SlideShare a Scribd company logo
1 of 63
Crime Scene Investigation ,[object Object],[object Object],[object Object]
Conducting the High Tech Raid Planning Resource Collection Practice Review Execution
Crime Scene Investigation ,[object Object],[object Object],[object Object]
Evaluate the scene in advance.  ,[object Object]
Map the area.  LEGEND: 1) Drafting Table  2) File Cabinet  3) Desk 4) Computer 5) Printer 6) Computer 7) Bookshelves 9) Desk 10) Storage Cabinet 11) Chairs 10 9 8 7 3 1 2 11 11 4 5 6 11
Draw out the site or obtain a copy of the floor plan if available ,[object Object]
Determine the type and number of computers and media involved. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Plan what equipment you will need for the raid ,[object Object]
Obtain necessary Hardware/Software ,[object Object],[object Object]
Make sure you have all the items for your tool box, in advance.  ,[object Object]
Prepare a Check List ,[object Object]
Have necessary media for backups and copies.  ,[object Object],[object Object],[object Object],[object Object]
Unforeseen requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
. ,[object Object],[object Object]
Set up Investigative Teams.  ,[object Object],[object Object],[object Object]
Planning S ituation M ission E xecution A venues of approach and escape C ommunication
How to Create a Plan ,[object Object]
SMEAC ,[object Object],[object Object]
SMEAC  ,[object Object],[object Object]
SMEAC  ,[object Object],[object Object]
SMEAC  ,[object Object],[object Object]
SMEAC  ,[object Object],[object Object],[object Object]
  Computer Search Warrant Team ,[object Object]
Computer Search Warrant Team  ,[object Object]
Computer Search Warrant Team  ,[object Object]
Computer Search Warrant Team  ,[object Object]
Case Supervisor ,[object Object]
“ EXPERTS” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ EXPERTS” ,[object Object],[object Object],[object Object],[object Object],[object Object]
Interview Team ,[object Object]
Sketch & Photo Team ,[object Object]
Sketch & Photo Team  ,[object Object]
Note:  When using a video camera,  turn the sound off   ,[object Object],[object Object]
Physical Search Team ,[object Object]
Security and Arrest Team ,[object Object]
Technical Evidence Seizure and Logging Team ,[object Object]
Sketch & Photo Team  ,[object Object]
Sketch & Photo Team ,[object Object]
Sketch & Photo Team  ,[object Object]
Sketch & Photo Team ,[object Object]
Note:Consider skills in handling and recognition of evidence in picking team members.  ,[object Object],[object Object]
The Technical Evidence Seizure and Logging team  ,[object Object]
The Technical Evidence Seizure and Logging team  ,[object Object]
The Technical Evidence Seizure and Logging team ,[object Object]
Assemble the required personnel. ,[object Object],[object Object]
Assign team member responsibilities.  ,[object Object],[object Object]
Assign team member responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Establish a plan of attack.  ,[object Object]
Prepare the Search Warrant.  ,[object Object]
Prepare the Search Warrant.  ,[object Object]
Execute the Warrant  ,[object Object]
Knock and notice.  ,[object Object],[object Object],[object Object],[object Object]
Video Taping ,[object Object],[object Object]
Secure the Scene  ,[object Object],[object Object],[object Object]
Each computer must be physically protected by an officer.   ,[object Object]
Have a location to interview suspects and witnesses.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Teams perform their functions  ,[object Object],[object Object]
Reports are written by one member of each team.  ,[object Object]
Note:  ,[object Object],[object Object]
This bears repeating Document Document Document
Completing the Search  ,[object Object],[object Object],[object Object],[object Object]
Search and Seizure Law ,[object Object],[object Object]
Resources Excerpts from: Investigating Computer Crime Copywrite 1996 by CRC Press Written by Franklin Clark and Ken Diliberto

More Related Content

What's hot

Risk assessment form complete
Risk assessment form completeRisk assessment form complete
Risk assessment form completeJoshGmanMcLean
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware AnalysisPrashant Gupta
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paperBilal Hameed
 
Safety and security
Safety and securitySafety and security
Safety and securityPunita Thakur
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management SystemDaniel Suchy, CPP, MSyI
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 
Software testing course - Manual
Software testing course - ManualSoftware testing course - Manual
Software testing course - ManualPankaj Dubey
 
Validation and Verification
Validation and VerificationValidation and Verification
Validation and Verificationmrmwood
 
Credit Control Workflow Diagram
Credit Control Workflow DiagramCredit Control Workflow Diagram
Credit Control Workflow DiagramMeng Xu
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Special value testing
Special value testingSpecial value testing
Special value testingBapi Das
 

What's hot (20)

Risk assessment form complete
Risk assessment form completeRisk assessment form complete
Risk assessment form complete
 
Kevin mitnick
Kevin mitnickKevin mitnick
Kevin mitnick
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
Plan your security
Plan your securityPlan your security
Plan your security
 
Safety and security
Safety and securitySafety and security
Safety and security
 
Bomb threat
Bomb threatBomb threat
Bomb threat
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Software testing course - Manual
Software testing course - ManualSoftware testing course - Manual
Software testing course - Manual
 
Validation and Verification
Validation and VerificationValidation and Verification
Validation and Verification
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Credit Control Workflow Diagram
Credit Control Workflow DiagramCredit Control Workflow Diagram
Credit Control Workflow Diagram
 
Absenteeism
Absenteeism Absenteeism
Absenteeism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Tlc
TlcTlc
Tlc
 
Special value testing
Special value testingSpecial value testing
Special value testing
 

Viewers also liked

FIP 128 Ch01
FIP 128 Ch01FIP 128 Ch01
FIP 128 Ch01parkerjc
 
Chapter 10
Chapter 10Chapter 10
Chapter 10Joe
 
IMT Verification Report Summary
IMT Verification Report SummaryIMT Verification Report Summary
IMT Verification Report SummaryIAGorgph
 
Getting-away-with-murder
Getting-away-with-murderGetting-away-with-murder
Getting-away-with-murderKatharine Quarmby
 
COOP_Igor Nesterenko_Reference
COOP_Igor Nesterenko_ReferenceCOOP_Igor Nesterenko_Reference
COOP_Igor Nesterenko_ReferenceIgor Nesterenko
 
Office 1 summary report
Office 1 summary reportOffice 1 summary report
Office 1 summary reportguest87cb3bd
 
Jefflin Brochure
Jefflin BrochureJefflin Brochure
Jefflin Brochurejeffklin
 
Ancient greece murder mystery (3)
Ancient greece murder mystery (3)Ancient greece murder mystery (3)
Ancient greece murder mystery (3)Ainaramorales
 
5 Would you really_want_to_be_a_gladiator
5 Would you really_want_to_be_a_gladiator5 Would you really_want_to_be_a_gladiator
5 Would you really_want_to_be_a_gladiatorDB3igs
 
Wiki powerpoint
Wiki powerpointWiki powerpoint
Wiki powerpointOffice6
 
Trabajo de ingles.. gongora
Trabajo de ingles.. gongoraTrabajo de ingles.. gongora
Trabajo de ingles.. gongoramaryeugenne2929
 
4. murder of caesar
4. murder of caesar4. murder of caesar
4. murder of caesarDB3igs
 
Murder Mystery Game rules
Murder Mystery Game rulesMurder Mystery Game rules
Murder Mystery Game rulesmosaictraining
 
Murder in a country house
Murder in a country houseMurder in a country house
Murder in a country housemaryeugenne2929
 
Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene InvestigationLovable Raisin
 
Toshiba Investigation Report (Summary)
Toshiba Investigation Report (Summary)Toshiba Investigation Report (Summary)
Toshiba Investigation Report (Summary)asianextractor
 
The conclusion paragraph
The conclusion paragraphThe conclusion paragraph
The conclusion paragraphMATTHEW LAURENCE
 
Recommendation Report and Proposal Project
Recommendation Report and Proposal ProjectRecommendation Report and Proposal Project
Recommendation Report and Proposal ProjectAshley Taylor
 

Viewers also liked (20)

FIP 128 Ch01
FIP 128 Ch01FIP 128 Ch01
FIP 128 Ch01
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
IMT Verification Report Summary
IMT Verification Report SummaryIMT Verification Report Summary
IMT Verification Report Summary
 
Getting-away-with-murder
Getting-away-with-murderGetting-away-with-murder
Getting-away-with-murder
 
COOP_Igor Nesterenko_Reference
COOP_Igor Nesterenko_ReferenceCOOP_Igor Nesterenko_Reference
COOP_Igor Nesterenko_Reference
 
Office 1 summary report
Office 1 summary reportOffice 1 summary report
Office 1 summary report
 
Jefflin Brochure
Jefflin BrochureJefflin Brochure
Jefflin Brochure
 
Ancient greece murder mystery (3)
Ancient greece murder mystery (3)Ancient greece murder mystery (3)
Ancient greece murder mystery (3)
 
r87Homicide
r87Homicider87Homicide
r87Homicide
 
5 Would you really_want_to_be_a_gladiator
5 Would you really_want_to_be_a_gladiator5 Would you really_want_to_be_a_gladiator
5 Would you really_want_to_be_a_gladiator
 
Wiki powerpoint
Wiki powerpointWiki powerpoint
Wiki powerpoint
 
Trabajo de ingles.. gongora
Trabajo de ingles.. gongoraTrabajo de ingles.. gongora
Trabajo de ingles.. gongora
 
4. murder of caesar
4. murder of caesar4. murder of caesar
4. murder of caesar
 
Murder Mystery Game rules
Murder Mystery Game rulesMurder Mystery Game rules
Murder Mystery Game rules
 
Murder in a country house
Murder in a country houseMurder in a country house
Murder in a country house
 
A REVIEW OF BPAT
A REVIEW OF BPATA REVIEW OF BPAT
A REVIEW OF BPAT
 
Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene Investigation
 
Toshiba Investigation Report (Summary)
Toshiba Investigation Report (Summary)Toshiba Investigation Report (Summary)
Toshiba Investigation Report (Summary)
 
The conclusion paragraph
The conclusion paragraphThe conclusion paragraph
The conclusion paragraph
 
Recommendation Report and Proposal Project
Recommendation Report and Proposal ProjectRecommendation Report and Proposal Project
Recommendation Report and Proposal Project
 

Similar to Crime Scene Investigations

Criminal Investigative Team
Criminal Investigative TeamCriminal Investigative Team
Criminal Investigative TeamCTIN
 
Raidprep
RaidprepRaidprep
RaidprepCTIN
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxgitagrimston
 
Forensic Expert Cross Examination
Forensic Expert Cross ExaminationForensic Expert Cross Examination
Forensic Expert Cross Examinationivneetsingh
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdffeetshoemart
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsShanaAneevan
 
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...CODE BLUE
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics WorkshopTim Fletcher
 
Digital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdfDigital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdfChristopher Doman
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protectforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfnoelbuddy
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsPhil Huggins FBCS CITP
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection ProcessMichelle Singh
 

Similar to Crime Scene Investigations (20)

Criminal Investigative Team
Criminal Investigative TeamCriminal Investigative Team
Criminal Investigative Team
 
Raidprep
RaidprepRaidprep
Raidprep
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
 
Forensic Expert Cross Examination
Forensic Expert Cross ExaminationForensic Expert Cross Examination
Forensic Expert Cross Examination
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
 
Cyber
CyberCyber
Cyber
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
Digital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdfDigital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdf
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdf
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection Process
 

More from CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source ForensicsCTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Nra
NraNra
NraCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassCTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrimeCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 

More from CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Crime Scene Investigations

  • 1.
  • 2. Conducting the High Tech Raid Planning Resource Collection Practice Review Execution
  • 3.
  • 4.
  • 5. Map the area. LEGEND: 1) Drafting Table 2) File Cabinet 3) Desk 4) Computer 5) Printer 6) Computer 7) Bookshelves 9) Desk 10) Storage Cabinet 11) Chairs 10 9 8 7 3 1 2 11 11 4 5 6 11
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Planning S ituation M ission E xecution A venues of approach and escape C ommunication
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60. This bears repeating Document Document Document
  • 61.
  • 62.
  • 63. Resources Excerpts from: Investigating Computer Crime Copywrite 1996 by CRC Press Written by Franklin Clark and Ken Diliberto