First Responders to Digital Evidence Flashcards
What is Electronic Evidence?
Any probative information stored or transmitted in digital format that can be of evidentiary value in a criminal or civil court proceeding.
What are some examples of how a computer can be used as a target of a crime?
Embezzlement, theft of service, system intrusion, espionage, Terrorism, Cellular Phone Cloning, Software piracy and theft, theft of computer and computer/technology components.
How can computers can used as the Instrument or tool of criminal activity?
Solicitation of minors, e-stalking, Identity theft, credit card scams, internet fraud and variety of e-commerce scams, counterfeiting
What are some examples of how computers and other electronic devices can used as repositories of evidence and other information?
Financial Records, Address Books, Correspondence, Photographs, Historical records, recorded messages and other audio files, call records and other personal logs, Temp internet files
Computers can also be the ________ of _________ _______, or the results of computer operations can be ________ of a _______.
Fruit of Criminal Activity, Fruit of a crime
EX. Computer-generated reports and records, counterfeited cellphones, counterfeit currency or credit cards.
How can electronic evidence be altered or destroyed?
- Tainted or removed either accidentally or intentionally.
- Magnetic flux can hard computers
- Electro-Static Discharge (ESD) or static electricity can be particularly damaging to smaller media devices such as thumb drives.
You should avoid direct sunlight for extended periods and temperatures above 100 for what devices?
Computers, disk, tapes, and other storage devices.
What should you do if a computer has been exposed to sub-freezing temperatures?
Allow the machine and media to return to ambient temperature before attempting access.
How can Optical media disks be easily tainted?
Through willful scratching or mutilation and also susceptible to extreme temps and environmental degradation.
What non-electronic items may be important in the investigation of electronic crime?
-All Software documentation
–Computer-generated paper reports
Documentary evidence such as magazines and letters that can tie the suspect to computer workstation
-Photographs
-Address books
-List of password or access codes
-All notes and paper scraps at the computer workstation
What is the first and foremost proper procedure in collecting, preserving, and transporting computers and electronic items sized as evidence?
Officer Safety
What is the proper procedure in collecting, preserving, and transporting computers sized as evidence?
- Immediately isolate the computer from any user or potential user.
- Remove smart phones from user and keep it away from network access
If a computer is running when you go to seize it what should you do?
Unplug it from the back
If a computer is off when you go to seize it what should you do?
Leave it off
What should you make record off when seizing a computer?
Record anything on the computer screen
Record the configuration of wires and cables if the system will be taken.