Verified Document

Securing The Scene The Objective Of This Essay

Securing the Scene The objective of this study is to develop a plan to approach and secure an incident scene and discuss the initial steps taken for an investigation while explicating the importance of creating an order of volatility by identifying the potential evidence that is most volatile and explain how evidence would be extracted. This study will identify the high-level steps that would be performed in collecting and analyzing the evidence including the required steps and what should be avoided in order to maintain the admissibility of the evidence.

Securing the Scene

Securing the scene of a computer crime investigation requires that all electronic devices be secured including personal and portable devices and ensuring that no person unauthorized has access to any electronic devices found at the scene of the crime. The investigator should refuse anyone who offers to assist with anything technical in nature and should remove all individuals from the crime scene where evidence is being collected.

Latent evidence may be found on computer components and these should be preserved. If the computer is switched on or if the investigator is not sure, they should listen for the sounds of any fans running or any spinning drives or look to see if any lights are on. The investigator should also check for signs of remote access and for signs of any active communication, which includes web cams.
II. Documenting the Scene

The scenes should be documented through use of a video or photography and sketching that assist in recreating the details of the scene. Any activity and processes on computer display screens should be documented as well. Scene documentation should include: (1) the entire location; (2) the type, location and position of computers; (3) computer components and peripheral equipment; and (4) other electronic devices. ( )…

Sources used in this document:
Works Cited

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition (2008) National Institutes of Justice. 14 Apr 2008. Retrieved from: http://www.nij.gov/nij/publications/ecrime-guide-219941/ch5-evidence-collection/computers-components-devices.htm

Computer Crime Investigation and Computer Forensics. Information Systems Security, Summer 1997. Vol. 6 Issue 2. Retrieved from: http://www.moreilly.com/CISSP/DomA-2-Computer_Crime_investigation.pdf

Appendix A

Source: National Institutes of Justice (2008)
Cite this Document:
Copy Bibliography Citation

Related Documents

Crime Scene Investigations: Many Crime Scene Investigations
Words: 2150 Length: 7 Document Type: Term Paper

Crime Scene Investigations: Many crime scene investigations revolved around safeguarding the crime scenes, protecting physical evidence, and gathering and transferring the evidence for scientific evaluation. This process is based on the role that physical evidence plays in the overall investigation and determination of a suspected criminal activity. Notably, the ability for physical evidence to play its role in the overall investigation process is dependent on actions that are taken early enough

Scarface- Latin American Culture Scarface
Words: 4742 Length: 14 Document Type: Term Paper

Both films irritated their relevant critical establishments, and in this way, De Palma's remade was truest to its source. Scarface 1983 savagery and energy united with its political portrait of the illicit drug trade form a memorable and powerful evocation of 1980s narco-corruption (Prince 231). One of the most striking disparities amid the 1932 Scarface and 1983 Scarface is between Tony Camonte, who makes a fortune through selling bear, but

Forensic Evidence Chain of Custody and Preservation
Words: 1378 Length: 5 Document Type: Essay

Forensic Evidence Chain of Custody and Preservation of Evidence in the JonBenet Ramsey Murder Case The objective of this study is to discuss how criminalists protect evidence from contamination and to demonstrate appropriate techniques for handling evidence. This study will differentiate between latent and visible evidence and advocate for the necessity of proper procedures to uphold evidence findings. Specifically, this study will review a known criminal case involving chain of custody and

Near-Miss Crane Incident, As the
Words: 867 Length: 2 Document Type: Essay

I will inform my facility manager as soon as I have all the potential witnesses record their statement and most importantly the technical team that includes the engineers and the supervisor giving me the technical aspects of the whole incidence. This informing of my supervisor must however come before the arrival of the OSHA inspectors so that we both have a harmonized report and agreement on how we are to

Counseling Model a Practical Pastoral Counseling Model
Words: 3760 Length: 12 Document Type: Essay

Counseling Model A Practical Pastoral Counseling Model Counseling Setting Where Will Counseling Take Place? Boundaries for Safety and Security Relational Style Relational/Communication Style Structure/Strategy Sessions Summation Supportive Feedback God's Riches at Christ's Expense Annotated Bibliography A Practical Pastoral Counseling Model This is an overview of the counseling position that I will take when working with clients/parishioners. I realize that this cannot encompass every eventuality that may occur during a counseling session, but it should be comprehensive enough to account for most of the possibilities

Forensic Science
Words: 1913 Length: 7 Document Type: Essay

Essay Topic Examples 1. The Evolution and Impact of DNA Analysis in Forensic Science This essay will explore the revolutionary introduction of DNA analysis in forensic investigations. It will trace the origins of DNA fingerprinting, delve into the technical advancements that have made DNA evidence a linchpin in legal outcomes, and discuss the societal and ethical implications of such powerful technology. This topic will also highlight the role of DNA analysis in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now