Example: marketing

Electronic Evidence – Guide for First Responders

Best PracticesFor Seizing Electronic Pocket Guide for First ofHomeland SecurityUnited StatesSecret Service This third edition of the Best Practices for Seizing Electronic Evidencewas updatedas a project of the United States Secret Service and participating law enforcementagencies. A working group of various law enforcement agencies was convened toidentify common issues encountered in today's Electronic crime from the following agencies designed and developed this manual:Alabama District Attorney's Association - Office of Prosecution ServicesLos Angeles Police DepartmentLos Angeles County Sheriff's DepartmentMedford Police Department, MassachusettsPresque Isle Police Department, MaineRockland County Sheriff's Department, New YorkVentura County District Attorney's Office, CaliforniaUnited St

GOLDEN RULES There are general principles to follow when responding to any crime scene in which computers and electronic technology may be involved.

Tags:

  First, Guide, Evidence, Electronic, Scene, Responders, Electronic evidence guide for first responders

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Electronic Evidence – Guide for First Responders

1 Best PracticesFor Seizing Electronic Pocket Guide for First ofHomeland SecurityUnited StatesSecret Service This third edition of the Best Practices for Seizing Electronic Evidencewas updatedas a project of the United States Secret Service and participating law enforcementagencies. A working group of various law enforcement agencies was convened toidentify common issues encountered in today's Electronic crime from the following agencies designed and developed this manual:Alabama District Attorney's Association - Office of Prosecution ServicesLos Angeles Police DepartmentLos Angeles County Sheriff's DepartmentMedford Police Department, MassachusettsPresque Isle Police Department, MaineRockland County Sheriff's Department, New YorkVentura County District Attorney's Office, CaliforniaUnited States Secret ServiceFor additional copies, please contact the local office of the United States Secret Service.

2 The committee wishes to thank those departments and agencies who provided theirpersonnel and resources in support of the publication of this Guide . This Guide hasalso been endorsed by the International Association of Chiefs of SAFETYThe safety of the officer is paramount in the investigation of any crime. Today,virtually every crime has an Electronic component in terms of computers andelectronic technology being used to facilitate the crime. Computers used in crimesmay contain a host of Evidence related to the crime being investigated, whether it isa conventional crime or a terrorist act.

3 In light of this, law enforcement officers andinvestigators should not become complacent with individuals or their environmentsimply because the crime may involve a the investigation of Electronic crimes or the seizure of computers andelectronic items, be aware that as in any other crime, unexpected changes to asubject's involvement in a case may occur resulting in unexpected individual andenvironmental threats to an officer's proper procedures and tactics will ensure your personal safety as well asthe safety of others at the Electronic crime PRACTICES FOR SEIZINGELECTRONIC EVIDENCEGOLDEN RULEST here are general principles to follow when responding to any crime scenein which computers and Electronic technology may be involved.

4 Several ofthose principles are as follows:Officer safety - secure the scene and make it you reasonably believe that the computer is involved in the crimeyou are investigating, take immediate steps to preserve the Evidence . Do you have a legal basis to seize this computer (plain view, searchwarrant, consent, etc.)?Do not access any computer files. If the computer is off, leave it it is on, do not start searching through the the computer is on, go to the appropriate sections in this Guide onhow to properly shut down the computer and prepare it fortransportation as you reasonably believe that the computer is destroying Evidence ,immediately shut down the computer by pulling the power cord fromthe back of the computer.

5 If a camera is available, and the computer is on, take pictures of thecomputer screen. If the computer is off, take pictures of thecomputer, the location of the computer and any Electronic special legal considerations apply (doctor, attorney, clergy,psychiatrist, newspapers, publishers, etc)?GOLDEN RULESS tand-Alone HomePersonal ComputerForproper Evidence preservation,follow these procedures in order. If networked (attached to routerand modem), see instructions onnext page. Do not use computer or attempt tosearch for Evidence .

6 Photograph computer front and back as well as cords and connected devices, asfound. Photograph surrounding area prior to moving any Evidence . If computer is off , do not turn on . If computer is on and something is displayed on the monitor, photograph thescreen. If computer is on and the screen isblank, move mouse or press space bar(this will display the active image on thescreen). After image appears,photograph the screen. Unplug power cord from back of tower. If the laptop does not shutdownwhen the power cord is removed, locate and removethe battery pack.

7 The battery is commonly placed onthe bottom, and there is usually a button or switch thatallows for the removal of the battery. Once the batteryis removed, do not return it to or store it in the laptop. Removing thebattery will prevent accidental start-up of the laptop. Diagram and label cords to later identify connected devices. Disconnect all cords and devices from tower. Package components and transport / store components as fragile cargo. Seize additional storage media (see storage media section). Keep all media, including tower, away from magnets, radio transmitters and otherpotentially damaging elements.

8 Collect instruction manuals, documentation and notes. Document all steps involved in the seizure of a computer and components. Seesection on important investigative PRESERVATIONN etworked HomePersonal ComputerFor proper evidencepreservation, follow theseprocedures in order. Unplug power to router ormodem. Do not use computer or attemptto search for Evidence . Photograph computer front andback as well as cords andconnected devices, as surrounding area prior to moving any Evidence . If computer is off , do not turn on.

9 If computer is on and something is displayed on the monitor, photograph thescreen. If computer is on and the screen is blank, move mouse or press space bar(this will display the active image on the screen). After image appears,photograph the screen. Unplug power cord from back of tower. Diagram and label cords to later identifyconnected devices. Disconnect all cords and devices fromtower. Package components (includingrouter and modem)and transport /store components as fragile cargo. Seize additional storage media (see storage mediasection).

10 Keep all media, including tower, away from magnets, radiotransmitters and other potentially damaging elements. Collect instruction manuals, documentation and notes. Document all steps involved in the seizure of a computer and components. Seesection on important investigative PRESERVATIONS torage MediaStorage media is used to storedata from Electronic items may vary inmemory quantity. Collect instruction manuals,documentation and notes. Document all steps involved inseizure of storage media. Keep away from magnets, radiotransmitters and otherpotentially damaging Server /Business Network Consult a computer specialist for furtherassistance Secure the scene and do not let anyonetouch except personnel trained to handlenetwork systems.


Related search queries