Directive 5.30 digital evidence , Flashcards

1
Q

According to Directive 5.30 digital evidence , What is the purpose of Digital evidence ?

A

A. To provide guidelines and procedures for the seizure of any electronic device or
digital evidence generated, collected, or otherwise encountered and utilized by the
Philadelphia Police Department in legal matters.
B. For safeguarding, identifying, collecting, and preserving electronic evidence in a
prescribed manner to safely preserve stored data for recovery, preservation and
examination at a later time by department personnel trained in these techniques.
(PLEAC 1.5.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to Directive 5.30 digital evidence , It is the policy of the Police Department to collect and analyze all evidence of a crime
which may aid in identifying and/or__________?

A

prosecuting an offender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to Directive 5.30 digital evidence , who may collect digital evidence ?

A

Only

personnel with accepted and approved training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to Directive 5.30 digital evidence , who may analyze and process electronic devices ?

A

Only employees who have been trained in the appropriate forensic processes and
techniques,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Evidence (DE):

A

Any data in electronic format that can be read, processed or
otherwise utilized by an electronic device and pertains to, or otherwise has significance
and relevance to a criminal investigation, prosecution, or other critical interest to the
department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital Evidence Management System (DEMS):

A

A collection of hardware, software
and/or firmware designed to provide for the security, storage, organization and/or
distribution of digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Watermark:

A

A method of integrity verification that works by embedding a
files hash value into the binary structure of the file during its creation. The digital
watermark is verified by rehashing the file and comparing the new value against the
embedded value. Proprietary software is generally required to validate a watermark.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Electronic Devices:

A

Devices that process and generate data using electronically based
circuitry and components. The definition shall also include any associated
hardware/software or peripheral device. This includes but is not limited to personal
computers, laptop computers, servers, tablets, smart phones, video recorders, printers,
routers, cables, manuals, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity verification:

A

The determination of whether the information is complete and

unaltered since the time of acquisition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

National Institute of Standards and Technology (NIST) and United States Naval
Observatory (NSNO):

A

Represent the two official time keeping agencies in the United
States. Using a multitude of highly accurate atomic clocks, time from the two
organizations is usually within 20 nanoseconds of each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recovering Personnel:

A

A person that has been sufficiently trained by the department
or approved third party in the recovery, examination and/or analysis of a particular type
of evidence. This may include but is not limited to Computer Forensic Analysis,
DIVRT technicians, Forensic Video Analysts, and Cell Phone Examiners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Smart Device:

A

Any of a number of devices not generally considered a computer but
still capable of processing and storing electronic data. Smart devices typically include
cell phones, smart phones, PDA devices, GPS devices and tablet computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Storage Media:

A

Any device that is capable of storing, archiving, or conveying digital
evidence to an electronic device. This includes, Hard Disk Drives, Solid State Drives,
USB Drives, DVD’s, CD’s, SD cards, Compact Flash, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Super Hash Algorithm (SHA):

A

A cryptographic hash function designed by the United
States National Security Agency (NSA) and accepted by the US National Institute of
Standards. The algorithm generates a digital fingerprint by running data through a
mathematical process and generating a code value. It can detect with absolute certainty
that a file has been altered. Various version of the SHA create fingerprints with
increasing statistical probability that a data is complete and exact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

According to Directive 5.30 digital evidence , Negligence, recklessness or the performance of tasks in a manner that grossly deviates
from accepted methods and procedures will result in________?

A

termination of the employee’s ability to collect digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EXCEPTION TO REQUIRED TRAINING

A

Training will not be required when the owner, manager, company technician or the
equipment provider recovers the digital evidence for the investigator.

17
Q

According to Directive 5.30 digital evidence , If, during the course of an investigation, the investigator determines that an electronic
device may have evidentiary value, it will be processed as

A

evidence.

18
Q

According to Directive 5.30 digital evidence , An electronic device may be considered evidence if: ?

A
  1. The electronic device contains data that is relevant to a criminal investigation.
  2. The electronic device and/or data within are stolen property.
19
Q

RETENTION AND PURGING

Criminal Intelligence Data

A

2 years

20
Q

RETENTION AND PURGING

Felony Investigations

A

7 years

21
Q

RETENTION AND PURGING

Homicide

A

99 years

22
Q

According to Directive 5.30 digital evidence, Who will assign a Digital evidence custodian , for the purpose of safeguarding and
managing digital evidence created, collected, or otherwise utilized by the Philadelphia
Police Department.

A

The Police Commissioner

23
Q

According to Directive 5.30 digital evidence, who ? shall have direct access to the DEMS
and be responsible to produce any digital evidence requested through the discovery
process. _________?

A

The District Attorney’s Office

24
Q

According to Directive 5.30 digital evidence, Pennsylvania Right-to-Know Requests – The PPD must, by law, respond in writing
within__________? to every Right-to-Know request even if the request is beyond
the scope of the Right-to-Know Act and will be denied. Therefore, if any Right-to-
Know request is received by the Digital Evidence Custodian

A

five (5) days