Processing Crime and Incident Scenes-Chapter 4 Flashcards

1
Q

Automated Fingerprint Identification System (AFIS):

A

Definition: A biometric system that uses digital images of fingerprints to identify individuals.
Example: Law enforcement agencies use AFIS to compare fingerprints collected from crime scenes to those in their databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer-generated records

A

Definition: Records generated by a computer system, such as reports or logs.
Example: A financial institution’s daily transaction report, which is generated by its computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer-stored records

A

Definition: Records that are stored electronically on a computer system.
Example: Electronic medical records stored in a hospital’s database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Covert surveillance

A

Definition: The monitoring of a person or group without their knowledge or consent.
Example: An investigator covertly monitoring the activities of a suspect in a criminal investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyclic Redundancy Check (CRC)

A

Definition: A mathematical algorithm used to detect errors in data transmission or storage.
Example: CRC is commonly used in digital storage devices such as hard drives or memory cards to ensure data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital evidence

A

Definition: Any form of electronic data that can be used as evidence in a legal proceeding.
Example: Emails, text messages, digital photos, or computer files that contain evidence of a crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensive-response field kit

A

Definition: A portable kit containing specialized equipment and supplies used to respond to and manage large-scale incidents.
Example: An extensive-response field kit may include hazmat suits, gas detectors, and decontamination supplies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash value

A

Definition: A unique digital fingerprint generated by a hash function, used to verify the integrity of data.
Example: A hash value can be used to ensure that a file has not been modified or corrupted during transmission or storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hazardous materials (HAZMAT)

A

Definition: Materials or substances that are potentially harmful or dangerous to human health or the environment.
Example: Chemicals, radioactive materials, or infectious biological agents are considered hazardous materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Initial-response field kit

A

Definition: A portable kit containing basic equipment and supplies used to respond to and manage small-scale incidents.
Example: An initial-response field kit may include basic first-aid supplies, a flashlight, and a multi-tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Innocent information

A

Definition: Information that is not relevant or connected to a criminal investigation.
Example: Personal information that does not provide any evidence of a crime, such as a person’s shopping habits or hobbies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keyed hash set

A

Definition: A set of hash values generated from a list of specific keywords or phrases.
Example: A keyed hash set can be used to identify files or messages that contain specific keywords or phrases relevant to an investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Limiting phrase

A

Definition: A phrase or statement used to limit the scope or extent of a search or investigation.
Example: A limiting phrase may be used to restrict the search of a suspect’s computer to a specific time frame or set of files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Low-level investigations

A

Definition: Investigations that are focused on minor or low-level offenses.
Example: A low-level investigation may involve the theft of a small amount of money or property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Message Digest 5 (MD5)

A

Definition: A commonly used cryptographic hash function that generates a 128-bit hash value.
Example: MD5 is often used to verify the integrity of files during data transmission or storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

National Institute of Standards and Technology (NIST)

A

Definition: A federal agency that develops standards and guidelines for technology and science.
Example: NIST has developed many standards for digital evidence, including guidelines for the acquisition and analysis of digital evidence.

17
Q

Nonkeyed hash set

A

Definition: A set of hash values generated from a random selection of data.
Example: A nonkeyed hash set can be used to identify files or messages that contain unknown or unexpected

18
Q

Private-sector investigations are typically easier than law enforcement investigations for which of the following reasons?

Most companies keep inventory databases of all hardware and software used.
The investigator doesn’t have to get a warrant.
The investigator has to get a warrant.
Users can load whatever they want on their machines.

A

Most companies keep inventory databases of all hardware and software

19
Q

In the United States, if a company publishes a policy stating that it reserves the right to inspect computing assets at will, a private-sector investigator can conduct covert surveillance on an employee with little cause. True or False?

A

true

20
Q

If you discover a criminal act while investigating a company policy abuse, the case becomes a criminal investigation and should be referred to law enforcement. True or False?

A

true

21
Q

As a private-sector investigator, you can become an agent of law enforcement when which of the following happens?

You begin to take orders from a police detective without a warrant or subpoena.
Your internal investigation has concluded, and you have filed a criminal complaint and turned over the evidence to law enforcement.
Your internal investigation begins.
None of the above.

A

none of the above

22
Q

The plain view doctrine in computer searches is well-established law. True or False?

A

true

23
Q

If a suspect’s computer is found in an area that might have toxic chemicals, you must do which of the following?

Coordinate with the HAZMAT team.
Determine a way to obtain the suspect’s computer.
Assume the suspect’s computer is contaminated.
Do not enter alone.

A

Coordinate with the HAZMAT team.

24
Q

What are the three rules for a forensic hash?

A

Unique, repeatable, and unchanged.

25
Q

In forensic hashes, when does a collision occur?

A

A collision occurs when two different data sets produce the same hash value.

26
Q

List three items that should be in an initial-response field kit.

A

Forensic software, digital camera, and evidence collection forms.

27
Q

When you arrive at the scene, why should you extract only those items you need to acquire evidence?

A

To preserve the integrity of the crime scene and avoid contamination of evidence.

28
Q

Computer peripherals or attachments can contain DNA evidence. True or False?

A

true

29
Q

if a suspect computer is running Windows 10, which of the following can you perform safely?

Browsing open applications
Disconnecting power
Either of the above
None of the above

A

Browsing open applications

30
Q

Describe what should be videotaped or sketched at a digital crime scene.

A

The physical layout of the crime scene, the location of the computer, the location of peripherals, and the orientation of the computer.

31
Q

Which of the following techniques might be used in covert surveillance?

Keylogging
Data sniffing
Network logs
None of the above

A

Keylogging and data sniffing.

32
Q

Commingling evidence means what in a private-sector setting?

A

Commingling evidence means that evidence from different investigations is stored together.

33
Q

List two hashing algorithms commonly used for forensic purposes. True or False?

A

True - SHA-1 and MD5 are two commonly used hashing algorithms for forensic purposes.

34
Q

Small companies rarely need investigators. True or False?

A

false

35
Q

If a company doesn’t distribute a computing use policy stating an employer’s right to inspect employees’ computers freely, including e-mail and Web use, employees have an expectation of privacy. True or False?

A

true

36
Q

You have been called to the scene of a fatal car crash where a laptop computer is still running. What type of field kit should you take with you?

A

Extensive-response field kit

37
Q

You should always answer questions from onlookers at a crime scene. True or False?

A

False - it is important to avoid discussing details of the investigation with anyone who is not directly involved in it.