Securing The Scene The Objective Of This Essay

PAGES
2
WORDS
641
Cite

Securing the Scene The objective of this study is to develop a plan to approach and secure an incident scene and discuss the initial steps taken for an investigation while explicating the importance of creating an order of volatility by identifying the potential evidence that is most volatile and explain how evidence would be extracted. This study will identify the high-level steps that would be performed in collecting and analyzing the evidence including the required steps and what should be avoided in order to maintain the admissibility of the evidence.

Securing the Scene

Securing the scene of a computer crime investigation requires that all electronic devices be secured including personal and portable devices and ensuring that no person unauthorized has access to any electronic devices found at the scene of the crime. The investigator should refuse anyone who offers to assist with anything technical in nature and should remove all individuals from the crime scene where evidence is being collected.

...

Latent evidence may be found on computer components and these should be preserved. If the computer is switched on or if the investigator is not sure, they should listen for the sounds of any fans running or any spinning drives or look to see if any lights are on. The investigator should also check for signs of remote access and for signs of any active communication, which includes web cams.
II. Documenting the Scene

The scenes should be documented through use of a video or photography and sketching that assist in recreating the details of the scene. Any activity and processes on computer display screens should be documented as well. Scene documentation should include: (1) the entire location; (2) the type, location and position of computers; (3) computer components and peripheral equipment; and (4) other electronic devices. ( )…

Sources Used in Documents:

Works Cited

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition (2008) National Institutes of Justice. 14 Apr 2008. Retrieved from: http://www.nij.gov/nij/publications/ecrime-guide-219941/ch5-evidence-collection/computers-components-devices.htm

Computer Crime Investigation and Computer Forensics. Information Systems Security, Summer 1997. Vol. 6 Issue 2. Retrieved from: http://www.moreilly.com/CISSP/DomA-2-Computer_Crime_investigation.pdf

Appendix A

Source: National Institutes of Justice (2008)


Cite this Document:

"Securing The Scene The Objective Of This" (2013, August 10) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/securing-the-scene-the-objective-of-this-94385

"Securing The Scene The Objective Of This" 10 August 2013. Web.16 April. 2024. <
https://www.paperdue.com/essay/securing-the-scene-the-objective-of-this-94385>

"Securing The Scene The Objective Of This", 10 August 2013, Accessed.16 April. 2024,
https://www.paperdue.com/essay/securing-the-scene-the-objective-of-this-94385

Related Documents

Crime Scene Investigations: Many crime scene investigations revolved around safeguarding the crime scenes, protecting physical evidence, and gathering and transferring the evidence for scientific evaluation. This process is based on the role that physical evidence plays in the overall investigation and determination of a suspected criminal activity. Notably, the ability for physical evidence to play its role in the overall investigation process is dependent on actions that are taken early enough

As a result, if an illegitimate interrogation or investigation contributes to the identification of physical evidence, the investigation and physical evidence must be excluded from trial. In this case, the interrogation or investigation is excluded on the basis of the exclusionary rule while the physical evidence is excluded on the basis that it's the fruit or product of illegal interrogation. The significance of the exclusionary and the fruit of poisonous

Having experienced firsthand the reprieve his profession offers, the barometer of his success is simple, if there was no pain and no lingering side effects, then there was success. Surgical Technologist I was also able to interview the surgical technologist. She occupied many of the duties I had always believed were held by the head nurse. In fact the role of the surgical technologist entails not only having a detailed knowledge

Self-Assessment The initial step starts with self-assessment. Various territories of self information are imperative in establishing a framework for a career plan. I initially need to comprehend my particular identity e.g. Am I active or bashful, latent or forceful, mindful or passionate. What's more, I should be clear about my mentalities toward life and work. For instance, an inspirational state of mind about work characterizes who I am and may turn

.." therefore the ADF "will work from a 'whole of government' approach and often in collation with other countries and militaries to provide the outcomes that are needed to meet modern security challenges." (Cosgrove, 2005; p. 3) Cosgrove relates that there are many other agencies "intimately involved in preserving our security, be they law enforcement, border protection, intelligence or other civil authorities and a comprehensive, that is, an enduring solution

Count 3996 Most Important
PAGES 13 WORDS 4005

They also had the power to decide the merits of evidence and arguments. In the 19th century, judges gained greater control over juries and the role of juries became what it is currently; hearing evidence presented on both sides and determining the guilt or innocence of the accused. The advantages of the jury system lie in the foundational elements articulated and supported by amendments and the Supreme Court. The Sixth