the punishment levelled on the people who break the prescribed societal conduct while Holland (2015) asserts that criminal laws refer to the state laws, which make certain actions illegal and punishable by fines or imprisonment. Accordingly, the case of Casey Anthony falls under the criminal and as such, the forensic evidence gathered from the trunk of her car makes her criminally reliable, as the said evidence is admissible in the court of law. The forensic experts from the Federal Bureau of Investigation (FBI) examined a band of hair recovered from her vehicle, which exposed evidence of apparent decomposition. Forensic analysis of the recovered band of hair showed consistence with the band of hair of the deceased. The FBI experts who conducted forensic analysis on the band of hair told the court that the sample had many consistencies in relation to the post-mortem banding. Moreover, microscopic hair examination specialist told the jurors that the root portion of the air was dark and, therefore, consistent with the evidence presented by the FBI. The analyzed evidence showed that the hair was evicted forcibly from the deceased. Further, an investigator of the crime scene testified that that there...

Words: 955 - Pages: 4

Premium Essay

Research Process and Terminology

...concepts, and provide the discoveries of his or her research. When does research process begin? It begins with problem formulation. Problem formulation is to review, selection, and specification of the area to be investigated. Researchers organize research by formulating and defining a research problem, which is the main issue of the research in most cases. Before attempting to solve a problem, researchers must first define the problem as in any problem. The more difficult it is to define the problem, the harder he or she has to try. Once the problem formulation is complete, researchers can stay focused on the research process. Second is research design. Research designs are the type of experimental or non-experimental approach, studies of groups over time, and use of control groups . A design is used to structure the research, to show the major parts of the research project. The function of a research design is to ensure that the evidence obtained allows the researchers to answer the initial question as clearly as possible. Social research must first have a design or a structure before data collection or...

Words: 819 - Pages: 4