Module 16: Securing and Evaluating the Scene
ensure the safety of all individuals at the scene and to protect the integrity
of all data, both conventional and electronic. All operations should comply
with and departmental policy, state, and local laws.
PROCEDURE:
- After securing the scene and all personnel on the scene,
- possible evidence, both traditional (physical) and electronic,
determined whether perishable evidence remains.
1. Secure and Evaluate the Scene Follow the jurisdictional policy to
safeguard the crime scene. This will require ensuring that all
individuals from the immediate area from which evidence is to be
obtained
2. 2. Conduct Preliminary Interviews Separate and identify all persons
(witnesses, Subjects, or others) at the scene and record their location
at time of entry.
TAKE NOTE: On keyboards, the computer mouse, CDs, or other
components, residual fingerprints or other physical traces may be
preserved. Chemicals used in processing latent prints may impair
equipment and data. Latent prints should then be collected after
electronic evidence recovery is complete.
3. Documenting the Scene By documentation of the Scene, a permanent
historical record of the scene is created. Reporting is a continuous
operation throughout the investigation.
PROCEDURE:
Initial documentation of the physical scene:
- Observe and record the physical scene, such as the position of the
cursor and the location of pieces relative to each other
- Document the computer system’s condition and position, including the
computer‟s power status (on, off, or in sleep mode). There are status
lights on most computers that show that the machine is on. Similarly,
the machine is presumably on if fan noise Is detected. In addition, if
the computer device is warm, it could also mean that it is on or has
recently been switched off.
- Identify relevant electronic components that will not be collected and
document them
- Photograph the entire scene as noted by the first responder to create a
visual record. Where possible, the complete room should be captured
with 360 degrees of coverage.
- Photograph the front of the computer as well as the screen of the
monitor and other items. Take written notes on what happens on the
display screen as well. Active programs can require videotaping
Evidence Collection
- A search warrant may include the search for and collection of evidence
at an electronic crime scene. Computer evidence must be treated
cautiously and in a way that maintains its evidentiary value, as all
other evidence. This applies not only to an object or device‟s physical
integrity, but also to the electronic data it holds.
- Recognize that there might be other forms of evidence, such as trace,
biological, or latent prints
STAND-ALONE AND LAPTOP COMPUTER EVIDENCE
- A computer not connected to a network or other computer is a „stand-
alone‟ personal computer.
- All actions you take and any modifications you find resulting from your
actions on the display, screen, printer, or other peripherals
- Make a note of the status of “off.”
- Mark all connectors and cable ends
- According to departmental procedures, record or log facts.
- Package the components as fragile cargo if transport is necessary.
PACKAGING, TRANSPORTATION, AND STORAGE
- Ensure that all electronic data obtained is correctly registered, labeled,
inventorized prior to packaging.
- Pay careful attention to latent or trace proof and take steps to maintain
it.
- In antistatic packaging, box magnetic media (paper or antistatic plastic
bags
- Stop the use of materials, such as regular plastic bags, that can
generate static electricity.
- proper labeling
note: A standard operating procedure (SOP) is intended to assist prosecutors
by providing the procedures and sequential actions to be performed in order
to prosecute cybercrime in a way that guarantees that the information
obtained in a court of law is admissible,