Preview

Should The Correct Procedures In Evidence Collection

Good Essays
Open Document
Open Document
460 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Should The Correct Procedures In Evidence Collection
Before any digital evidence is collected and analysed it is essential computer forensic investigators have a methodology in place. There are many different methodologies available such as DFRWS, ADAM and IDIP, to name a few. Although this chapter is discussing the correct procedures for evidence collection, it is important to remember the successfulness and effectiveness of evidence collection comes down to having a methodology in place. According to (Sansurooah, 2016), computer forensic analysts or specialists will follow clear, well defined methodologies and procedures, and flexibility is expected and encouraged when encountering with the unusual. It can be said methodologies provide guidance during the forensic process much like a compass gives a sense of direction to an explorer (Kuchta, 2002).

(InfoSec Institute, 2016)

CORRECT PROCEDURES IN EVIDENCE COLLECTION.
This chapter will discuss the correct procedures in evidence collection and will examine the ethics and Law surrounding digital forensic analysts. It is imperative ‘good procedures’ are followed because
…show more content…
Before any investigation is authorised many questions needs to be answered such as; do we have the correct tools required, investigators appropriately qualified who have extensive knowledge and does the forensic team have the facilities to examine evidence. The ACPO guideline states that “Persons with inadequate training or unable to comply with the principles must not carry out the investigation” (Williams QPM, 2012). If during any part of the investigation the case gets complicated or beyond an investigator/analyses knowledge, it is expected the forensic investigator must either ask for “assistance from an experienced specialist investigator or undergo training in that particular field to enhance his or her

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    The evidence collection process is very extensive and must be accurately recorded and preserved. First there should be a plan of action. This includes making sure everyone at the scene knows how the evidence will be documented. If not all are on the same course of action important evidence could be damaged or removed. For example if an investigator walks on a footprint that was left by the suspect it probably won’t be able to get an accurate picture of the evidence and it is lost.…

    • 673 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Anth Media Analysis

    • 1543 Words
    • 7 Pages

    Houck, M. M., & Siegal, J. A. (2010). Fundamentals of Forensic Science (2 ed.). Burlington: Elsevier.…

    • 1543 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Dna Evidence

    • 397 Words
    • 2 Pages

    NAFS. 2008. Codes of Ethics of the Northwest Association of Forensic Scientists. Retrieved February 26, 2009. Available Online:…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    Information technology knowledge and skills are necessary tools of the forensic accountant in a world filled which paperless crimes. At minimum, forensic accountants must know the point at which they should contact an expert in computer hardware or software. Examples of ways that forensic accountants use information technology skills to quarantine data, extract data through data mining, design and implement controls over data manipulation, accumulate baseline information for comparison purpose, and analyze data.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nothing

    • 4138 Words
    • 17 Pages

    The search for physical evidence at a crime scene must be done thoroughly and followed by the protocol. How the criminalist will decide to execute the crime-scene investigation depends on the size and the locale of the area, as well as on the actions of the suspect(s) and victim(s) at the scene. It must be considered that physical evidence can be anything, from a massive object to a microscopic trace, however, some evidence are clearly visible but others need to be examined in the laboratory in order to be detected. Physical evidence must be processed in a way so as to prevent any change from happening between the time that was collected on the crime scene and the time it is received by the laboratory. When collecting physical evidence from a scene, any criminalist must be aware of the fact that recovery of one type of evidence can destroy another.…

    • 4138 Words
    • 17 Pages
    Better Essays
  • Good Essays

    Often times lines become blurred regarding inductions and deductive reasoning as they apply to forensic sciences. Inductions are described by Thornton (1997b, p. 13) as an inference that is derived by specific observations to a generalization, or an assumption that may not always be valid. On the other hand, a deductive reasoning is defined as a forensics-evidence-based, process-oriented method of investigative reasoning based off of the behavioral patterns of a particular offender (Turvey, 1999). Historically, forensic scientists have failed to recognize the importance of inductions and deductive reasoning as a critical process in conducting investigations. Thus resulting in a hypothesis being falsely categorized as a deductive conclusion; when in fact it remains nothing more than a statement until supported by follow on testing (Thornton & Kirk, 1997).…

    • 519 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The suspect’s (Paul Giering) computer had the user name “Test” and contained the type of video files that were located on Agent Sutehall’s initial investigation. An eMule file was also located on the computer. This evidence was supported by Giering’s admission to having at least 50-100 child pornography video files on his laptop computer under the user name “Test”. The evidence that was collected from the other occupant’s rooms, helped to eliminate them as suspects.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    The three advantages of having an evidence collection unit process a crime scene instead of a patrol officer or detective would be that the unit has extensive experience, they have the equipment needed, and lastly they are dedicated to only doing.…

    • 337 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The Crime Scene 02.01 The Crime Scene 02.02 Evidence 02.03 Recording the Scene 02.04 Searching for Evidence 02.05 Submitting Evidence 02.06 Review and Critical Thinking 02.07…

    • 788 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    The criminal investigation process is a complex aspect of the legal system that has had mixed levels of success in achieving justice lawfully, justly and in the accordance with the rights of the victims, accused and society. The criminal investigation process encapsulates the powers of police to; search and seize (e.g. drug detection dogs); arrest (including the use of tasers); use of technology (DNA evidence); and entails the rights of suspects, such as bail and remand and the right to counsel during interrogation. One integral piece of legislation is the Law Enforcement (Powers and Responsibilities) Act 2002 (NSW) (LEPAR), which has consolidated police powers.…

    • 1020 Words
    • 5 Pages
    Better Essays