What are the eight steps in documenting the computer crime scene?

What will be an ideal response?


Documenting the Scene

1. Both in the report and by video and photography identify the location, type of devices, their condition, and power status. Get views of all sides, including the backs, where cables are attached.
2. Record all activity and processes visible on the monitor.
3. Note all devices physically connected to the computer as well as the same for wireless components. Record their serial numbers, the content of "sticky notes" attached to them, and related written information.
4. Note the condition and power status of the computer's network access.
5. Document, photograph, and sketch all wires, cables, and devices connected to, or inserted in, the computer.
6. Tag every cable as to where each end was attached.
7. Document and photograph every wireless device in the locations at which they were found.
8. Document and photograph the locations of related evidence, such as printed pages of Internet addresses, financial records, images, computer code, GPSs/maps/directions, electronic money transfers, books on hacking, software packages, lists of computers accessed and dead drops, credit card information, reproductions of signatures, checks and money orders, diaries and calendars, mail in victims' names, cash, fictitious identification, passwords and information on encryption, and steganography. ("Steg" or "Stego" has been used for thousands of years. Historically, steg means writing in a cipher or code so that only the sender and the recipient know what the message means. In the context of computers, steg means hiding a file in a larger file so that others are not aware of its presence or meaning.)

Criminal Justice

You might also like to view...

The U.S. Supreme Court has held that a police officer may temporarily detain a person for questioning if the officer has reasonable suspicion that criminal activity may be involved. The person may also be patted down for weapons

This police action is known as: _____. a. consent search b. plain view search c. stop and frisk d. search incident to an arrest

Criminal Justice

Those who believe that abusers and addicts endanger society with their behavior and should be treated like any other criminals advocate which model of addiction?

A. Medical model of addiction B. Criminal model of addiction C. Social crime model D. Habitual drug abuser model

Criminal Justice

Bob has been incarcerated in California for the past five years. During his sentence, he could have monthly visits with his wife where they were given a private trailer on the prison grounds. Bob has been granted a ________ visit with his wife.

A. marriage B. rehabilitation C. conjugal D. spousal

Criminal Justice

Police departments regard the status of arresting a juvenile as a ________

Fill in the blank(s) with the appropriate word(s).

Criminal Justice