SlideShare uma empresa Scribd logo
1 de 65
Level 1 - Basic Investigations Part 4 – Evidence Collection and Seizure Criminal Justice Training Center
High Tech Evidence Collection and Seizure ,[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identification ,[object Object],[object Object],[object Object]
Identification – General Concepts ,[object Object],[object Object],[object Object],[object Object]
Identification – General Concepts You can take everything, take only what is subject to search warrant or you can take only data.  But…
Identification – General Concepts ,[object Object],[object Object],[object Object]
Identification – General Concepts ,[object Object],[object Object]
Identification – Types of Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification – Types of Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification – Types of Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification – Where to Look for It ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identification – Where to Look For It ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identification – Where to Look For It ,[object Object],[object Object]
Sample Evidence – Tower Computer Case
Sample Evidence - Monitor, Keyboard, and Mouse
Sample Evidence - Computer Media/Storage
Sample Evidence - Computer Media/Storage USB pocket disk 32MB IBM Microdrive 1GB, 500/340 MB
Sample Evidence - Computer Media/Storage “ Thumb Drives” up to 128MB “Disk-on-Key” unit
Sample Evidence - Card Readers USB Pocket DigiDrive.  Reads multiple media sources, smart cards etc..
Sample Evidence - Magnetic Readers Mini-Mag Magstripe reader (PMR 102)
Sample Evidence - Computer peripherals
Sample Evidence - Flat Plate Scanner
Sample Evidence - Computer Cases
Sample Evidence - Computer Cases
Sample Evidence Area Sometimes they can never be separated from their computer.
Preservation and Collection ,[object Object],[object Object],[object Object]
Preservation ,[object Object],[object Object]
Preservation ,[object Object],[object Object],[object Object]
Preservation ,[object Object],[object Object],[object Object]
Preservation – Fragility of Evidence ,[object Object],[object Object]
Preservation – Fragility of Evidence ,[object Object],[object Object],[object Object],[object Object]
Preservation – Fragility of Evidence ,[object Object],[object Object]
Preservation – Hacker systems When you have a case involving a computer as the object or means of committing a crime, remember that a program running in memory might be the evidence of your crime.
Preservation – Special Environments ,[object Object],[object Object],[object Object]
Preservation – Basic Rules ,[object Object],[object Object]
Preservation – Basic Rules ,[object Object],[object Object],[object Object]
Preservation – Evaluating Conditions ,[object Object],[object Object],[object Object]
Preservation – Evaluating Conditions ,[object Object],[object Object],[object Object]
Preservation – Evaluating Conditions ,[object Object],[object Object]
Preservation – Evaluating Conditions ,[object Object],[object Object],[object Object]
Preservation – Urban Legend? The possible presence of degaussing (magnets) equipment placed in the crime scene by the suspect.  Evidence being lost due the presence of large degaussing hardware hidden in a doorway and operated by a wall switch. Hmm,…not likely.
Collection – Chronological Worksheet ,[object Object],[object Object],[object Object]
Collection – Chronological Worksheet ,[object Object],[object Object],[object Object]
Collection - Photographing ,[object Object],[object Object],[object Object]
Collection - Photographing ,[object Object],[object Object]
It is the small stuff that can create problems sometimes…
Collection - Photographing ,[object Object],[object Object]
Someone wanted this one dead…
Collection ,[object Object],[object Object]
Collection If you are seizing more than one computer system first number the computers and then tag the cables and hardware using the computer number.
Collection - Transport ,[object Object],[object Object]
Collection - Transport ,[object Object],[object Object]
Collection - Transport ,[object Object],[object Object]
Collection - Transport ,[object Object],[object Object]
Collection – Golden Rules ,[object Object],[object Object],[object Object],[object Object]
What is ‘Chain of Evidence’? ,[object Object],[object Object]
Maintaining the Chain of Evidence ,[object Object],[object Object],[object Object]
Presenting the Chain of Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presenting the Chain of Evidence ,[object Object],[object Object],[object Object],[object Object]
Presenting the Chain of Evidence ,[object Object],[object Object],[object Object],[object Object]
Evidence Storage Guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object]
Storage Containers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object]
 

Mais conteúdo relacionado

Mais procurados

Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Fatal Fire Investigation (Forensic Science)
Fatal Fire Investigation (Forensic Science)Fatal Fire Investigation (Forensic Science)
Fatal Fire Investigation (Forensic Science)
Jorge Pinto
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
Sudeshna Basak
 
Crime Scenc Investigation Evidence Collection
Crime Scenc Investigation  Evidence CollectionCrime Scenc Investigation  Evidence Collection
Crime Scenc Investigation Evidence Collection
heasulli
 

Mais procurados (20)

Death Scene Investigation
Death Scene InvestigationDeath Scene Investigation
Death Scene Investigation
 
Forensic science investigators
Forensic science investigatorsForensic science investigators
Forensic science investigators
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Torture
TortureTorture
Torture
 
crime scene investigation
crime scene investigationcrime scene investigation
crime scene investigation
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic science
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Introduction of ICT and legal research :
Introduction of ICT and legal research :Introduction of ICT and legal research :
Introduction of ICT and legal research :
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
 
Fatal Fire Investigation (Forensic Science)
Fatal Fire Investigation (Forensic Science)Fatal Fire Investigation (Forensic Science)
Fatal Fire Investigation (Forensic Science)
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Crime Scenc Investigation Evidence Collection
Crime Scenc Investigation  Evidence CollectionCrime Scenc Investigation  Evidence Collection
Crime Scenc Investigation Evidence Collection
 
6.1 categories of international crime
6.1 categories of international crime6.1 categories of international crime
6.1 categories of international crime
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 

Destaque

Primera carrera ucv 10 y 5 km copa direccion deporte
Primera carrera ucv 10 y 5 km copa direccion deportePrimera carrera ucv 10 y 5 km copa direccion deporte
Primera carrera ucv 10 y 5 km copa direccion deporte
CarreraycaminataUCV
 
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingEvidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
CTIN
 
Prezentare a agentiei Connect Promotion
Prezentare a agentiei Connect PromotionPrezentare a agentiei Connect Promotion
Prezentare a agentiei Connect Promotion
Alin Stoica
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
CTIN
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
CTIN
 
Douville Resume Generic
Douville Resume GenericDouville Resume Generic
Douville Resume Generic
Sean Douville
 
K Ai
K AiK Ai
K Ai
CTIN
 
Gerencia estrategica en Pymes
Gerencia estrategica en PymesGerencia estrategica en Pymes
Gerencia estrategica en Pymes
Ramiro Arteaga
 
Mathematical modeling in the diagnosis of cancer
Mathematical modeling in the diagnosis of cancerMathematical modeling in the diagnosis of cancer
Mathematical modeling in the diagnosis of cancer
Himani Asija
 

Destaque (17)

Primera carrera ucv 10 y 5 km copa direccion deporte
Primera carrera ucv 10 y 5 km copa direccion deportePrimera carrera ucv 10 y 5 km copa direccion deporte
Primera carrera ucv 10 y 5 km copa direccion deporte
 
Pasantia
PasantiaPasantia
Pasantia
 
Shase - profile
Shase - profileShase - profile
Shase - profile
 
Page0001
Page0001Page0001
Page0001
 
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingEvidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
 
Prezentare a agentiei Connect Promotion
Prezentare a agentiei Connect PromotionPrezentare a agentiei Connect Promotion
Prezentare a agentiei Connect Promotion
 
Mi contexto de formacion
Mi contexto de formacionMi contexto de formacion
Mi contexto de formacion
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 
Gestion del Talento
Gestion del TalentoGestion del Talento
Gestion del Talento
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
Douville Resume Generic
Douville Resume GenericDouville Resume Generic
Douville Resume Generic
 
In thenameofallah
In thenameofallahIn thenameofallah
In thenameofallah
 
K Ai
K AiK Ai
K Ai
 
Gestion de talento humano
Gestion de talento humanoGestion de talento humano
Gestion de talento humano
 
Gerencia estrategica en Pymes
Gerencia estrategica en PymesGerencia estrategica en Pymes
Gerencia estrategica en Pymes
 
S ramanujan
S ramanujanS ramanujan
S ramanujan
 
Mathematical modeling in the diagnosis of cancer
Mathematical modeling in the diagnosis of cancerMathematical modeling in the diagnosis of cancer
Mathematical modeling in the diagnosis of cancer
 

Semelhante a Bag and Tag

Evidence Seizure Sandyb
Evidence Seizure SandybEvidence Seizure Sandyb
Evidence Seizure Sandyb
CTIN
 
Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level One
CTIN
 
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version Draft
CTIN
 
Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence Seizure
CTIN
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
pable2
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
Cell Site Analysis (CSA)
 

Semelhante a Bag and Tag (20)

Evidence Seizure Sandyb
Evidence Seizure SandybEvidence Seizure Sandyb
Evidence Seizure Sandyb
 
Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level One
 
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version Draft
 
Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence Seizure
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
Ch 3C Processing Crime and Incident Scenes.ppt
Ch 3C Processing Crime and Incident Scenes.pptCh 3C Processing Crime and Incident Scenes.ppt
Ch 3C Processing Crime and Incident Scenes.ppt
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
BASICS OF INVESTIGATION OF CYBER CRIME CASES.pptx
BASICS OF INVESTIGATION OF CYBER CRIME CASES.pptxBASICS OF INVESTIGATION OF CYBER CRIME CASES.pptx
BASICS OF INVESTIGATION OF CYBER CRIME CASES.pptx
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic Methodologies
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 

Mais de CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Nra
NraNra
Nra
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 
Raidprep
RaidprepRaidprep
Raidprep
CTIN
 

Mais de CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Raidprep
RaidprepRaidprep
Raidprep
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Bag and Tag

  • 1. Level 1 - Basic Investigations Part 4 – Evidence Collection and Seizure Criminal Justice Training Center
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Identification – General Concepts You can take everything, take only what is subject to search warrant or you can take only data. But…
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Sample Evidence – Tower Computer Case
  • 16. Sample Evidence - Monitor, Keyboard, and Mouse
  • 17. Sample Evidence - Computer Media/Storage
  • 18. Sample Evidence - Computer Media/Storage USB pocket disk 32MB IBM Microdrive 1GB, 500/340 MB
  • 19. Sample Evidence - Computer Media/Storage “ Thumb Drives” up to 128MB “Disk-on-Key” unit
  • 20. Sample Evidence - Card Readers USB Pocket DigiDrive. Reads multiple media sources, smart cards etc..
  • 21. Sample Evidence - Magnetic Readers Mini-Mag Magstripe reader (PMR 102)
  • 22. Sample Evidence - Computer peripherals
  • 23. Sample Evidence - Flat Plate Scanner
  • 24. Sample Evidence - Computer Cases
  • 25. Sample Evidence - Computer Cases
  • 26. Sample Evidence Area Sometimes they can never be separated from their computer.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Preservation – Hacker systems When you have a case involving a computer as the object or means of committing a crime, remember that a program running in memory might be the evidence of your crime.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Preservation – Urban Legend? The possible presence of degaussing (magnets) equipment placed in the crime scene by the suspect. Evidence being lost due the presence of large degaussing hardware hidden in a doorway and operated by a wall switch. Hmm,…not likely.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. It is the small stuff that can create problems sometimes…
  • 48.
  • 49. Someone wanted this one dead…
  • 50.
  • 51. Collection If you are seizing more than one computer system first number the computers and then tag the cables and hardware using the computer number.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.