SlideShare a Scribd company logo
1. Stock Valuation: A stock has an initial price of $100 per
share, paid a dividend of $2.00 per share during the year, and
had an ending share price of $125. Compute the percentage total
return, capital gains yield, and dividend yield.
2. Total Return: You bought a share of 4% preferred stock for
$100 last year. The market price for your stock is now $120.
What was your total return for last year?
3. CAPM: A stock has a beta of 1.20, the expected market rate
of return is 12%, and a risk-free rate of 5 percent. What is the
expected rate of return of the stock?
4. WACC: The Corporation has a targeted capital structure of
80% common stock and 20% debt. The cost of equity is 12%
and the cost of debt is 7%. The tax rate is 30%. What is the
company's weighted average cost of capital (WACC)?
5. Flotation Costs: Medina Corp. has a debt-equity ratio of .75.
The company is considering a new plant that will cost $125
million to build. When the company issues new equity, it incurs
a flotation cost of 10%. The flotation cost on new debt is 4%.
What is the initial cost of the plant if the company raises all
equity externally?
(125 – 100) + 2.00 / 100 = .27 or 27%
(125-100) / 100 = .25 or 25%
2.00 / 100 = .02 or 2%
rF= 5%
Beta= 1.20
Expected market return= 12%
=5 + 1.20 (12 – 5) = 43.4%
Where:
Re = cost of equity = .12
Rd = cost of debt = .07
E = market value of the firm's equity = .80
D = market value of the firm's debt = .20
V = E + D = total market value of the firm’s financing (equity
and debt) = .80 + .20
E/V = percentage of financing that is equity = .80 / (.80+.20)
D/V = percentage of financing that is debt .20 / (.80+.20)
Tc = corporate tax rate = .30
WACC = (.80/1) * .12 + (.20/1) * 7 * (1 – .30) = .8 * .12 + .2 *
.07 * .7 = .0145 or 1.45
U.S. Department of Justice
Office of Justice Programs
National Institute of Justice
Electronic Crime Scene Investigation: An
On-the-Scene Reference for First Responders
www.ojp.usdoj.gov/nij
nov. 09
U.S. Department of Justice
Office of Justice Programs
810 Seventh Street N.W.
Washington, DC 20531
Eric H. Holder, Jr.
Attorney General
Laurie O. Robinson
Acting Assistant Attorney General
Kristina Rose
Acting Director, National Institute of Justice
This and other publications and
products of the National Institute
of Justice can be found at:
National Institute of Justice
www.ojp.usdoj.gov/nij
Office of Justice Programs
Innovation • Partnerships
Safer Neighborhoods
www.ojp.usdoj.gov
Cover photograph
copyright© 2001
PhotoDisc, Inc.
NCJ 227050
Electronic Crime Scene
Investigation: An On-the-Scene
Reference for First Responders
nov. 09
This flipbook is a companion piece to
Electronic Crime Scene Investigation:
A Guide for First Responders, Second
Edition. Use the flipbook only after
you have reviewed the contents of the
Guide at http://www.ojp.usdoj.gov/nij/
pubs-sum/219941.htm.
Kristina Rose
Acting Director
National Institute of Justice
iii
The flipbook was updated by the Electronic Crime
Partnership Initiative (ECPI), a program established by
the National Institute of Justice to build the capacity of
state and local law enforcement to prevent, investigate
and prosecute electronic crime and identify, collect,
preserve and examine digital evidence.
This publication does not create, is not intended to
create, and may not be relied upon to create any
rights, substantive or procedural, enforceable as law
by any party in any matter civil or criminal. Opinions or
points of view expressed in this document represent
a consensus of ECPI members and do not necessarily
represent the official position or policies of the U.S.
Department of Justice.
The National Institute of Justice is a component of the
Office of Justice Programs, which also includes the
Bureau of Assistance; the Bureau of Justice Statistics;
the Community Capacity Development Office; the
Office for Victims of Crime; the Office of Juvenile
Justice and Delinquency Prevention; and the Office of
Sex Offender Sentencing, Monitoring, Apprehending,
Registering, and Tracking (SMART).
iv
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . vi
Electronic Devices: Types, Description and
Potential Evidence . . . . . . . . . . . . . . . . . . . . . .
. . . . 1
Computer Systems . . . . . . . . . . . . . . . . . . . . . . . . 1
Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Handheld Devices . . . . . . . . . . . . . . . . . . . . . . . . . 3
Peripheral Devices . . . . . . . . . . . . . . . . . . . . . . . . . 3
Computer Networks . . . . . . . . . . . . . . . . . . . . . . . . 4
Sources of Potential Digital Evidence in
Electronic Devices . . . . . . . . . . . . . . . . . . . . . . . . . 5
Securing and Evaluating the Scene . . . . . . . . . . . . 6
Preliminary Interviews . . . . . . . . . . . . . . . . . . . . . . 8
Documenting the Scene . . . . . . . . . . . . . . . . . . . .
. 9
Evidence Collection . . . . . . . . . . . . . . . . . . . . .
. . . 11
Assess the Situation. . . . . . . . . . . . . . . . . . . . . . . 12
Packaging and Transporting Digital Evidence . . 21
Packaging Procedures . . . . . . . . . . . . . . . . . . . . . 21
Transportation Procedures . . . . . . . . . . . . . . . . . . 22
v
Electronic Crime and Digital Evidence
Considerations by Crime Category . . . . . . . . . . . 23
Child Abuse and/or Exploitation . . . . . . . . . . . . . . 23
Computer Intrusion . . . . . . . . . . . . . . . . . . . . . . . . 24
Counterfeiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Death Investigations . . . . . . . . . . . . . . . . . . . . . . . 26
Domestic Violence, Threats and Extortion . . . . . . 27
E-mail Threats, Harassment and/or Stalking . . . . . 28
Gambling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Identity Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Narcotics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Online Fraud and/or Economic Fraud . . . . . . . . . . 32
Prostitution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Software Piracy . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Telecommunication Fraud . . . . . . . . . . . . . . . . . . 35
Terrorism (Homeland Security) . . . . . . . . . . . . . . 36
Other Potential Sources of Evidence . . . . . . . . . . 37
Information to Document to Assist the
Forensic Examination . . . . . . . . . . . . . . . . . . . .
. . 40
vi
Introduction
This flipbook is intended as a quick reference for
first responders who may be responsible for ident-
ifying, preserving, collecting and securing evidence
at an electronic crime scene. It is a companion
piece to Electronic Crime Scene Investigation: A
Guide for First Responders, Second Edition, from
which it is excerpted.
Use this flipbook only after you have reviewed
and familiarized yourself with the contents of
Electronic Crime Scene Investigation, which is
available for free download at http://www.ojp.
usdoj.gov/nij/pubs-sum/219941.htm.
Consider agency protocols; federal, state and local
laws; and prevailing technology when applying the
information in this flipbook.
1
Electronic Devices: Types,
Description and Potential Evidence
Computer Systems
• Laptops
• Desktop systems
• Tower computers
• Rack-mounted systems
• Minicomputers
• Mainframe systems
A computer system’s hardware
is likely to include:
• A case containing circuit boards,
microprocessors,
hard drive, memory and interface connections.
• A monitor or video display device.
• A keyboard and mouse.
• Peripheral devices such as external hard drives,
modems, printers, scanners, routers and
docking stations.
2
Storage Devices
• Hard drives (whether loose or connected to
the
system).
• External hard drives (generally require a power
supply and a connection to the computer system).
• Removable media, e.g., cartridges or disk-based
data storage devices.
• Thumb or flash drives: Small, lightweight,
remov-
able data storage devices with USB connections.
Can be found as part of, or disguised as, any
number of common or unique devices, e.g., wrist-
watch or Swiss Army Knife.
• Memory cards: Small data storage devices
com-
monly used with digital cameras, computers,
mobile phones, digital music players, personal
digital assistants (PDAs) and video game consoles.
02-Flip Book Text.indd 2 11/16/09 9:31:43 AM
3
Handheld Devices
• PDAs
• Digital multimedia devices
• Pagers
• Digital cameras
• Global positioning satellite (GPS) receivers
• Mobile and smart phones
Peripheral Devices
Equipment that can be attached or connected
to a computer.
• Modems
• Routers
• Printers
• Scanners
• Docking stations
4
Computer Networks
• Twoor more computer systems linked by data
cables or by wireless connections to enable
them to share resources and data.
• Often include printers and data-routing devices
such as hubs, switches and routers.
5
Sources of Potential Digital Evidence
in Electronic Devices
• The device and its components.
• The function(s) it performs or facilitates.
• Software,documents, photos, image files,e-mail
and attachments, databases, financial information,
Internet browsing history, chat logs, buddy lists
and event logs.
• Information stored on the device regarding its
use, e.g., incoming and outgoing phone and fax
numbers and recently scanned, faxed or printed
documents.
• Identifying information associatedwith the
computer system, e.g., Internet protocol (IP)
and local area network (LAN) addresses,broad-
cast settings, and media access card (MAC) or
network interface card (NIC) addresses.
Electronic devices also may hold latent evidence such
as fingerprints, DNA or other physical evidence that
should be preserved.
See page 37 for other potential sources of
evidence.
02-Flip Book Text.indd 5 11/16/09 9:31:43 AM
6
Securing and Evaluating
the Scene
Document, photograph, and secure digital evidence
at the scene as soon as possible.
When securing and evaluating the scene:
• Do not alter the state of an electronic device. If
a computer or an electronic device is off, leave
it off.
• Remove all unauthorized persons from the area
where evidence is to be collected.
• Identify, seizeand secure all electronic devices,
including personal or portable devices.
• Recognize potential digital evidence in
telephones,
digital video recorders, other household appliances
and motor vehicles.
7
If the computer is on or the power state cannot
be determined:
• Look and listen for indications that the
computer
is on — e.g., fans running, drives spinning and lit
light-emitting diodes (LEDs).
• If you cannot determine the power state of
the
computer, observe the monitor to determine if it
is on, off or in sleep mode.
• Check display screen for signsof data
destruction.
Lookout for words such as “delete,” “format,”
“remove,”“copy,” “move,” “cut” or “wipe.”
• Look for indications that the computer is
being
accessed remotely and/or signs of ongoing com-
munications with other computers or users — e.g.,
Instant Messaging (IM) windows or chat rooms.
• Take note of all cameras and determine
whether
they are active.
Proceed to page 12.
02-Flip Book Text.indd 7 11/16/09 9:31:44 AM
8
Preliminary Interviews
Separate and identify all adults of interest and
record the location they occupied when you entered
the scene. Obtain the following information from
interviewee(s):
• Purpose of computersand devices.
• All usersof the computersand devices.
• Type of Internet access and Internet service
provider.
• Computer and Internet user information —
e.g.,
login names, user account names and passwords,
and Instant Message screen names.
• E-mail and Web mail (Web-based e-mail)
accounts
and personal Web pages.
• Account information for online social
networking
Web sites — e.g., MySpace, Facebook.
• All security provisions, data access restrictions,
destructive devices or software in use.
• Any automatedapplications in use.
• Any otherrelevant information.
9
Documenting the Scene
Your documentation should include:
• The type, location, position, condition and power
status of the device.
• A record of all activity and processes visible
on the
display screen(s).
• A record of all physical connections to
and from
the computers and other devices.
• A record of any network and wireless
components
capable of linking devices to each other and the
Internet.
• The type, condition and power status of the
device’s Internet and network access.
• Video, photos, notes and sketches to assist
in
recreating/conveying the details of the scene.
Some computer systems and electronic devices —
and the information they contain — may be protected
under applicable laws, agency policies or other
02-Flip Book Text.indd 9 11/16/09 9:31:44 AM
10
factors, that may prohibit collection of these devices
or components. However, do include the location,
condition and power state of these devices in your
documentation.
Movement of a running computer or electronic
device may cause changes or damage to the com-
puter or device or the digital evidence it contains.
Computers and electronic devices should not be
moved until it is determined that they are powered
off.
11
Evidence Collection
Handling digital evidence correctly is essential to
preserving the integrity of the physical device as
well as the information or data it contains. Turning
off the power to a computer or other electronic
device may cause the information or data stored
on it to be damaged or lost.
If you are not trained in handling digital
evidence —
• Do not attempt to explore the contents of a
computer or other electronic device or to
recover information from it.
• Do not alter the state of a computer or other
electronic device.
• Do not pressany keys or click the mouse.
• If the computer or device is off, leave it
off.
• Do not move a computer or otherelectronic
device that is powered on.
12
• Do not accept offers of help or technical
assis-
tance from unauthorized persons.
• DO request technical assistance from personnel
with advanced equipment and training in digital
evidence collection. See http://www.ecpi-us.
org/Technicalresources.html for a list of available
resources.
Assess the Situation
Before seizing digital evidence, make sure you
have
the legal authority to do so. Improper access to
information or data stored on electronic devices
may violate provisions of federal laws.
After securing the scene and identifying the comput-
er’s power status (p. 6), follow the steps listed below
for the situation most like your own.
Situation 1: Monitor is on. Program, application,
work product, picture, e-mail or Internet site is
displayed.
1. Photograph screen and record information
displayed.
2. Proceed to “If the Computer Is ON” (p. 19).
02-Flip Book Text.indd 12 11/16/09 9:31:44 AM
13
Situation 2: Monitor is on. Screen saver or
picture is visible.
1. Move mouse slightly without depressing buttons
or rotating wheel if present.
2. Note any onscreen activity that causes a change in
the display.
3. Photograph screen and record information
displayed.
4. Proceed to “If the Computer Is ON” (p. 19).
Situation 3: Monitor is on. Display is blank.
1. Move mouse slightly without depressing buttons
or rotating wheel if present.
2. Display changes to login screen, work product, or
other visible display.
3. Note change in display.
4. Photograph screen and record information
displayed.
5. Proceed to “If the Computer Is ON” (p. 19).
02-Flip Book Text.indd 13 11/16/09 9:31:44 AM
14
Situation 4a: Monitor is off. Display is blank.
1. If monitor’s power switch is in off position, turn
monitor on.
2. Display changes to a login screen, work
product or other visible display.
3. Note change in the display.
4. Photograph screen and record information
displayed.
5. Proceed to “If the Computer Is ON” (p. 19).
Situation 4b: Monitor is off. Display is blank.
1. If monitor’s power switch is in off position, turn
monitor on.
2. Display does not change. Screen remains
blank.
3. Note that the display does not change.
4. Photograph blank screen.
5. Proceed to “If the Computer Is OFF” (p. 16).
02-Flip Book Text.indd 14 11/16/09 9:31:44 AM
15
Situation 5: Monitor is on. Display is blank.
1. Move mouse slightly without depressing any
buttons or rotating the wheel if present.
2. If display does not change, confirm that power is
supplied to the monitor.
3. If display remains blank, check computer case for
active lights and listen for fans spinning or other
indications computer is on.
4. If computer case gives no indication that it is
powered on, proceed to “If the Computer Is OFF”
(p. 16).
02-Flip Book Text.indd 15 11/16/09 9:31:44 AM
16
If the Computer Is OFF
For desktop, tower and minicomputers follow
these steps:
1. Document, photograph, and sketch all wires,
cables, and devices connected to the computer.
2. Uniquely label and photograph the power supply
cord and all cables, wires or USB drives attached
to the computer and the connection each of these
occupies on the computer.
3. Remove and secure the power supply cord from
the back of the computer and from the wall outlet,
power strip or battery backup device.
4. Disconnect and secure all cables, wires and USB
drives from the computer and document the
device or equipment connected at the opposite
end.
5. Place tape over the floppy disk slot if present. En-
sure that the CD or DVD drive trays are retracted
into place and tape across the drive tray to prevent
it from opening.
6. Place tape over the power switch.
02-Flip Book Text.indd 16 11/16/09 9:31:44 AM
17
If the Computer Is OFF (continued)
7. Record the make, model, serial numbers and
any user-applied markings or identifiers.
8. Record or log computer and all cords, cables,
wires, devices and components according to
agency procedures.
9. Carefully package all evidence collected to prevent
damage or alteration during transportation and
storage.
18
For laptop computers follow these steps:
1. Document, photograph and sketch all wires, cables
and devices connected to the laptop.
2. Uniquely label and photograph all wires, cables and
devices connected to the laptop and the connec-
tion each occupies.
3. Remove and secure the power supply and all bat-
teries from the laptop computer.
4. Disconnect and secure all cables, wires, and USB
drives from the laptop and document the equip-
ment or device connected at the opposite end.
5. Place tape over the floppy disk slot if present.
Ensure that the CD or DVD drive trays are retracted
into place and tape across the drive tray to prevent
it from opening.
6. Place tape over the power switch.
7. Record the make, model, serial numbers and any
user-applied markings or identifiers.
8. Record or log the laptop computer and all cords,
cables, wires, devices and components according
to agency procedures.
9. Carefully package all evidence collected to prevent
damage or alteration during transportation and
storage.
19
If the Computer Is ON
Removing the power supply is generally the safest
option. If evidence of a crime is visible on the com-
puter display, however, request assistance from
personnel with experience in volatile data capture
and preservation (see http://www.ecpi-us.org/
Technicalresources.html).
Immediate disconnection of power is
recommended when —
• Information or activity on screen indicates
that
information or data is being deleted or overwritten.
• A destructive process appears to be in
progress
on the computer’s data storage device(s).
• The system is powered on in a typical
Microsoft
Windows® environment. Pulling the power supply
cord from the back of the computer will preserve
information about the last user account logged in,
login time, most recently used documents, most
recently used commands, and other valuable
information.
02-Flip Book Text.indd 19 11/16/09 9:31:45 AM
20
Immediate disconnection of power is NOT
recommended when —
• Information or data of apparent evidentiary
value is
in plain view onscreen. Seek assistance from per-
sonnel with advanced training in digital evidence
collection.
• Indications exist that any of the following are
active or in use: Chat room(s), text documents,
remote data storage, Instant Messaging (IM), child
pornography, contraband, financial documents,
data encryption and obvious illegal activities.
• The device is a mobile or smart phone.
Leave
mobile and smart phones in the power state in
which they were found.
Improper shutdown of mainframe computers, servers
or a group of networked computers may result in the
loss of data, loss of evidence and potential civil liability.
Secure the scene and request assistance from person-
nel with advanced training in digital evidence collection
of large or complex computer systems (see http://
www.ecpi-us.org/Technicalresources.html).
02-Flip Book Text.indd 20 11/16/09 9:31:45 AM
21
Packaging and Transporting
Digital Evidence
Packaging Procedures
• Ensure that all digital evidence collected is
prop-
erly documented, labeled, marked, photographed,
video recorded or sketched and inventoried.
Properly label connections and connected devices
to facilitate reassembly of the system later.
• Protect any latent, trace or biological evidence
con-
tained on the digital evidence. Photograph digital
evidence before conducting latent, trace or biological
evidence processes on the evidence.
• Pack all digital evidence in antistatic
packaging.
Plastic bags and containers can produce static
electricity and allow the development of humidity
and condensation that can damage or destroy
digital evidence.
• Package digital evidence in a manner that
will
prevent it from being bent, scratched or otherwise
deformed. Label all containersproperly.
22
• Leave phones in the power state in which
they
were found. Package phones in radio frequency-
shielding material to prevent them from accessing
communication signals.
• Collect all power supplies and adapters for all
electronic devices seized.
Transportation Procedures
• Keep digital evidence awayfrom magnetic fields,
e.g., those produced by radio transmitters, car
stereo speaker magnets and magnetic mount
emergency lights. Other transportation hazards
include heated seats and any device or material
that can produce static electricity, such as carpet.
• Do not keep digital evidence in a vehicle
for
extended periods. Heat, cold and humidity can
damage or destroy digital evidence.
• Ensure that computersand electronic devices are
packaged and secured during transportation to
prevent damage from shock and vibration.
• Document the transportation of the digital
evidence and maintain the chain of custody.
23
Electronic Crime and Digital
Evidence Considerations by
Crime Category
Below are potential sources of digital evidence for
different crimes. These lists are not exhaustive.
Child Abuse and/or Exploitation
• Calendars and journals
• Computer games
• Digital photo software
• Printed photographs
• Printers and copiers
• Scanners
• Still cameras and media
• Video cameras and tapes
• Video games and consoles
• Voice over Internet Protocol (VoIP) phones
24
Computer Intrusion
• Antennas
• Books and referenceson hacking
• List of computersaccessed
• List of IP addresses
• Network devices and components
• Printed computer code
• Wireless network equipment
25
Counterfeiting
• Checks and money orders
• Credit card information
• Database printouts
• Financial records
• High-quality printers
• Magnetic strip readers
• Online banking software
• Printed computer code
• Reproductions of signatures
• Scanners,copiers, laminators
26
Death Investigations
• Credit card information
• Financial records
• Medical records
• Online banking software
• Personal writings and/or diaries
• Recently printed material
• Reproductions of signatures
• Telephone records and/or telephone bills
• Will-making software
27
Domestic Violence, Threats and
Extortion
• Caller ID records
• Financial records
• Legal documents
• Personal writings and/or diaries
• Protection orders
• Telephone records/telephone bills
28
E-mail Threats, Harassment and/or
Stalking
• Caller ID records
• Financial records
• Legal documents
• Maps, directions, GPS equipment
• Personal Web sites
• Personal writings and/or diaries
• Telephone records
29
Gambling
• Accounting software
• Cash
• Client lists
• Database printouts
• Electronic money transfers
• Financial records
• Forged documents
• Lists of online gambling sites
• References to odds and/or lines
• Sports betting statistics
30
Identity Theft
• Accounting software
• Cash
• Checks and money orders
• Credit card information
• Database printouts
• Electronic money transfers
• Financial records
• Forged documents
• High-quality printers
• Mail in victim’s name
• Online banking software
• Reproductions of signatures
• Scanners,copiers, laminators
• Web site transaction records
31
Narcotics
• Cash
• Countersurveillance equipment
• Credit card information
• Database printouts
• Electronic money transfers
• Fictitiousidentification
• Financial records
• Forged documents
• GPSdevices and maps
• Online banking software
• Photographs of drugs and accomplices
• Police scanners
• Unfilled prescriptions
32
Online Fraud and/or Economic Fraud
• Accounting software
• Cash
• Checks and money orders
• Credit card information
• Database printouts
• Electronic money transfers
• Financial records
• Forged documents
• Online banking software
• Reproductions of signatures
33
Prostitution
• Appointment logs
• Calendars and/or journals
• Cash
• Client lists
• Credit card information
• Database printouts
• Electronic money transfers
• Financial records
• Forged documents
• Lists of online escort sites
• Medical records
• Online banking software
• Printed photos
34
Software Piracy
• Cash
• CD and DVDburners and labelers
• Credit card information
• Electronic money transfers
• Financial records
• Forged documents
• Software activation codes
• Software duplication equipment
35
Telecommunication Fraud
• Boot loader devices
• Cash
• Credit card information
• Database printouts
• Electronic money transfers
• EPROM burner
• Financial records
• Forged documents
• Online banking software
• Phone cables
• SIM card reader
• Stolen phones
36
Terrorism (Homeland Security)
• Cash
• Credit card information
• Database printouts
• Electronic money transfers
• Fictitiousidentification
• Financial records
• GPSequipment and/or maps
• Phone cables
• Stolen phones
• VoIP phones
37
Other Potential Sources of Evidence
• Answering machines
• Audio recorders
• Blank pads of paper with impressions
from prior writings
• Calendars
• CDs and CD burners
• Cell phones/smart phones
• Computer processors (chips)
• Computer-printed material
• Contact lists
• Copy machines
• Cordless landline telephones
• Digital cameras
• DVDs and DVDburners
• DVD/CD players
• External data-storage devices
38
Other Potential Sources of Evidence
(continued)
• Fax machines
• GPSequipment and accessories
• Handwritten notes
• Hard driveduplicators
• Hardwareand software manuals
• Information on steganography
• Internet activity records
• Laptop power supplies and accessories
• Microphones
• MP-3 players, e.g., iPods
• Multifunction machines (e.g., printer, scanner,
copier, fax combos)
• Pagers
• Pieces of paper with possible passwords
• Printed e-mails and notes
• Printers
39
Other Potential Sources of Evidence
(continued)
• Records of chat sessions
• Removable media
• Scanners
• Screen names and buddy lists
• Smart cards
• Software duplication equipment
• Telephone caller ID units
• User names and passwords
• Video cassette recorders (VCRs) and VCR
tapes
• Web cameras
• Wireless access points
40
Information to Document
to Assist the Forensic
Examination
• Authorization to examine evidence
• Case summary
• Investigation pointof contact
• Keyword lists
• Passwords
• Preliminary reports and documents
• Suspect information and nicknames
• Suspected criminal activity
The National Institute of Justice is the research,
development, and evaluation agency of the
U.S. Department of Justice. NIJ’s mission is to
advance scientific research, development, and
evaluation to enhance the administration
of justice and public safety.
The National Institute of Justice is a component
of the Office of Justice Programs, which also
includes the Bureau of Justice Assistance; the
Bureau of Justice Statistics; the Community
Capacity Development Office; the Office for
Victims of Crime; the Office of Juvenile Justice
and Delinquency Prevention; and the Office of
Sex Offender Sentencing, Monitoring, Appre-
hending, Registering, and Tracking (SMART).
U
.S
. D
ep
ar
tm
en
t
of
J
u
st
ic
e
O
ff
ic
e
of
J
us
ti
ce
P
ro
gr
am
s
N
a
ti
o
n
a
l
In
st
it
u
te
o
f
Ju
st
ic
e
W
a
sh
in
g
to
n
,
D
C
2
0
5
3
1
O
ff
ic
ia
l
B
us
in
es
s
P
en
al
ty
f
or
P
ri
va
te
U
se
$
30
0
P
R
E
S
O
R
T
E
D
S
T
A
N
D
A
R
D
P
O
S
T
A
G
E
&
F
E
E
S
P
A
ID
D
O
J/
N
IJ
P
E
R
m
IT
N
O
. G
–9
1
*N
CJ
~2
27
05
0------------------*
1. Stock Valuation A stock has an initial price of $100 per share.docx

More Related Content

Similar to 1. Stock Valuation A stock has an initial price of $100 per share.docx

Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014
Group-IB
 
RAND_TR293.pdf
RAND_TR293.pdfRAND_TR293.pdf
RAND_TR293.pdf
Anatolii8
 
@author Jane Programmer @cwid 123 45 678 @class.docx
   @author Jane Programmer  @cwid   123 45 678  @class.docx   @author Jane Programmer  @cwid   123 45 678  @class.docx
@author Jane Programmer @cwid 123 45 678 @class.docx
ShiraPrater50
 
@author Jane Programmer @cwid 123 45 678 @class
   @author Jane Programmer  @cwid   123 45 678  @class   @author Jane Programmer  @cwid   123 45 678  @class
@author Jane Programmer @cwid 123 45 678 @class
troutmanboris
 
Business Identity Theft Kit
Business Identity Theft KitBusiness Identity Theft Kit
Business Identity Theft Kit
- Mark - Fullbright
 
Information for Businesses - ca
Information for Businesses - caInformation for Businesses - ca
Information for Businesses - ca
- Mark - Fullbright
 
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
- Mark - Fullbright
 
AIIM_ASG-Automating-Information_Governan
AIIM_ASG-Automating-Information_GovernanAIIM_ASG-Automating-Information_Governan
AIIM_ASG-Automating-Information_Governan
Patrick BOURLARD
 
Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet Privacy
ESET
 
HPE Information Governance
HPE Information GovernanceHPE Information Governance
HPE Information Governance
Andrey Karpov
 
Cyber-Terrorism Finding a Common Starting Point By Je
Cyber-Terrorism Finding a Common Starting Point By JeCyber-Terrorism Finding a Common Starting Point By Je
Cyber-Terrorism Finding a Common Starting Point By Je
OllieShoresna
 
Economic-Cybercrime-Report
Economic-Cybercrime-ReportEconomic-Cybercrime-Report
Economic-Cybercrime-Report
Dr Steve Strickland
 
Legal Circle Corporate Brochure
Legal Circle Corporate BrochureLegal Circle Corporate Brochure
Legal Circle Corporate Brochure
legalinfo
 
2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf
OscarMauricioHernand9
 
MBM A Risk Management Approach to HITECH Whitepaper
MBM A Risk Management Approach to HITECH WhitepaperMBM A Risk Management Approach to HITECH Whitepaper
MBM A Risk Management Approach to HITECH Whitepaper
MBMeHealthCareSolutions
 
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
accacloud
 
1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx
jackiewalcutt
 
2011 e-id-report
2011 e-id-report2011 e-id-report
2011 e-id-report
Hai Nguyen
 
National Security Implications of virtual currency examining the potential fo...
National Security Implications of virtual currency examining the potential fo...National Security Implications of virtual currency examining the potential fo...
National Security Implications of virtual currency examining the potential fo...
Dmitry Tseitlin
 
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docxWeek 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
jessiehampson
 

Similar to 1. Stock Valuation A stock has an initial price of $100 per share.docx (20)

Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014
 
RAND_TR293.pdf
RAND_TR293.pdfRAND_TR293.pdf
RAND_TR293.pdf
 
@author Jane Programmer @cwid 123 45 678 @class.docx
   @author Jane Programmer  @cwid   123 45 678  @class.docx   @author Jane Programmer  @cwid   123 45 678  @class.docx
@author Jane Programmer @cwid 123 45 678 @class.docx
 
@author Jane Programmer @cwid 123 45 678 @class
   @author Jane Programmer  @cwid   123 45 678  @class   @author Jane Programmer  @cwid   123 45 678  @class
@author Jane Programmer @cwid 123 45 678 @class
 
Business Identity Theft Kit
Business Identity Theft KitBusiness Identity Theft Kit
Business Identity Theft Kit
 
Information for Businesses - ca
Information for Businesses - caInformation for Businesses - ca
Information for Businesses - ca
 
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
YOU ARE BEING TRACKED:How License Plate Readers Are Being Used To Record Amer...
 
AIIM_ASG-Automating-Information_Governan
AIIM_ASG-Automating-Information_GovernanAIIM_ASG-Automating-Information_Governan
AIIM_ASG-Automating-Information_Governan
 
Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet Privacy
 
HPE Information Governance
HPE Information GovernanceHPE Information Governance
HPE Information Governance
 
Cyber-Terrorism Finding a Common Starting Point By Je
Cyber-Terrorism Finding a Common Starting Point By JeCyber-Terrorism Finding a Common Starting Point By Je
Cyber-Terrorism Finding a Common Starting Point By Je
 
Economic-Cybercrime-Report
Economic-Cybercrime-ReportEconomic-Cybercrime-Report
Economic-Cybercrime-Report
 
Legal Circle Corporate Brochure
Legal Circle Corporate BrochureLegal Circle Corporate Brochure
Legal Circle Corporate Brochure
 
2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf
 
MBM A Risk Management Approach to HITECH Whitepaper
MBM A Risk Management Approach to HITECH WhitepaperMBM A Risk Management Approach to HITECH Whitepaper
MBM A Risk Management Approach to HITECH Whitepaper
 
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
 
1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx
 
2011 e-id-report
2011 e-id-report2011 e-id-report
2011 e-id-report
 
National Security Implications of virtual currency examining the potential fo...
National Security Implications of virtual currency examining the potential fo...National Security Implications of virtual currency examining the potential fo...
National Security Implications of virtual currency examining the potential fo...
 
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docxWeek 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
 

More from paynetawnya

YThis paper is due Monday, 30 November. You will need to use at leas.docx
YThis paper is due Monday, 30 November. You will need to use at leas.docxYThis paper is due Monday, 30 November. You will need to use at leas.docx
YThis paper is due Monday, 30 November. You will need to use at leas.docx
paynetawnya
 
You  have spent a lot of time researching a company.  Would you inve.docx
You  have spent a lot of time researching a company.  Would you inve.docxYou  have spent a lot of time researching a company.  Would you inve.docx
You  have spent a lot of time researching a company.  Would you inve.docx
paynetawnya
 
ZXY Corporation has relocated to a new building that was wired and s.docx
ZXY Corporation has relocated to a new building that was wired and s.docxZXY Corporation has relocated to a new building that was wired and s.docx
ZXY Corporation has relocated to a new building that was wired and s.docx
paynetawnya
 
Zero Describe the system (briefly!).  As in I’m going to talk ab.docx
Zero Describe the system (briefly!).  As in I’m going to talk ab.docxZero Describe the system (briefly!).  As in I’m going to talk ab.docx
Zero Describe the system (briefly!).  As in I’m going to talk ab.docx
paynetawnya
 
Youre the JudgeThis week, you are a judge in a federal district c.docx
Youre the JudgeThis week, you are a judge in a federal district c.docxYoure the JudgeThis week, you are a judge in a federal district c.docx
Youre the JudgeThis week, you are a judge in a federal district c.docx
paynetawnya
 
Your Week 2 collaborative discussion and the Ch. 2 of Introduction.docx
Your Week 2 collaborative discussion and the Ch. 2 of Introduction.docxYour Week 2 collaborative discussion and the Ch. 2 of Introduction.docx
Your Week 2 collaborative discussion and the Ch. 2 of Introduction.docx
paynetawnya
 
Your thesis statement will explain the ambiguity of why Prince hal b.docx
Your thesis statement will explain the ambiguity of why Prince hal b.docxYour thesis statement will explain the ambiguity of why Prince hal b.docx
Your thesis statement will explain the ambiguity of why Prince hal b.docx
paynetawnya
 
Your textbook states that body image—how a person believes heshe .docx
Your textbook states that body image—how a person believes heshe .docxYour textbook states that body image—how a person believes heshe .docx
Your textbook states that body image—how a person believes heshe .docx
paynetawnya
 
Your textbook discusses various cultural models in terms of immigrat.docx
Your textbook discusses various cultural models in terms of immigrat.docxYour textbook discusses various cultural models in terms of immigrat.docx
Your textbook discusses various cultural models in terms of immigrat.docx
paynetawnya
 
Your team has been given the land rights to an abandoned parcel of.docx
Your team has been given the land rights to an abandoned parcel of.docxYour team has been given the land rights to an abandoned parcel of.docx
Your team has been given the land rights to an abandoned parcel of.docx
paynetawnya
 
Your supervisor, Ms. Harris, possesses a bachelors of social work (.docx
Your supervisor, Ms. Harris, possesses a bachelors of social work (.docxYour supervisor, Ms. Harris, possesses a bachelors of social work (.docx
Your supervisor, Ms. Harris, possesses a bachelors of social work (.docx
paynetawnya
 
Your RatingGroup DiscussionDelinquency Prevention Please .docx
Your RatingGroup DiscussionDelinquency Prevention Please .docxYour RatingGroup DiscussionDelinquency Prevention Please .docx
Your RatingGroup DiscussionDelinquency Prevention Please .docx
paynetawnya
 
Your report due in Week 6 requires you to look at tools of liquidity.docx
Your report due in Week 6 requires you to look at tools of liquidity.docxYour report due in Week 6 requires you to look at tools of liquidity.docx
Your report due in Week 6 requires you to look at tools of liquidity.docx
paynetawnya
 
Your Project Sponsor pulls you aside and admits that he has no idea .docx
Your Project Sponsor pulls you aside and admits that he has no idea .docxYour Project Sponsor pulls you aside and admits that he has no idea .docx
Your Project Sponsor pulls you aside and admits that he has no idea .docx
paynetawnya
 
Your progress on the project thus far. Have you already compiled i.docx
Your progress on the project thus far. Have you already compiled i.docxYour progress on the project thus far. Have you already compiled i.docx
Your progress on the project thus far. Have you already compiled i.docx
paynetawnya
 
Week 6 - Discussion 1Evaluate the characteristics of each mode o.docx
Week 6 - Discussion 1Evaluate the characteristics of each mode o.docxWeek 6 - Discussion 1Evaluate the characteristics of each mode o.docx
Week 6 - Discussion 1Evaluate the characteristics of each mode o.docx
paynetawnya
 
WEEK 5 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 5 – EXERCISES Enter your answers in the spaces pr.docxWEEK 5 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 5 – EXERCISES Enter your answers in the spaces pr.docx
paynetawnya
 
Week 5 Writing Assignment (Part 2) Outline and Preliminary List o.docx
Week 5 Writing Assignment (Part 2) Outline and Preliminary List o.docxWeek 5 Writing Assignment (Part 2) Outline and Preliminary List o.docx
Week 5 Writing Assignment (Part 2) Outline and Preliminary List o.docx
paynetawnya
 
Week 5 eActivityRead the Recommendation for Cryptographic Key.docx
Week 5 eActivityRead the Recommendation for Cryptographic Key.docxWeek 5 eActivityRead the Recommendation for Cryptographic Key.docx
Week 5 eActivityRead the Recommendation for Cryptographic Key.docx
paynetawnya
 
Week 5 DiscussionNetwork SecuritySupporting Activity Netw.docx
Week 5 DiscussionNetwork SecuritySupporting Activity Netw.docxWeek 5 DiscussionNetwork SecuritySupporting Activity Netw.docx
Week 5 DiscussionNetwork SecuritySupporting Activity Netw.docx
paynetawnya
 

More from paynetawnya (20)

YThis paper is due Monday, 30 November. You will need to use at leas.docx
YThis paper is due Monday, 30 November. You will need to use at leas.docxYThis paper is due Monday, 30 November. You will need to use at leas.docx
YThis paper is due Monday, 30 November. You will need to use at leas.docx
 
You  have spent a lot of time researching a company.  Would you inve.docx
You  have spent a lot of time researching a company.  Would you inve.docxYou  have spent a lot of time researching a company.  Would you inve.docx
You  have spent a lot of time researching a company.  Would you inve.docx
 
ZXY Corporation has relocated to a new building that was wired and s.docx
ZXY Corporation has relocated to a new building that was wired and s.docxZXY Corporation has relocated to a new building that was wired and s.docx
ZXY Corporation has relocated to a new building that was wired and s.docx
 
Zero Describe the system (briefly!).  As in I’m going to talk ab.docx
Zero Describe the system (briefly!).  As in I’m going to talk ab.docxZero Describe the system (briefly!).  As in I’m going to talk ab.docx
Zero Describe the system (briefly!).  As in I’m going to talk ab.docx
 
Youre the JudgeThis week, you are a judge in a federal district c.docx
Youre the JudgeThis week, you are a judge in a federal district c.docxYoure the JudgeThis week, you are a judge in a federal district c.docx
Youre the JudgeThis week, you are a judge in a federal district c.docx
 
Your Week 2 collaborative discussion and the Ch. 2 of Introduction.docx
Your Week 2 collaborative discussion and the Ch. 2 of Introduction.docxYour Week 2 collaborative discussion and the Ch. 2 of Introduction.docx
Your Week 2 collaborative discussion and the Ch. 2 of Introduction.docx
 
Your thesis statement will explain the ambiguity of why Prince hal b.docx
Your thesis statement will explain the ambiguity of why Prince hal b.docxYour thesis statement will explain the ambiguity of why Prince hal b.docx
Your thesis statement will explain the ambiguity of why Prince hal b.docx
 
Your textbook states that body image—how a person believes heshe .docx
Your textbook states that body image—how a person believes heshe .docxYour textbook states that body image—how a person believes heshe .docx
Your textbook states that body image—how a person believes heshe .docx
 
Your textbook discusses various cultural models in terms of immigrat.docx
Your textbook discusses various cultural models in terms of immigrat.docxYour textbook discusses various cultural models in terms of immigrat.docx
Your textbook discusses various cultural models in terms of immigrat.docx
 
Your team has been given the land rights to an abandoned parcel of.docx
Your team has been given the land rights to an abandoned parcel of.docxYour team has been given the land rights to an abandoned parcel of.docx
Your team has been given the land rights to an abandoned parcel of.docx
 
Your supervisor, Ms. Harris, possesses a bachelors of social work (.docx
Your supervisor, Ms. Harris, possesses a bachelors of social work (.docxYour supervisor, Ms. Harris, possesses a bachelors of social work (.docx
Your supervisor, Ms. Harris, possesses a bachelors of social work (.docx
 
Your RatingGroup DiscussionDelinquency Prevention Please .docx
Your RatingGroup DiscussionDelinquency Prevention Please .docxYour RatingGroup DiscussionDelinquency Prevention Please .docx
Your RatingGroup DiscussionDelinquency Prevention Please .docx
 
Your report due in Week 6 requires you to look at tools of liquidity.docx
Your report due in Week 6 requires you to look at tools of liquidity.docxYour report due in Week 6 requires you to look at tools of liquidity.docx
Your report due in Week 6 requires you to look at tools of liquidity.docx
 
Your Project Sponsor pulls you aside and admits that he has no idea .docx
Your Project Sponsor pulls you aside and admits that he has no idea .docxYour Project Sponsor pulls you aside and admits that he has no idea .docx
Your Project Sponsor pulls you aside and admits that he has no idea .docx
 
Your progress on the project thus far. Have you already compiled i.docx
Your progress on the project thus far. Have you already compiled i.docxYour progress on the project thus far. Have you already compiled i.docx
Your progress on the project thus far. Have you already compiled i.docx
 
Week 6 - Discussion 1Evaluate the characteristics of each mode o.docx
Week 6 - Discussion 1Evaluate the characteristics of each mode o.docxWeek 6 - Discussion 1Evaluate the characteristics of each mode o.docx
Week 6 - Discussion 1Evaluate the characteristics of each mode o.docx
 
WEEK 5 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 5 – EXERCISES Enter your answers in the spaces pr.docxWEEK 5 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 5 – EXERCISES Enter your answers in the spaces pr.docx
 
Week 5 Writing Assignment (Part 2) Outline and Preliminary List o.docx
Week 5 Writing Assignment (Part 2) Outline and Preliminary List o.docxWeek 5 Writing Assignment (Part 2) Outline and Preliminary List o.docx
Week 5 Writing Assignment (Part 2) Outline and Preliminary List o.docx
 
Week 5 eActivityRead the Recommendation for Cryptographic Key.docx
Week 5 eActivityRead the Recommendation for Cryptographic Key.docxWeek 5 eActivityRead the Recommendation for Cryptographic Key.docx
Week 5 eActivityRead the Recommendation for Cryptographic Key.docx
 
Week 5 DiscussionNetwork SecuritySupporting Activity Netw.docx
Week 5 DiscussionNetwork SecuritySupporting Activity Netw.docxWeek 5 DiscussionNetwork SecuritySupporting Activity Netw.docx
Week 5 DiscussionNetwork SecuritySupporting Activity Netw.docx
 

Recently uploaded

Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 

Recently uploaded (20)

Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 

1. Stock Valuation A stock has an initial price of $100 per share.docx

  • 1. 1. Stock Valuation: A stock has an initial price of $100 per share, paid a dividend of $2.00 per share during the year, and had an ending share price of $125. Compute the percentage total return, capital gains yield, and dividend yield. 2. Total Return: You bought a share of 4% preferred stock for $100 last year. The market price for your stock is now $120. What was your total return for last year? 3. CAPM: A stock has a beta of 1.20, the expected market rate of return is 12%, and a risk-free rate of 5 percent. What is the expected rate of return of the stock? 4. WACC: The Corporation has a targeted capital structure of 80% common stock and 20% debt. The cost of equity is 12% and the cost of debt is 7%. The tax rate is 30%. What is the company's weighted average cost of capital (WACC)? 5. Flotation Costs: Medina Corp. has a debt-equity ratio of .75. The company is considering a new plant that will cost $125 million to build. When the company issues new equity, it incurs a flotation cost of 10%. The flotation cost on new debt is 4%. What is the initial cost of the plant if the company raises all equity externally? (125 – 100) + 2.00 / 100 = .27 or 27% (125-100) / 100 = .25 or 25% 2.00 / 100 = .02 or 2% rF= 5% Beta= 1.20 Expected market return= 12% =5 + 1.20 (12 – 5) = 43.4%
  • 2. Where: Re = cost of equity = .12 Rd = cost of debt = .07 E = market value of the firm's equity = .80 D = market value of the firm's debt = .20 V = E + D = total market value of the firm’s financing (equity and debt) = .80 + .20 E/V = percentage of financing that is equity = .80 / (.80+.20) D/V = percentage of financing that is debt .20 / (.80+.20) Tc = corporate tax rate = .30 WACC = (.80/1) * .12 + (.20/1) * 7 * (1 – .30) = .8 * .12 + .2 * .07 * .7 = .0145 or 1.45 U.S. Department of Justice Office of Justice Programs National Institute of Justice Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders www.ojp.usdoj.gov/nij nov. 09 U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531
  • 3. Eric H. Holder, Jr. Attorney General Laurie O. Robinson Acting Assistant Attorney General Kristina Rose Acting Director, National Institute of Justice This and other publications and products of the National Institute of Justice can be found at: National Institute of Justice www.ojp.usdoj.gov/nij Office of Justice Programs Innovation • Partnerships Safer Neighborhoods www.ojp.usdoj.gov Cover photograph copyright© 2001 PhotoDisc, Inc. NCJ 227050 Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders nov. 09
  • 4. This flipbook is a companion piece to Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. Use the flipbook only after you have reviewed the contents of the Guide at http://www.ojp.usdoj.gov/nij/ pubs-sum/219941.htm. Kristina Rose Acting Director National Institute of Justice iii The flipbook was updated by the Electronic Crime Partnership Initiative (ECPI), a program established by the National Institute of Justice to build the capacity of state and local law enforcement to prevent, investigate and prosecute electronic crime and identify, collect, preserve and examine digital evidence. This publication does not create, is not intended to create, and may not be relied upon to create any rights, substantive or procedural, enforceable as law by any party in any matter civil or criminal. Opinions or points of view expressed in this document represent a consensus of ECPI members and do not necessarily represent the official position or policies of the U.S. Department of Justice. The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Assistance; the Bureau of Justice Statistics;
  • 5. the Community Capacity Development Office; the Office for Victims of Crime; the Office of Juvenile Justice and Delinquency Prevention; and the Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking (SMART). iv Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi Electronic Devices: Types, Description and Potential Evidence . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Computer Systems . . . . . . . . . . . . . . . . . . . . . . . . 1 Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Handheld Devices . . . . . . . . . . . . . . . . . . . . . . . . . 3 Peripheral Devices . . . . . . . . . . . . . . . . . . . . . . . . . 3 Computer Networks . . . . . . . . . . . . . . . . . . . . . . . . 4 Sources of Potential Digital Evidence in Electronic Devices . . . . . . . . . . . . . . . . . . . . . . . . . 5 Securing and Evaluating the Scene . . . . . . . . . . . . 6 Preliminary Interviews . . . . . . . . . . . . . . . . . . . . . . 8 Documenting the Scene . . . . . . . . . . . . . . . . . . . .
  • 6. . 9 Evidence Collection . . . . . . . . . . . . . . . . . . . . . . . . 11 Assess the Situation. . . . . . . . . . . . . . . . . . . . . . . 12 Packaging and Transporting Digital Evidence . . 21 Packaging Procedures . . . . . . . . . . . . . . . . . . . . . 21 Transportation Procedures . . . . . . . . . . . . . . . . . . 22 v Electronic Crime and Digital Evidence Considerations by Crime Category . . . . . . . . . . . 23 Child Abuse and/or Exploitation . . . . . . . . . . . . . . 23 Computer Intrusion . . . . . . . . . . . . . . . . . . . . . . . . 24 Counterfeiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Death Investigations . . . . . . . . . . . . . . . . . . . . . . . 26 Domestic Violence, Threats and Extortion . . . . . . 27 E-mail Threats, Harassment and/or Stalking . . . . . 28 Gambling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Identity Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
  • 7. Narcotics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Online Fraud and/or Economic Fraud . . . . . . . . . . 32 Prostitution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Software Piracy . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Telecommunication Fraud . . . . . . . . . . . . . . . . . . 35 Terrorism (Homeland Security) . . . . . . . . . . . . . . 36 Other Potential Sources of Evidence . . . . . . . . . . 37 Information to Document to Assist the Forensic Examination . . . . . . . . . . . . . . . . . . . . . . 40 vi Introduction This flipbook is intended as a quick reference for first responders who may be responsible for ident- ifying, preserving, collecting and securing evidence at an electronic crime scene. It is a companion piece to Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition, from which it is excerpted. Use this flipbook only after you have reviewed and familiarized yourself with the contents of Electronic Crime Scene Investigation, which is available for free download at http://www.ojp.
  • 8. usdoj.gov/nij/pubs-sum/219941.htm. Consider agency protocols; federal, state and local laws; and prevailing technology when applying the information in this flipbook. 1 Electronic Devices: Types, Description and Potential Evidence Computer Systems • Laptops • Desktop systems • Tower computers • Rack-mounted systems • Minicomputers • Mainframe systems A computer system’s hardware is likely to include: • A case containing circuit boards, microprocessors, hard drive, memory and interface connections. • A monitor or video display device. • A keyboard and mouse.
  • 9. • Peripheral devices such as external hard drives, modems, printers, scanners, routers and docking stations. 2 Storage Devices • Hard drives (whether loose or connected to the system). • External hard drives (generally require a power supply and a connection to the computer system). • Removable media, e.g., cartridges or disk-based data storage devices. • Thumb or flash drives: Small, lightweight, remov- able data storage devices with USB connections. Can be found as part of, or disguised as, any number of common or unique devices, e.g., wrist- watch or Swiss Army Knife. • Memory cards: Small data storage devices com- monly used with digital cameras, computers, mobile phones, digital music players, personal digital assistants (PDAs) and video game consoles.
  • 10. 02-Flip Book Text.indd 2 11/16/09 9:31:43 AM 3 Handheld Devices • PDAs • Digital multimedia devices • Pagers • Digital cameras • Global positioning satellite (GPS) receivers • Mobile and smart phones Peripheral Devices Equipment that can be attached or connected to a computer. • Modems • Routers • Printers • Scanners • Docking stations
  • 11. 4 Computer Networks • Twoor more computer systems linked by data cables or by wireless connections to enable them to share resources and data. • Often include printers and data-routing devices such as hubs, switches and routers. 5 Sources of Potential Digital Evidence in Electronic Devices • The device and its components. • The function(s) it performs or facilitates. • Software,documents, photos, image files,e-mail and attachments, databases, financial information, Internet browsing history, chat logs, buddy lists and event logs. • Information stored on the device regarding its use, e.g., incoming and outgoing phone and fax numbers and recently scanned, faxed or printed documents.
  • 12. • Identifying information associatedwith the computer system, e.g., Internet protocol (IP) and local area network (LAN) addresses,broad- cast settings, and media access card (MAC) or network interface card (NIC) addresses. Electronic devices also may hold latent evidence such as fingerprints, DNA or other physical evidence that should be preserved. See page 37 for other potential sources of evidence. 02-Flip Book Text.indd 5 11/16/09 9:31:43 AM 6 Securing and Evaluating the Scene Document, photograph, and secure digital evidence at the scene as soon as possible. When securing and evaluating the scene: • Do not alter the state of an electronic device. If a computer or an electronic device is off, leave it off. • Remove all unauthorized persons from the area where evidence is to be collected. • Identify, seizeand secure all electronic devices, including personal or portable devices.
  • 13. • Recognize potential digital evidence in telephones, digital video recorders, other household appliances and motor vehicles. 7 If the computer is on or the power state cannot be determined: • Look and listen for indications that the computer is on — e.g., fans running, drives spinning and lit light-emitting diodes (LEDs). • If you cannot determine the power state of the computer, observe the monitor to determine if it is on, off or in sleep mode. • Check display screen for signsof data destruction. Lookout for words such as “delete,” “format,” “remove,”“copy,” “move,” “cut” or “wipe.” • Look for indications that the computer is being accessed remotely and/or signs of ongoing com- munications with other computers or users — e.g., Instant Messaging (IM) windows or chat rooms. • Take note of all cameras and determine whether
  • 14. they are active. Proceed to page 12. 02-Flip Book Text.indd 7 11/16/09 9:31:44 AM 8 Preliminary Interviews Separate and identify all adults of interest and record the location they occupied when you entered the scene. Obtain the following information from interviewee(s): • Purpose of computersand devices. • All usersof the computersand devices. • Type of Internet access and Internet service provider. • Computer and Internet user information — e.g., login names, user account names and passwords, and Instant Message screen names. • E-mail and Web mail (Web-based e-mail) accounts and personal Web pages. • Account information for online social networking
  • 15. Web sites — e.g., MySpace, Facebook. • All security provisions, data access restrictions, destructive devices or software in use. • Any automatedapplications in use. • Any otherrelevant information. 9 Documenting the Scene Your documentation should include: • The type, location, position, condition and power status of the device. • A record of all activity and processes visible on the display screen(s). • A record of all physical connections to and from the computers and other devices. • A record of any network and wireless components capable of linking devices to each other and the Internet. • The type, condition and power status of the device’s Internet and network access.
  • 16. • Video, photos, notes and sketches to assist in recreating/conveying the details of the scene. Some computer systems and electronic devices — and the information they contain — may be protected under applicable laws, agency policies or other 02-Flip Book Text.indd 9 11/16/09 9:31:44 AM 10 factors, that may prohibit collection of these devices or components. However, do include the location, condition and power state of these devices in your documentation. Movement of a running computer or electronic device may cause changes or damage to the com- puter or device or the digital evidence it contains. Computers and electronic devices should not be moved until it is determined that they are powered off. 11 Evidence Collection Handling digital evidence correctly is essential to preserving the integrity of the physical device as well as the information or data it contains. Turning off the power to a computer or other electronic device may cause the information or data stored
  • 17. on it to be damaged or lost. If you are not trained in handling digital evidence — • Do not attempt to explore the contents of a computer or other electronic device or to recover information from it. • Do not alter the state of a computer or other electronic device. • Do not pressany keys or click the mouse. • If the computer or device is off, leave it off. • Do not move a computer or otherelectronic device that is powered on. 12 • Do not accept offers of help or technical assis- tance from unauthorized persons. • DO request technical assistance from personnel with advanced equipment and training in digital evidence collection. See http://www.ecpi-us. org/Technicalresources.html for a list of available resources. Assess the Situation
  • 18. Before seizing digital evidence, make sure you have the legal authority to do so. Improper access to information or data stored on electronic devices may violate provisions of federal laws. After securing the scene and identifying the comput- er’s power status (p. 6), follow the steps listed below for the situation most like your own. Situation 1: Monitor is on. Program, application, work product, picture, e-mail or Internet site is displayed. 1. Photograph screen and record information displayed. 2. Proceed to “If the Computer Is ON” (p. 19). 02-Flip Book Text.indd 12 11/16/09 9:31:44 AM 13 Situation 2: Monitor is on. Screen saver or picture is visible. 1. Move mouse slightly without depressing buttons or rotating wheel if present. 2. Note any onscreen activity that causes a change in the display. 3. Photograph screen and record information
  • 19. displayed. 4. Proceed to “If the Computer Is ON” (p. 19). Situation 3: Monitor is on. Display is blank. 1. Move mouse slightly without depressing buttons or rotating wheel if present. 2. Display changes to login screen, work product, or other visible display. 3. Note change in display. 4. Photograph screen and record information displayed. 5. Proceed to “If the Computer Is ON” (p. 19). 02-Flip Book Text.indd 13 11/16/09 9:31:44 AM 14 Situation 4a: Monitor is off. Display is blank. 1. If monitor’s power switch is in off position, turn monitor on. 2. Display changes to a login screen, work product or other visible display. 3. Note change in the display. 4. Photograph screen and record information
  • 20. displayed. 5. Proceed to “If the Computer Is ON” (p. 19). Situation 4b: Monitor is off. Display is blank. 1. If monitor’s power switch is in off position, turn monitor on. 2. Display does not change. Screen remains blank. 3. Note that the display does not change. 4. Photograph blank screen. 5. Proceed to “If the Computer Is OFF” (p. 16). 02-Flip Book Text.indd 14 11/16/09 9:31:44 AM 15 Situation 5: Monitor is on. Display is blank. 1. Move mouse slightly without depressing any buttons or rotating the wheel if present. 2. If display does not change, confirm that power is supplied to the monitor. 3. If display remains blank, check computer case for active lights and listen for fans spinning or other indications computer is on.
  • 21. 4. If computer case gives no indication that it is powered on, proceed to “If the Computer Is OFF” (p. 16). 02-Flip Book Text.indd 15 11/16/09 9:31:44 AM 16 If the Computer Is OFF For desktop, tower and minicomputers follow these steps: 1. Document, photograph, and sketch all wires, cables, and devices connected to the computer. 2. Uniquely label and photograph the power supply cord and all cables, wires or USB drives attached to the computer and the connection each of these occupies on the computer. 3. Remove and secure the power supply cord from the back of the computer and from the wall outlet, power strip or battery backup device. 4. Disconnect and secure all cables, wires and USB drives from the computer and document the device or equipment connected at the opposite end. 5. Place tape over the floppy disk slot if present. En- sure that the CD or DVD drive trays are retracted into place and tape across the drive tray to prevent it from opening.
  • 22. 6. Place tape over the power switch. 02-Flip Book Text.indd 16 11/16/09 9:31:44 AM 17 If the Computer Is OFF (continued) 7. Record the make, model, serial numbers and any user-applied markings or identifiers. 8. Record or log computer and all cords, cables, wires, devices and components according to agency procedures. 9. Carefully package all evidence collected to prevent damage or alteration during transportation and storage. 18 For laptop computers follow these steps: 1. Document, photograph and sketch all wires, cables and devices connected to the laptop. 2. Uniquely label and photograph all wires, cables and devices connected to the laptop and the connec- tion each occupies. 3. Remove and secure the power supply and all bat-
  • 23. teries from the laptop computer. 4. Disconnect and secure all cables, wires, and USB drives from the laptop and document the equip- ment or device connected at the opposite end. 5. Place tape over the floppy disk slot if present. Ensure that the CD or DVD drive trays are retracted into place and tape across the drive tray to prevent it from opening. 6. Place tape over the power switch. 7. Record the make, model, serial numbers and any user-applied markings or identifiers. 8. Record or log the laptop computer and all cords, cables, wires, devices and components according to agency procedures. 9. Carefully package all evidence collected to prevent damage or alteration during transportation and storage. 19 If the Computer Is ON Removing the power supply is generally the safest option. If evidence of a crime is visible on the com- puter display, however, request assistance from personnel with experience in volatile data capture and preservation (see http://www.ecpi-us.org/ Technicalresources.html).
  • 24. Immediate disconnection of power is recommended when — • Information or activity on screen indicates that information or data is being deleted or overwritten. • A destructive process appears to be in progress on the computer’s data storage device(s). • The system is powered on in a typical Microsoft Windows® environment. Pulling the power supply cord from the back of the computer will preserve information about the last user account logged in, login time, most recently used documents, most recently used commands, and other valuable information. 02-Flip Book Text.indd 19 11/16/09 9:31:45 AM 20 Immediate disconnection of power is NOT recommended when — • Information or data of apparent evidentiary value is in plain view onscreen. Seek assistance from per- sonnel with advanced training in digital evidence collection.
  • 25. • Indications exist that any of the following are active or in use: Chat room(s), text documents, remote data storage, Instant Messaging (IM), child pornography, contraband, financial documents, data encryption and obvious illegal activities. • The device is a mobile or smart phone. Leave mobile and smart phones in the power state in which they were found. Improper shutdown of mainframe computers, servers or a group of networked computers may result in the loss of data, loss of evidence and potential civil liability. Secure the scene and request assistance from person- nel with advanced training in digital evidence collection of large or complex computer systems (see http:// www.ecpi-us.org/Technicalresources.html). 02-Flip Book Text.indd 20 11/16/09 9:31:45 AM 21 Packaging and Transporting Digital Evidence Packaging Procedures • Ensure that all digital evidence collected is prop- erly documented, labeled, marked, photographed, video recorded or sketched and inventoried. Properly label connections and connected devices to facilitate reassembly of the system later.
  • 26. • Protect any latent, trace or biological evidence con- tained on the digital evidence. Photograph digital evidence before conducting latent, trace or biological evidence processes on the evidence. • Pack all digital evidence in antistatic packaging. Plastic bags and containers can produce static electricity and allow the development of humidity and condensation that can damage or destroy digital evidence. • Package digital evidence in a manner that will prevent it from being bent, scratched or otherwise deformed. Label all containersproperly. 22 • Leave phones in the power state in which they were found. Package phones in radio frequency- shielding material to prevent them from accessing communication signals. • Collect all power supplies and adapters for all electronic devices seized. Transportation Procedures • Keep digital evidence awayfrom magnetic fields,
  • 27. e.g., those produced by radio transmitters, car stereo speaker magnets and magnetic mount emergency lights. Other transportation hazards include heated seats and any device or material that can produce static electricity, such as carpet. • Do not keep digital evidence in a vehicle for extended periods. Heat, cold and humidity can damage or destroy digital evidence. • Ensure that computersand electronic devices are packaged and secured during transportation to prevent damage from shock and vibration. • Document the transportation of the digital evidence and maintain the chain of custody. 23 Electronic Crime and Digital Evidence Considerations by Crime Category Below are potential sources of digital evidence for different crimes. These lists are not exhaustive. Child Abuse and/or Exploitation • Calendars and journals • Computer games • Digital photo software
  • 28. • Printed photographs • Printers and copiers • Scanners • Still cameras and media • Video cameras and tapes • Video games and consoles • Voice over Internet Protocol (VoIP) phones 24 Computer Intrusion • Antennas • Books and referenceson hacking • List of computersaccessed • List of IP addresses • Network devices and components • Printed computer code • Wireless network equipment
  • 29. 25 Counterfeiting • Checks and money orders • Credit card information • Database printouts • Financial records • High-quality printers • Magnetic strip readers • Online banking software • Printed computer code • Reproductions of signatures • Scanners,copiers, laminators 26 Death Investigations • Credit card information • Financial records • Medical records
  • 30. • Online banking software • Personal writings and/or diaries • Recently printed material • Reproductions of signatures • Telephone records and/or telephone bills • Will-making software 27 Domestic Violence, Threats and Extortion • Caller ID records • Financial records • Legal documents • Personal writings and/or diaries • Protection orders • Telephone records/telephone bills 28 E-mail Threats, Harassment and/or Stalking
  • 31. • Caller ID records • Financial records • Legal documents • Maps, directions, GPS equipment • Personal Web sites • Personal writings and/or diaries • Telephone records 29 Gambling • Accounting software • Cash • Client lists • Database printouts • Electronic money transfers • Financial records • Forged documents • Lists of online gambling sites
  • 32. • References to odds and/or lines • Sports betting statistics 30 Identity Theft • Accounting software • Cash • Checks and money orders • Credit card information • Database printouts • Electronic money transfers • Financial records • Forged documents • High-quality printers • Mail in victim’s name • Online banking software • Reproductions of signatures • Scanners,copiers, laminators • Web site transaction records
  • 33. 31 Narcotics • Cash • Countersurveillance equipment • Credit card information • Database printouts • Electronic money transfers • Fictitiousidentification • Financial records • Forged documents • GPSdevices and maps • Online banking software • Photographs of drugs and accomplices • Police scanners • Unfilled prescriptions 32
  • 34. Online Fraud and/or Economic Fraud • Accounting software • Cash • Checks and money orders • Credit card information • Database printouts • Electronic money transfers • Financial records • Forged documents • Online banking software • Reproductions of signatures 33 Prostitution • Appointment logs • Calendars and/or journals • Cash • Client lists
  • 35. • Credit card information • Database printouts • Electronic money transfers • Financial records • Forged documents • Lists of online escort sites • Medical records • Online banking software • Printed photos 34 Software Piracy • Cash • CD and DVDburners and labelers • Credit card information • Electronic money transfers • Financial records • Forged documents
  • 36. • Software activation codes • Software duplication equipment 35 Telecommunication Fraud • Boot loader devices • Cash • Credit card information • Database printouts • Electronic money transfers • EPROM burner • Financial records • Forged documents • Online banking software • Phone cables • SIM card reader • Stolen phones
  • 37. 36 Terrorism (Homeland Security) • Cash • Credit card information • Database printouts • Electronic money transfers • Fictitiousidentification • Financial records • GPSequipment and/or maps • Phone cables • Stolen phones • VoIP phones 37 Other Potential Sources of Evidence • Answering machines • Audio recorders
  • 38. • Blank pads of paper with impressions from prior writings • Calendars • CDs and CD burners • Cell phones/smart phones • Computer processors (chips) • Computer-printed material • Contact lists • Copy machines • Cordless landline telephones • Digital cameras • DVDs and DVDburners • DVD/CD players • External data-storage devices 38 Other Potential Sources of Evidence (continued) • Fax machines
  • 39. • GPSequipment and accessories • Handwritten notes • Hard driveduplicators • Hardwareand software manuals • Information on steganography • Internet activity records • Laptop power supplies and accessories • Microphones • MP-3 players, e.g., iPods • Multifunction machines (e.g., printer, scanner, copier, fax combos) • Pagers • Pieces of paper with possible passwords • Printed e-mails and notes • Printers 39 Other Potential Sources of Evidence (continued)
  • 40. • Records of chat sessions • Removable media • Scanners • Screen names and buddy lists • Smart cards • Software duplication equipment • Telephone caller ID units • User names and passwords • Video cassette recorders (VCRs) and VCR tapes • Web cameras • Wireless access points 40 Information to Document to Assist the Forensic Examination • Authorization to examine evidence • Case summary • Investigation pointof contact
  • 41. • Keyword lists • Passwords • Preliminary reports and documents • Suspect information and nicknames • Suspected criminal activity The National Institute of Justice is the research, development, and evaluation agency of the U.S. Department of Justice. NIJ’s mission is to advance scientific research, development, and evaluation to enhance the administration of justice and public safety. The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance; the Bureau of Justice Statistics; the Community Capacity Development Office; the Office for Victims of Crime; the Office of Juvenile Justice
  • 42. and Delinquency Prevention; and the Office of Sex Offender Sentencing, Monitoring, Appre- hending, Registering, and Tracking (SMART). U .S . D ep ar tm en t of J u st ic e O ff ic e