SlideShare a Scribd company logo
Best Practices
For Seizing Electronic Evidence
v.3
A Pocket Guide for First Responders
U.S.Department of
Homeland Security
United States
Secret Service
This third edition of the Best Practices for Seizing Electronic Evidence was updated
as a project of the United States Secret Service and participating law enforcement
agencies. A working group of various law enforcement agencies was convened to
identify common issues encountered in today's electronic crime scenes.
Representatives from the following agencies designed and developed this manual:
Alabama District Attorney's Association - Office of Prosecution Services
Los Angeles Police Department
Los Angeles County Sheriff's Department
Medford Police Department, Massachusetts
Presque Isle Police Department, Maine
Rockland County Sheriff's Department, New York
Ventura County District Attorney's Office, California
United States Secret Service
For additional copies, please contact the local office of the United States Secret Service.
The committee wishes to thank those departments and agencies who provided their
personnel and resources in support of the publication of this guide. This guide has
also been endorsed by the International Association of Chiefs of Police.
OFFICER SAFETY
The safety of the officer is paramount in the investigation of any crime. Today,
virtually every crime has an electronic component in terms of computers and
electronic technology being used to facilitate the crime. Computers used in crimes
may contain a host of evidence related to the crime being investigated, whether it is
a conventional crime or a terrorist act. In light of this, law enforcement officers and
investigators should not become complacent with individuals or their environment
simply because the crime may involve a computer.
During the investigation of electronic crimes or the seizure of computers and
electronic items, be aware that as in any other crime, unexpected changes to a
subject's involvement in a case may occur resulting in unexpected individual and
environmental threats to an officer's safety.
Utilizing proper procedures and tactics will ensure your personal safety as well as
the safety of others at the electronic crime scene.
BEST PRACTICES FOR SEIZING
ELECTRONIC EVIDENCE
GOLDEN RULES
There are general principles to follow when responding to any crime scene
in which computers and electronic technology may be involved. Several of
those principles are as follows:
Officer safety - secure the scene and make it safe.
If you reasonably believe that the computer is involved in the crime
you are investigating, take immediate steps to preserve the evidence.
Do you have a legal basis to seize this computer (plain view, search
warrant, consent, etc.)?
Do not access any computer files. If the computer is off, leave it off.
If it is on, do not start searching through the computer.
If the computer is on, go to the appropriate sections in this guide on
how to properly shut down the computer and prepare it for
transportation as evidence.
If you reasonably believe that the computer is destroying evidence,
immediately shut down the computer by pulling the power cord from
the back of the computer.
If a camera is available, and the computer is on, take pictures of the
computer screen. If the computer is off, take pictures of the
computer, the location of the computer and any electronic media
attached.
Do special legal considerations apply (doctor, attorney, clergy,
psychiatrist, newspapers, publishers, etc)?
GOLDEN RULES
Stand-Alone Home
Personal Computer
For proper evidence preservation,
follow these procedures in order.
• If networked (attached to router
and modem), see instructions on
next page.
• Do not use computer or attempt to
search for evidence.
• Photograph computer front and back as well as cords and connected devices, as
found. Photograph surrounding area prior to moving any evidence.
• If computer is “off”, do not turn “on”.
• If computer is “on” and something is displayed on the monitor, photograph the
screen.
• If computer is “on” and the screen is
blank, move mouse or press space bar
(this will display the active image on the
screen). After image appears,
photograph the screen.
• Unplug power cord from back of tower.
• If the laptop does not shutdown
when the power cord is removed, locate and remove
the battery pack. The battery is commonly placed on
the bottom, and there is usually a button or switch that
allows for the removal of the battery. Once the battery
is removed, do not return it to or store it in the laptop. Removing the
battery will prevent accidental start-up of the laptop.
• Diagram and label cords to later identify connected devices.
• Disconnect all cords and devices from tower.
• Package components and transport / store components as fragile cargo.
• Seize additional storage media (see storage media section).
• Keep all media, including tower, away from magnets, radio transmitters and other
potentially damaging elements.
• Collect instruction manuals, documentation and notes.
• Document all steps involved in the seizure of a computer and components.
• See section on important investigative questions.
EVIDENCE PRESERVATION
Networked Home
Personal Computer
For proper evidence
preservation, follow these
procedures in order.
• Unplug power to router or
modem.
• Do not use computer or attempt
to search for evidence.
• Photograph computer front and
back as well as cords and
connected devices, as found.
Photograph surrounding area prior to moving any evidence.
• If computer is “off”, do not turn “on”.
• If computer is “on” and something is displayed on the monitor, photograph the
screen.
• If computer is “on” and the screen is blank, move mouse or press space bar
(this will display the active image on the screen). After image appears,
photograph the screen.
• Unplug power cord from back of tower.
• Diagram and label cords to later identify
connected devices.
• Disconnect all cords and devices from
tower.
• Package components (including
router and modem) and transport /
store components as fragile cargo.
• Seize additional storage media (see storage media
section).
• Keep all media, including tower, away from magnets, radio
transmitters and other potentially damaging elements.
• Collect instruction manuals, documentation and notes.
• Document all steps involved in the seizure of a computer and components.
• See section on important investigative questions.
EVIDENCE PRESERVATION
Storage Media
Storage media is used to store
data from electronic devices.
These items may vary in
memory quantity.
• Collect instruction manuals,
documentation and notes.
• Document all steps involved in
seizure of storage media.
• Keep away from magnets, radio
transmitters and other
potentially damaging devices.
Network Server /
Business Network
• Consult a computer specialist for further
assistance
• Secure the scene and do not let anyone
touch except personnel trained to handle
network systems.
• Pulling the plug could:
- Severely damage the system
- Disrupt legitimate business
- Create officer and department
liability
EVIDENCE PRESERVATION
PDA, Cell Phone &
Digital Camera
Personal digital assistants, cell
phones and digital cameras may
store data directly to internal
memory or may contain removable
media. The following section details
the proper seizure and preservation
of these devices and associated
removable media.
• If the device is “off”, do not turn “on”.
• With PDAs or cell phones, if device
is on, leave on. Powering down
device could enable password, thus
preventing access to evidence.
• Photograph device and screen
display (if available).
• Label and collect all cables (to
include power supply) and
transport with device.
• Keep device charged.
• If device cannot be kept charged,
analysis by a specialist must be
completed prior to battery
discharge or data may be lost.
• Seize additional storage media
(memory sticks, compact flash, etc).
• Document all steps involved in
seizure of device and components.
EVIDENCE PRESERVATION
PURPOSE
In today's society, people utilize various electronic media and computers in
numerous aspects of their lives. Criminals also use a host of electronic media and
computers in facilitation of their unlawful activities. Modern and current technology
permits suspects to commit crimes internationally and remotely, obtain intelligence
and conduct counter-intelligence with near anonymity. Instant communication and
electronic mail provides a venue for communication between suspects as well as
victims.
As such, computers and other electronic media can be used to commit crimes,
store evidence of crimes and provide information on suspects and victims.
This field guide is designed to assist the patrol officer, detective and investigator in
recognizing how computers and electronic devices may be used as an instrument
of a crime or as a storage device for evidence in a host of federal and state crimes.
It will also assist these individuals in properly securing evidence and transporting it
for examination at a later time by a digital evidence forensic examiner.
We recommend that the patrol officer, detective and investigator consult and seek
assistance from their agency's resources or other agencies that seize electronic
media. This may include your local District Attorney, State Prosecutor or Assistant
United States Attorney.
PURPOSE
AUTHORITY FOR SEIZING EVIDENCE
This guide assumes that the patrol patrol officer, detective or investigator is
legally present at a crime scene or other location and has the legal authority to
seize the computer, hardware, software or electronic media.
If you have a reason to believe that you are not legally present at the location or
the individual (suspect or victim) does not have the legal ability to grant consent
then immediately contact the appropriate legal counsel in your jurisdiction.
PLAIN VIEW
The plain view exception to the warrant requirement only gives the legal authority
to SEIZE a computer, hardware, software and electronic media, but does NOT
give the legal authority to conduct a SEARCH of this same listed electronic
media.
CONSENT
When obtaining consent, be certain that your document has language specific to
both the seizure and the future forensic examination of the computer hardware,
software, electronic media and data by a trained computer forensic examiner or
analyst.
If your department or agency has a consent form relevant to computer or
electronic media and its analysis by a computer forensic examiner, it should be
used. If you do not have a form and are drafting a consent form, consult with
your District Attorney, State Prosecutor or Assistant United States Attorney for
advice regarding proper language and documentation.
SEARCH WARRANT
Search warrants allow for the search and seizure of electronic evidence as
predefined under the warrant. This method is the most preferred and is
consistently met with the least resistance both at the scene and in a court of law.
Search warrants for electronic storage devices typically focus on two primary
sources of information:
Electronic Storage Device Search Warrant
• Search and seizure of hardware, software, documentation, user notes and
storage media.
AUTHORITY
• Examination / search and seizure of data.
Service Provider Search Warrants
• Service records, billing records, subscriber information, etc.
• Obtain identification information for further investigative purpose.
Special Issues
Role of the computer
• The search warrant should state the computer's role in the crime and why it will
contain evidence.
Nexus
• Establish why you expect to find electronic evidence at the search location.
Specify evidence sought
• Specifically describe the evidence you have probable cause to search for and
any evidence of ownership of the computer.
Boiler plate language
• Adapt all search language to the specific facts of your case. Avoid using boiler
plate language.
Non-Disclosure
• May be necessary to protect the integrity of the investigation, to protect
informants or to prevent the disclosure of trade secrets / intellectual property.
Special Master
• Special legal considerations involving doctors, attorneys, spouses, publishers,
clergy, etc.
AUTHORITY
The following is a general reference guideline for consent forms pertaining to
computers and electronic media. Consult your District Attorney or Assistant
U.S. Attorney regarding consent language applicable to your jurisdiction.
CONSENT TO SEARCH ELECTRONIC MEDIA
I, __________________, hereby authorize __________________, who has
identified himself / herself as a law enforcement officer, and any other person(s),
including but not limited to a computer forensic examiner, he / she may designate to
assist him / her, to remove, take possession of and / or conduct a complete search
of the following: computer systems, electronic data storage devices, computer data
storage diskettes, CD-ROMs, or any other electronic equipment capable of storing,
retrieving, processing and / or accessing data.
The aforementioned equipment will be subject to data duplication / imaging and a
forensic analysis for any data pertinent to the incident / criminal investigation.
I give this consent to search freely and voluntarily without fear, threat, coercion or
promises of any kind and with full knowledge of my constitutional right to refuse to
give my consent for the removal and / or search of the aforementioned equipment /
data, which I hereby waive. I am also aware that if I wish to exercise this right of
refusal at any time during the seizure and or search of the equipment / data, it will
be respected.
This consent to search is given by me this ________ day of, __________________
20__________, at ____________ am / pm.
Location items taken from: ____________________________________________
Consenter Signature: ________________________________________________
Witness Signature: __________________________________________________
Witness Signature: __________________________________________________
AUTHORITY
Home Networking Basic Elements
As seen in this picture, a home network is often comprised of a modem, router and
desktop or laptop computers.
The typical purpose of a home network is to allow multiple computers to share a
single internet connection, such as DSL, cable or dial-up. A home network also
permits multiple users to share information with other computers on the network.
When confronting a home network, you should disable the network's connection to
the internet as soon as practical. This is accomplished by disconnecting the power
source from the modem and / or router.
In many instances home networks are connected via wireless routers or access
points, which can be easily hidden.
Increasingly, many home networks also serve as small offices or businesses.
When confronting these types of home networks, you should contact a computer
specialist and have him or her present or readily available to provide assistance
with seizing the computer and digital evidence.
HOME NETWORKING ELEMENTS
Internet
Wired
Workstations
Wireless
Workstations
Modem Router
Wireless
Access Point
The following is a list of crimes which may involve the use of a computer or
other electronic media. Listed below are the crimes and potential evidence
which may be recovered from various types of electronic evidence.
CRIMES AND DIGITAL EVIDENCE
Computer Fraud Investigations:
• Account data from online auctions
• Accounting software and files
• Address books
• Calendar
• Chat Logs
• Customer information
• Credit card data
• Databases
• Digital camera software
• E-mail, notes and letters
• Financial and asset records
Child Abuse and Pornography Investigations:
• Chat logs
• Digital camera software
• E-mails, notes and letters
• Games
• Graphic editing and viewing software
• Images
• Internet activity logs
• Movie files
• User created directory and file names
which classify images
Network Intrusion Investigations:
• Address books
• Configuration files
• E-mails, notes and letters
• Executable programs
• Internet activity logs
• Internet protocol address & usernames
• Internet relay chat logs
• Source code
• Text files and documents with
usernames and passwords
Homicide Investigations:
• Address books
• E-mails, notes and letters
• Financial asset records
• Internet activity logs
• Legal documents and wills
• Medical records
• Telephone records
• Diaries
• Maps
• Photos of victim / suspect
• Trophy photos
CRIMES AND DIGITAL EVIDENCE
Domestic Violence Investigations:
• Address books
• Diaries
• E-mails, notes and letters
• Financial asset records
• Telephone records
Financial Fraud and Counterfeiting Investigations:
• Address books
• Calendar
• Currency images
• Check and money order images
• Customer information
• Databases
• E-mails, notes and letters
• False identification
• Financial asset records
• Images of signatures
• Internet activity logs
• On-line banking software
• Counterfeit currency images
• Bank logs
• Credit card numbers
E-Mail Threats, Harassment and Stalking Investigations:
• Address books
• Diaries
• E-mails, notes and letters
• Financial asset records
• Images
• Internet activity logs
• Legal documents
• Telephone records
• Victim background research
• Maps to victim locations
Narcotics Investigations:
• Address books
• Calendar
• Databases
• Drug recipes
• E-mails, notes and letters
• False ID
• Financial asset records
• Internet activity logs
• Prescription form images
Software Piracy Investigations:
• Chat logs
• E-mails, notes and letters
• Image files of software certificates
• Internet activity logs
• Software serial numbers
• Software cracking utilities
• User created directories and file names
which classify copyrighted software
CRIMES AND DIGITAL EVIDENCE
Telecommunication Fraud Investigations:
• Cloning software
• Customer database records
• Electronic serial numbers
• Mobile identification numbers
• E-mails, notes and letters
• Financial asset records
• Internet activity logs
Identity Theft Investigations:
• Hardware and Software Tools
- Backdrops
- Credit card reader / writer
- Digital camera software
- Scanner software
• Identification Templates
- Birth certificates
- Check cashing cards
- Digital photo images
- Driver’s licenses
- Electronic signatures
- Counterfeit vehicle registrations
- Counterfeit insurance documents
- Social security cards
• Internet Activity Related to ID Theft:
- E-mail and newsgroup postings
- Deleted documents
- On-line orders
- On-line trading information
- Internet activity logs
• Negotiable Instruments
- Business checks
- Cashier’s checks
- Credit card numbers
- Counterfeit court documents
- Counterfeit gift certificates
- Counterfeit loan documents
- Counterfeit sales receipts
- Money orders
- Personal checks
INVESTIGATIVE QUESTIONS
PURPOSE: This section is to provide assistance to the patrol officer, detective or
investigator in identifying particular types of electronic crimes as well as providing
general questions which should be asked during the initial phases of the
investigation.
In conjunction with these investigative questions, the following information
should be provided / documented to assist in the forensic examination of the
electronic media:
• Case Summary - investigative reports, witness statements
• Internet Protocol (IP) Addresses - if available
• Key Word List - names, locations, identities
• Nicknames - all nicknames used by victim or suspect
• Passwords - all passwords used by victim or suspect
• Points of Contact - name of investigator making request
• Supporting Documents - consent form, search warrant
• Type of Crime - provide specific information
General Investigative Questions that may be asked regarding a crime
involving computers and electronic evidence are as follows:
• When and where was the computer obtained? Was it new or used?
• Who has access to the computer hardware and software?
• Where is the computer's electronic media (compact disks, floppy disks, thumb
drives, etc) stored?
• Whose fingerprints might be found on the electronic media?
• If other people have access to the computer, hardware or software can they access
everything on the computer or only certain files, folders or programs?
• How many people use the computer? Who are they?
• What is the level of computer experience of each computer user?
• What times of the day do the individual users have access to the computer?
• What are the user names on the computers?
• What programs are used by each computer user?
• Does the computer require a user name and password? What are they?
• Is there any software that requires a username or password?
• How does the computer have access to the internet (DSL, Cable, Dial-Up, LAN,
etc)?
INVESTIGATIVE QUESTIONS
• Does the victim or suspect have an e-mail account? Who is the service provider
(Yahoo, AOL, Gmail, Hotmail, etc)?
• If e-mails are involved in the case, ask the victim and suspect for their e-mail
addresses.
• Which e-mail client (program) does the suspect or victim use?
• Does the victim or suspect remotely access their computer (can they get into their
computer when away from the office or home)?
• Do any of the users use on-line or remote storage?
• Have any programs been used to “clean” the computer?
• Does the computer contain encryption software or hard drive wiping utilities?
• Is the computer always on?
Electronic Crime Specific Questions target specific offenses and
are as follows:
Identity Theft / Financial Crimes:
Victim Questions:
• Are you aware of any unusual activity on any of your accounts?
• What accounts have been compromised?
• Have you provided any personal information to any organization or individual?
• For what purpose was that information provided?
• Have you recently completed any credit applications or loan documents?
• Do you maintain any of your personal information on your computer?
• Have any bills or other financial statements not regularly arrived via mail?
• Have you checked your credit reports?
Suspect / Target Questions:
• Where is your computer software (CDs, floppy disks, etc)?
• Does the computer contain any software for making checks or other financial
documents?
• Does the computer contain any software to manipulate photographs?
• Does the computer contain any scanned or manipulated identification?
• Was the computer used in doing any on-line purchases?
INVESTIGATIVE QUESTIONS
Internet Crimes Against Children (ICAC):
Victim Questions:
• Has the victim been on-line in any chat rooms?
• Does the victim use the internet, e-mail or chat from any other computers? If so,
at what locations?
• Did the victim provide any information to anyone on line regarding their true
name, age and location?
• What is the victim's e-mail address or on-line chat room name?
• Who is on the victim's “buddy list” in chat rooms?
• Does the victim save / archive chat room logs?
• What type of chat / e-mail client does the victim use?
• What were the specific sexual acts observed in the images or the electronic
communications?
• Has the victim received any pictures or gifts from the suspect?
Suspect / Target Questions:
• Where are all of the suspect's computers?
• Does the suspect remotely store data (external hard drive, on-line storage, etc)?
• What is the suspect's on-line identity or chat room name?
• Has the suspect electronically communicated with any person?
• How does the suspect communicate with other persons? (chat, e-mails, etc.)
• Has the suspect viewed any child pornography using the computer? If so, how
did the suspect obtain the child pornography?
• Did the suspect send child pornography to any other person in the suspect's state
or in another state?
• Did the suspect realize that they were viewing images of children as opposed to
computer generated images of children?
Intrusions / Hacking: (Network Questions)
Home Networks
• Can you physically trace all of the network cables back to their respective
computers?
• Can each computer be associated to an individual user?
• Is the network connected to the internet?
• How is the network connected to the internet (DSL, Cable, Dial-up, etc)?
• Where is the DSL / cable modem located? Is it currently connected?
• Who is the internet service provider (ISP)?
• Is there more than one computer that can connect to the internet?
• Is there any wireless networking in place?
INVESTIGATIVE QUESTIONS
Business Networks
• Who first observed the illegal activity?
• Obtain the type of illegal activity and contact information for all witnesses.
• Identify the network administrator and obtain contact information. (The network
administrator should not be contacted by the first responder.)
• Are any employees / former employees considered to be a suspect?
• Is there a printed diagram of the network available?
• Are computer logs being maintained?
• Can the computer logs be immediately secured for further investigation?
• Have any other law enforcement agencies been contacted?
Crimes Involving E-Mails
Victim Questions:
• Identify victim e-mail addresses and internet service provider (ISP) information.
• Identify all usernames and e-mail accounts used by the victim.
• Obtain any printed copies of e-mails that the victim has received. Do not turn on
the computer to print e-mails.
Suspect / Target Questions:
• Identify suspect e-mail addresses and internet service provider (ISP) information.
• Identify all usernames and e-mail accounts used by the suspect.
• Obtain all passwords and associated software / usernames used by the suspect.
Instant Messaging / Internet Relay Chat (IRC) Crimes
Victim Questions:
• Ask if the victim had logging or archiving activated during chat sessions.
• Identify the victim's online screen name and e-mail addresses.
• Obtain copies of any material the victim has already printed.
• What type of software / chat client is used by the victim?
Suspect/Target Questions:
• Identify the suspect's online screen name and e-mail addresses.
• Obtain all passwords and associated software / usernames used by the suspect.
INVESTIGATIVE QUESTIONS
GALLERY
Computer
Tower
Blackberry
Storage Media
(CDs, DVDs, Floppy Disks,
Zip Disks and Flash Cards)
Cell Phone
Pager
GALLERY
Wireless Router
Laptop Hard Drive
iPod
Desktop / Server Hard Drive
Thumb Drives
GLOSSARY
Glossary and Explanation of Terms
BACKUP: A copy of information off a computer.
BOOT: To load the first piece of software to start a computer.
BYTE: A unit of data generally consisting of 8 bits.
KILOBYTE (KB): A Kilobyte is 1024 bytes.
MEGABYTE (MB): A Megabyte is 1024 Kilobytes.
GIGABYTE (GB): A Gigabyte is 1024 Megabytes.
CD-R: Compact disk to which data can be written to but not erased.
CD-RW: Compact disk to which data can be written and erased.
CPU: Central processing unit. It is the "brain" that performs all arithmetic, logic
and control functions.
DDOS: Distributed denial of service. An assault on a network that floods it with so
many additional requests that regular traffic is slowed or completely interrupted.
DONGLE: A device that attaches to a computer to control access to a particular
application. Dongles provide one of the most effective means of copyright
protection.
DVD: Digital versatile disc or digital video disc. Similar in appearance to a
compact disk, but can store larger amounts of data (typically a minimum of 4.7GB
of data).
ENCRYPTION: The process of scrambling or encoding information in an effort to
guarantee that only the intended recipient can read the information.
FIREWALL: A firewall allows or blocks traffic into and out of a private network or
the user's computer. A firewall is a method for keeping computers secure from
intruders.
HARD DISK: The hard disk is usually inside the PC. It stores information in the
same way as floppy disks but can hold far more data. Popular types of hard disks
are IDE, SCSI and SATA.
HARDWARE: The physical parts of a computer that can be picked up.
ISP: Internet service provider. A company that sells access to the Internet via
telephone or cable line to your home or office.
GLOSSARY
MEMORY: The electronic holding place for instructions and data that a computer's
microprocessor can reach quickly.
MODEM: A device that connects a computer to a data transmission line.
MONITOR: A device on which the computer displays information.
OPERATING SYSTEM: This software is usually loaded into the computer memory
upon switching the machine on. It is a prerequisite for the operation of any other
software.
PERSONAL ORGANIZER or PERSONAL DIGITAL ASSISTANT (PDA): These
are pocket-sized machines usually containing phone and address lists, diaries and
other information.
PIRATE SOFTWARE: Software that has been illegally copied.
RAM: Random access memory. The computer's short-term memory that is lost
when the computer is turned off.
REMOVABLE MEDIA: Floppy disks, CDs, DVDs, cartridges and tapes that store
data and can be easily removed.
REMOVABLE MEDIA CARDS: Small data storage media which are more
commonly found in other digital devices such as cameras, PDAs and music
players.
ROUTER: A network device that forwards packets from one network to another.
USB STORAGE DEVICES: Small storage devices accessed using a computer's
USB ports. They store large volumes of data files. They are easily removed,
transported and concealed. They are about the size of a car key or highlighter pen.
WARDRIVING: Driving around an area with a laptop and a wireless network
adapter in order to locate unsecured wireless networks.
WIRELESS NETWORK CARD: An expansion card present in a computer that
allows a cordless connection between that computer and other devices on a
computer network. The card communicates by radio signals to other devices
present on the network.
ZIP DRIVE / DISK: A 3.5-inch removable disk drive. The drive is bundled with
software that can catalogue disks and lock files for security.
Online Identity Theft Guide
PREVENTION
• Never give out any of the following information to unknown sources:
Date / Place of Birth Social Security Number
Credit Card Number Mother's Maiden Name
Address Phone Number
• Review credit reports at least once a year.
• Ensure secure online transactions by locating the closed lock icon at the bottom
right side of your web browser before disclosing personal information.
• Unless absolutely necessary, do not store any financial information on a
computer.
• Prior to discarding a computer, destroy all information contained on the hard
drive. A wiping utility is necessary, as formatting will not safely destroy data.
• Use strong passwords and do not allow programs to save passwords.
• Use virus protection software and firewalls to prevent the loss of personal
information from your computer or the introduction of malware.
RESPONSE
• Contact bank or credit card issuer to report fraud.
• Place a fraud alert with the following credit agencies:
Equifax - 800-525-6285
Experian - 888-397-3742
TransUnion - 800-680-7289
• File an identity theft complaint with your local police department and the Federal
Trade Commission (FTC) at 877-382-4357.

More Related Content

What's hot

Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
Wajahat Rajab
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
ahmad abdelhafeez
 
Network forensic
Network forensicNetwork forensic
Network forensic
Manjushree Mashal
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 
Mitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptxMitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptx
waizuq
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
Santosh Khadsare
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
Prof. (Dr.) Tabrez Ahmad
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
Anpumathews
 
Ppt
PptPpt
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
Kunal Thakur
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 

What's hot (20)

Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Mitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptxMitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptx
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Ppt
PptPpt
Ppt
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 

Viewers also liked

Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJ
David Sweigert
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
Hayden McCall
 
File000176
File000176File000176
File000176
Desmond Devendran
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA framework
David Sweigert
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
David Sweigert
 
HIPAA HHS OCR Audit Questions
HIPAA HHS OCR Audit QuestionsHIPAA HHS OCR Audit Questions
HIPAA HHS OCR Audit Questions
David Sweigert
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication Attacks
David Sweigert
 
Healthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRHealthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPR
David Sweigert
 
HIPAA Security Rule consent agreement with OCR
HIPAA Security Rule consent agreement with OCRHIPAA Security Rule consent agreement with OCR
HIPAA Security Rule consent agreement with OCR
David Sweigert
 
Example of Security Awareness Training -- Department of Aging
Example of Security Awareness Training -- Department of AgingExample of Security Awareness Training -- Department of Aging
Example of Security Awareness Training -- Department of Aging
David Sweigert
 
Handbook for Cyber Incident Response
Handbook for Cyber Incident ResponseHandbook for Cyber Incident Response
Handbook for Cyber Incident Response
David Sweigert
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
David Sweigert
 
Use of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisUse of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysis
David Sweigert
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
David Sweigert
 
Cyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureCyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy Infrastructure
David Sweigert
 
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
David Sweigert
 
Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional Warfare
David Sweigert
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefing
David Sweigert
 
Russian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureRussian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting Infrastructure
David Sweigert
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
David Sweigert
 

Viewers also liked (20)

Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJ
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
File000176
File000176File000176
File000176
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA framework
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
HIPAA HHS OCR Audit Questions
HIPAA HHS OCR Audit QuestionsHIPAA HHS OCR Audit Questions
HIPAA HHS OCR Audit Questions
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication Attacks
 
Healthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRHealthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPR
 
HIPAA Security Rule consent agreement with OCR
HIPAA Security Rule consent agreement with OCRHIPAA Security Rule consent agreement with OCR
HIPAA Security Rule consent agreement with OCR
 
Example of Security Awareness Training -- Department of Aging
Example of Security Awareness Training -- Department of AgingExample of Security Awareness Training -- Department of Aging
Example of Security Awareness Training -- Department of Aging
 
Handbook for Cyber Incident Response
Handbook for Cyber Incident ResponseHandbook for Cyber Incident Response
Handbook for Cyber Incident Response
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 
Use of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisUse of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysis
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
Cyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy InfrastructureCyber Threats that impact the US Energy Infrastructure
Cyber Threats that impact the US Energy Infrastructure
 
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
 
Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional Warfare
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefing
 
Russian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureRussian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting Infrastructure
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 

Similar to Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for First Responders USSS

Research and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdfResearch and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdf
optokunal1
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Pace IT at Edmonds Community College
 
Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level One
CTIN
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD
Davide Gabrini
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
JIEMS Akkalkuwa
 
PACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic ConceptsPACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic Concepts
Pace IT at Edmonds Community College
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
ibraheem ogundele
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
 
PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006 PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006
Pace IT at Edmonds Community College
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
Rashid Yahye
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
ayahye
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
urjarathi
 
File000115
File000115File000115
File000115
Desmond Devendran
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
BRNSSPublicationHubI
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
Paraben Corporation
 
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingEvidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
CTIN
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
forensicsnation
 

Similar to Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for First Responders USSS (20)

Research and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdfResearch and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdf
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level One
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
PACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic ConceptsPACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic Concepts
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006 PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
File000115
File000115File000115
File000115
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingEvidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
David Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
David Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
David Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
David Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
David Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
David Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
David Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
David Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
David Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
David Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
Congressional Budget Office
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
odmqk
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
fundraising4
 
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdfLecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
tshree896
 
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
dj1cx4ex
 
History Of Balochistan amazing .pptx / HOB
History Of Balochistan amazing .pptx      / HOBHistory Of Balochistan amazing .pptx      / HOB
History Of Balochistan amazing .pptx / HOB
uzma baloch
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
Bharat Mata
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
JSchaus & Associates
 
G7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdfG7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdf
Energy for One World
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
Cheong Man Keong
 
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdfGUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
ProexportColombia1
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
teeaszt
 
UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
Energy for One World
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
9d5c8i83
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
Congressional Budget Office
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
narinav14
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
JuanFelipeHerrera4
 
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
Scribe
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
Energy for One World
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Congressional Budget Office
 

Recently uploaded (20)

Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
 
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdfLecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
 
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
 
History Of Balochistan amazing .pptx / HOB
History Of Balochistan amazing .pptx      / HOBHistory Of Balochistan amazing .pptx      / HOB
History Of Balochistan amazing .pptx / HOB
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
 
G7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdfG7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdf
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
 
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdfGUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
 
UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
 
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
 

Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for First Responders USSS

  • 1. Best Practices For Seizing Electronic Evidence v.3 A Pocket Guide for First Responders U.S.Department of Homeland Security United States Secret Service
  • 2. This third edition of the Best Practices for Seizing Electronic Evidence was updated as a project of the United States Secret Service and participating law enforcement agencies. A working group of various law enforcement agencies was convened to identify common issues encountered in today's electronic crime scenes. Representatives from the following agencies designed and developed this manual: Alabama District Attorney's Association - Office of Prosecution Services Los Angeles Police Department Los Angeles County Sheriff's Department Medford Police Department, Massachusetts Presque Isle Police Department, Maine Rockland County Sheriff's Department, New York Ventura County District Attorney's Office, California United States Secret Service For additional copies, please contact the local office of the United States Secret Service. The committee wishes to thank those departments and agencies who provided their personnel and resources in support of the publication of this guide. This guide has also been endorsed by the International Association of Chiefs of Police. OFFICER SAFETY The safety of the officer is paramount in the investigation of any crime. Today, virtually every crime has an electronic component in terms of computers and electronic technology being used to facilitate the crime. Computers used in crimes may contain a host of evidence related to the crime being investigated, whether it is a conventional crime or a terrorist act. In light of this, law enforcement officers and investigators should not become complacent with individuals or their environment simply because the crime may involve a computer. During the investigation of electronic crimes or the seizure of computers and electronic items, be aware that as in any other crime, unexpected changes to a subject's involvement in a case may occur resulting in unexpected individual and environmental threats to an officer's safety. Utilizing proper procedures and tactics will ensure your personal safety as well as the safety of others at the electronic crime scene. BEST PRACTICES FOR SEIZING ELECTRONIC EVIDENCE
  • 3. GOLDEN RULES There are general principles to follow when responding to any crime scene in which computers and electronic technology may be involved. Several of those principles are as follows: Officer safety - secure the scene and make it safe. If you reasonably believe that the computer is involved in the crime you are investigating, take immediate steps to preserve the evidence. Do you have a legal basis to seize this computer (plain view, search warrant, consent, etc.)? Do not access any computer files. If the computer is off, leave it off. If it is on, do not start searching through the computer. If the computer is on, go to the appropriate sections in this guide on how to properly shut down the computer and prepare it for transportation as evidence. If you reasonably believe that the computer is destroying evidence, immediately shut down the computer by pulling the power cord from the back of the computer. If a camera is available, and the computer is on, take pictures of the computer screen. If the computer is off, take pictures of the computer, the location of the computer and any electronic media attached. Do special legal considerations apply (doctor, attorney, clergy, psychiatrist, newspapers, publishers, etc)? GOLDEN RULES
  • 4. Stand-Alone Home Personal Computer For proper evidence preservation, follow these procedures in order. • If networked (attached to router and modem), see instructions on next page. • Do not use computer or attempt to search for evidence. • Photograph computer front and back as well as cords and connected devices, as found. Photograph surrounding area prior to moving any evidence. • If computer is “off”, do not turn “on”. • If computer is “on” and something is displayed on the monitor, photograph the screen. • If computer is “on” and the screen is blank, move mouse or press space bar (this will display the active image on the screen). After image appears, photograph the screen. • Unplug power cord from back of tower. • If the laptop does not shutdown when the power cord is removed, locate and remove the battery pack. The battery is commonly placed on the bottom, and there is usually a button or switch that allows for the removal of the battery. Once the battery is removed, do not return it to or store it in the laptop. Removing the battery will prevent accidental start-up of the laptop. • Diagram and label cords to later identify connected devices. • Disconnect all cords and devices from tower. • Package components and transport / store components as fragile cargo. • Seize additional storage media (see storage media section). • Keep all media, including tower, away from magnets, radio transmitters and other potentially damaging elements. • Collect instruction manuals, documentation and notes. • Document all steps involved in the seizure of a computer and components. • See section on important investigative questions. EVIDENCE PRESERVATION
  • 5. Networked Home Personal Computer For proper evidence preservation, follow these procedures in order. • Unplug power to router or modem. • Do not use computer or attempt to search for evidence. • Photograph computer front and back as well as cords and connected devices, as found. Photograph surrounding area prior to moving any evidence. • If computer is “off”, do not turn “on”. • If computer is “on” and something is displayed on the monitor, photograph the screen. • If computer is “on” and the screen is blank, move mouse or press space bar (this will display the active image on the screen). After image appears, photograph the screen. • Unplug power cord from back of tower. • Diagram and label cords to later identify connected devices. • Disconnect all cords and devices from tower. • Package components (including router and modem) and transport / store components as fragile cargo. • Seize additional storage media (see storage media section). • Keep all media, including tower, away from magnets, radio transmitters and other potentially damaging elements. • Collect instruction manuals, documentation and notes. • Document all steps involved in the seizure of a computer and components. • See section on important investigative questions. EVIDENCE PRESERVATION
  • 6. Storage Media Storage media is used to store data from electronic devices. These items may vary in memory quantity. • Collect instruction manuals, documentation and notes. • Document all steps involved in seizure of storage media. • Keep away from magnets, radio transmitters and other potentially damaging devices. Network Server / Business Network • Consult a computer specialist for further assistance • Secure the scene and do not let anyone touch except personnel trained to handle network systems. • Pulling the plug could: - Severely damage the system - Disrupt legitimate business - Create officer and department liability EVIDENCE PRESERVATION
  • 7. PDA, Cell Phone & Digital Camera Personal digital assistants, cell phones and digital cameras may store data directly to internal memory or may contain removable media. The following section details the proper seizure and preservation of these devices and associated removable media. • If the device is “off”, do not turn “on”. • With PDAs or cell phones, if device is on, leave on. Powering down device could enable password, thus preventing access to evidence. • Photograph device and screen display (if available). • Label and collect all cables (to include power supply) and transport with device. • Keep device charged. • If device cannot be kept charged, analysis by a specialist must be completed prior to battery discharge or data may be lost. • Seize additional storage media (memory sticks, compact flash, etc). • Document all steps involved in seizure of device and components. EVIDENCE PRESERVATION
  • 8. PURPOSE In today's society, people utilize various electronic media and computers in numerous aspects of their lives. Criminals also use a host of electronic media and computers in facilitation of their unlawful activities. Modern and current technology permits suspects to commit crimes internationally and remotely, obtain intelligence and conduct counter-intelligence with near anonymity. Instant communication and electronic mail provides a venue for communication between suspects as well as victims. As such, computers and other electronic media can be used to commit crimes, store evidence of crimes and provide information on suspects and victims. This field guide is designed to assist the patrol officer, detective and investigator in recognizing how computers and electronic devices may be used as an instrument of a crime or as a storage device for evidence in a host of federal and state crimes. It will also assist these individuals in properly securing evidence and transporting it for examination at a later time by a digital evidence forensic examiner. We recommend that the patrol officer, detective and investigator consult and seek assistance from their agency's resources or other agencies that seize electronic media. This may include your local District Attorney, State Prosecutor or Assistant United States Attorney. PURPOSE
  • 9. AUTHORITY FOR SEIZING EVIDENCE This guide assumes that the patrol patrol officer, detective or investigator is legally present at a crime scene or other location and has the legal authority to seize the computer, hardware, software or electronic media. If you have a reason to believe that you are not legally present at the location or the individual (suspect or victim) does not have the legal ability to grant consent then immediately contact the appropriate legal counsel in your jurisdiction. PLAIN VIEW The plain view exception to the warrant requirement only gives the legal authority to SEIZE a computer, hardware, software and electronic media, but does NOT give the legal authority to conduct a SEARCH of this same listed electronic media. CONSENT When obtaining consent, be certain that your document has language specific to both the seizure and the future forensic examination of the computer hardware, software, electronic media and data by a trained computer forensic examiner or analyst. If your department or agency has a consent form relevant to computer or electronic media and its analysis by a computer forensic examiner, it should be used. If you do not have a form and are drafting a consent form, consult with your District Attorney, State Prosecutor or Assistant United States Attorney for advice regarding proper language and documentation. SEARCH WARRANT Search warrants allow for the search and seizure of electronic evidence as predefined under the warrant. This method is the most preferred and is consistently met with the least resistance both at the scene and in a court of law. Search warrants for electronic storage devices typically focus on two primary sources of information: Electronic Storage Device Search Warrant • Search and seizure of hardware, software, documentation, user notes and storage media. AUTHORITY
  • 10. • Examination / search and seizure of data. Service Provider Search Warrants • Service records, billing records, subscriber information, etc. • Obtain identification information for further investigative purpose. Special Issues Role of the computer • The search warrant should state the computer's role in the crime and why it will contain evidence. Nexus • Establish why you expect to find electronic evidence at the search location. Specify evidence sought • Specifically describe the evidence you have probable cause to search for and any evidence of ownership of the computer. Boiler plate language • Adapt all search language to the specific facts of your case. Avoid using boiler plate language. Non-Disclosure • May be necessary to protect the integrity of the investigation, to protect informants or to prevent the disclosure of trade secrets / intellectual property. Special Master • Special legal considerations involving doctors, attorneys, spouses, publishers, clergy, etc. AUTHORITY
  • 11. The following is a general reference guideline for consent forms pertaining to computers and electronic media. Consult your District Attorney or Assistant U.S. Attorney regarding consent language applicable to your jurisdiction. CONSENT TO SEARCH ELECTRONIC MEDIA I, __________________, hereby authorize __________________, who has identified himself / herself as a law enforcement officer, and any other person(s), including but not limited to a computer forensic examiner, he / she may designate to assist him / her, to remove, take possession of and / or conduct a complete search of the following: computer systems, electronic data storage devices, computer data storage diskettes, CD-ROMs, or any other electronic equipment capable of storing, retrieving, processing and / or accessing data. The aforementioned equipment will be subject to data duplication / imaging and a forensic analysis for any data pertinent to the incident / criminal investigation. I give this consent to search freely and voluntarily without fear, threat, coercion or promises of any kind and with full knowledge of my constitutional right to refuse to give my consent for the removal and / or search of the aforementioned equipment / data, which I hereby waive. I am also aware that if I wish to exercise this right of refusal at any time during the seizure and or search of the equipment / data, it will be respected. This consent to search is given by me this ________ day of, __________________ 20__________, at ____________ am / pm. Location items taken from: ____________________________________________ Consenter Signature: ________________________________________________ Witness Signature: __________________________________________________ Witness Signature: __________________________________________________ AUTHORITY
  • 12. Home Networking Basic Elements As seen in this picture, a home network is often comprised of a modem, router and desktop or laptop computers. The typical purpose of a home network is to allow multiple computers to share a single internet connection, such as DSL, cable or dial-up. A home network also permits multiple users to share information with other computers on the network. When confronting a home network, you should disable the network's connection to the internet as soon as practical. This is accomplished by disconnecting the power source from the modem and / or router. In many instances home networks are connected via wireless routers or access points, which can be easily hidden. Increasingly, many home networks also serve as small offices or businesses. When confronting these types of home networks, you should contact a computer specialist and have him or her present or readily available to provide assistance with seizing the computer and digital evidence. HOME NETWORKING ELEMENTS Internet Wired Workstations Wireless Workstations Modem Router Wireless Access Point
  • 13. The following is a list of crimes which may involve the use of a computer or other electronic media. Listed below are the crimes and potential evidence which may be recovered from various types of electronic evidence. CRIMES AND DIGITAL EVIDENCE Computer Fraud Investigations: • Account data from online auctions • Accounting software and files • Address books • Calendar • Chat Logs • Customer information • Credit card data • Databases • Digital camera software • E-mail, notes and letters • Financial and asset records Child Abuse and Pornography Investigations: • Chat logs • Digital camera software • E-mails, notes and letters • Games • Graphic editing and viewing software • Images • Internet activity logs • Movie files • User created directory and file names which classify images Network Intrusion Investigations: • Address books • Configuration files • E-mails, notes and letters • Executable programs • Internet activity logs • Internet protocol address & usernames • Internet relay chat logs • Source code • Text files and documents with usernames and passwords Homicide Investigations: • Address books • E-mails, notes and letters • Financial asset records • Internet activity logs • Legal documents and wills • Medical records • Telephone records • Diaries • Maps • Photos of victim / suspect • Trophy photos
  • 14. CRIMES AND DIGITAL EVIDENCE Domestic Violence Investigations: • Address books • Diaries • E-mails, notes and letters • Financial asset records • Telephone records Financial Fraud and Counterfeiting Investigations: • Address books • Calendar • Currency images • Check and money order images • Customer information • Databases • E-mails, notes and letters • False identification • Financial asset records • Images of signatures • Internet activity logs • On-line banking software • Counterfeit currency images • Bank logs • Credit card numbers E-Mail Threats, Harassment and Stalking Investigations: • Address books • Diaries • E-mails, notes and letters • Financial asset records • Images • Internet activity logs • Legal documents • Telephone records • Victim background research • Maps to victim locations Narcotics Investigations: • Address books • Calendar • Databases • Drug recipes • E-mails, notes and letters • False ID • Financial asset records • Internet activity logs • Prescription form images Software Piracy Investigations: • Chat logs • E-mails, notes and letters • Image files of software certificates • Internet activity logs • Software serial numbers • Software cracking utilities • User created directories and file names which classify copyrighted software
  • 15. CRIMES AND DIGITAL EVIDENCE Telecommunication Fraud Investigations: • Cloning software • Customer database records • Electronic serial numbers • Mobile identification numbers • E-mails, notes and letters • Financial asset records • Internet activity logs Identity Theft Investigations: • Hardware and Software Tools - Backdrops - Credit card reader / writer - Digital camera software - Scanner software • Identification Templates - Birth certificates - Check cashing cards - Digital photo images - Driver’s licenses - Electronic signatures - Counterfeit vehicle registrations - Counterfeit insurance documents - Social security cards • Internet Activity Related to ID Theft: - E-mail and newsgroup postings - Deleted documents - On-line orders - On-line trading information - Internet activity logs • Negotiable Instruments - Business checks - Cashier’s checks - Credit card numbers - Counterfeit court documents - Counterfeit gift certificates - Counterfeit loan documents - Counterfeit sales receipts - Money orders - Personal checks
  • 16. INVESTIGATIVE QUESTIONS PURPOSE: This section is to provide assistance to the patrol officer, detective or investigator in identifying particular types of electronic crimes as well as providing general questions which should be asked during the initial phases of the investigation. In conjunction with these investigative questions, the following information should be provided / documented to assist in the forensic examination of the electronic media: • Case Summary - investigative reports, witness statements • Internet Protocol (IP) Addresses - if available • Key Word List - names, locations, identities • Nicknames - all nicknames used by victim or suspect • Passwords - all passwords used by victim or suspect • Points of Contact - name of investigator making request • Supporting Documents - consent form, search warrant • Type of Crime - provide specific information General Investigative Questions that may be asked regarding a crime involving computers and electronic evidence are as follows: • When and where was the computer obtained? Was it new or used? • Who has access to the computer hardware and software? • Where is the computer's electronic media (compact disks, floppy disks, thumb drives, etc) stored? • Whose fingerprints might be found on the electronic media? • If other people have access to the computer, hardware or software can they access everything on the computer or only certain files, folders or programs? • How many people use the computer? Who are they? • What is the level of computer experience of each computer user? • What times of the day do the individual users have access to the computer? • What are the user names on the computers? • What programs are used by each computer user? • Does the computer require a user name and password? What are they? • Is there any software that requires a username or password? • How does the computer have access to the internet (DSL, Cable, Dial-Up, LAN, etc)? INVESTIGATIVE QUESTIONS
  • 17. • Does the victim or suspect have an e-mail account? Who is the service provider (Yahoo, AOL, Gmail, Hotmail, etc)? • If e-mails are involved in the case, ask the victim and suspect for their e-mail addresses. • Which e-mail client (program) does the suspect or victim use? • Does the victim or suspect remotely access their computer (can they get into their computer when away from the office or home)? • Do any of the users use on-line or remote storage? • Have any programs been used to “clean” the computer? • Does the computer contain encryption software or hard drive wiping utilities? • Is the computer always on? Electronic Crime Specific Questions target specific offenses and are as follows: Identity Theft / Financial Crimes: Victim Questions: • Are you aware of any unusual activity on any of your accounts? • What accounts have been compromised? • Have you provided any personal information to any organization or individual? • For what purpose was that information provided? • Have you recently completed any credit applications or loan documents? • Do you maintain any of your personal information on your computer? • Have any bills or other financial statements not regularly arrived via mail? • Have you checked your credit reports? Suspect / Target Questions: • Where is your computer software (CDs, floppy disks, etc)? • Does the computer contain any software for making checks or other financial documents? • Does the computer contain any software to manipulate photographs? • Does the computer contain any scanned or manipulated identification? • Was the computer used in doing any on-line purchases? INVESTIGATIVE QUESTIONS
  • 18. Internet Crimes Against Children (ICAC): Victim Questions: • Has the victim been on-line in any chat rooms? • Does the victim use the internet, e-mail or chat from any other computers? If so, at what locations? • Did the victim provide any information to anyone on line regarding their true name, age and location? • What is the victim's e-mail address or on-line chat room name? • Who is on the victim's “buddy list” in chat rooms? • Does the victim save / archive chat room logs? • What type of chat / e-mail client does the victim use? • What were the specific sexual acts observed in the images or the electronic communications? • Has the victim received any pictures or gifts from the suspect? Suspect / Target Questions: • Where are all of the suspect's computers? • Does the suspect remotely store data (external hard drive, on-line storage, etc)? • What is the suspect's on-line identity or chat room name? • Has the suspect electronically communicated with any person? • How does the suspect communicate with other persons? (chat, e-mails, etc.) • Has the suspect viewed any child pornography using the computer? If so, how did the suspect obtain the child pornography? • Did the suspect send child pornography to any other person in the suspect's state or in another state? • Did the suspect realize that they were viewing images of children as opposed to computer generated images of children? Intrusions / Hacking: (Network Questions) Home Networks • Can you physically trace all of the network cables back to their respective computers? • Can each computer be associated to an individual user? • Is the network connected to the internet? • How is the network connected to the internet (DSL, Cable, Dial-up, etc)? • Where is the DSL / cable modem located? Is it currently connected? • Who is the internet service provider (ISP)? • Is there more than one computer that can connect to the internet? • Is there any wireless networking in place? INVESTIGATIVE QUESTIONS
  • 19. Business Networks • Who first observed the illegal activity? • Obtain the type of illegal activity and contact information for all witnesses. • Identify the network administrator and obtain contact information. (The network administrator should not be contacted by the first responder.) • Are any employees / former employees considered to be a suspect? • Is there a printed diagram of the network available? • Are computer logs being maintained? • Can the computer logs be immediately secured for further investigation? • Have any other law enforcement agencies been contacted? Crimes Involving E-Mails Victim Questions: • Identify victim e-mail addresses and internet service provider (ISP) information. • Identify all usernames and e-mail accounts used by the victim. • Obtain any printed copies of e-mails that the victim has received. Do not turn on the computer to print e-mails. Suspect / Target Questions: • Identify suspect e-mail addresses and internet service provider (ISP) information. • Identify all usernames and e-mail accounts used by the suspect. • Obtain all passwords and associated software / usernames used by the suspect. Instant Messaging / Internet Relay Chat (IRC) Crimes Victim Questions: • Ask if the victim had logging or archiving activated during chat sessions. • Identify the victim's online screen name and e-mail addresses. • Obtain copies of any material the victim has already printed. • What type of software / chat client is used by the victim? Suspect/Target Questions: • Identify the suspect's online screen name and e-mail addresses. • Obtain all passwords and associated software / usernames used by the suspect. INVESTIGATIVE QUESTIONS
  • 20. GALLERY Computer Tower Blackberry Storage Media (CDs, DVDs, Floppy Disks, Zip Disks and Flash Cards) Cell Phone Pager
  • 21. GALLERY Wireless Router Laptop Hard Drive iPod Desktop / Server Hard Drive Thumb Drives
  • 22. GLOSSARY Glossary and Explanation of Terms BACKUP: A copy of information off a computer. BOOT: To load the first piece of software to start a computer. BYTE: A unit of data generally consisting of 8 bits. KILOBYTE (KB): A Kilobyte is 1024 bytes. MEGABYTE (MB): A Megabyte is 1024 Kilobytes. GIGABYTE (GB): A Gigabyte is 1024 Megabytes. CD-R: Compact disk to which data can be written to but not erased. CD-RW: Compact disk to which data can be written and erased. CPU: Central processing unit. It is the "brain" that performs all arithmetic, logic and control functions. DDOS: Distributed denial of service. An assault on a network that floods it with so many additional requests that regular traffic is slowed or completely interrupted. DONGLE: A device that attaches to a computer to control access to a particular application. Dongles provide one of the most effective means of copyright protection. DVD: Digital versatile disc or digital video disc. Similar in appearance to a compact disk, but can store larger amounts of data (typically a minimum of 4.7GB of data). ENCRYPTION: The process of scrambling or encoding information in an effort to guarantee that only the intended recipient can read the information. FIREWALL: A firewall allows or blocks traffic into and out of a private network or the user's computer. A firewall is a method for keeping computers secure from intruders. HARD DISK: The hard disk is usually inside the PC. It stores information in the same way as floppy disks but can hold far more data. Popular types of hard disks are IDE, SCSI and SATA. HARDWARE: The physical parts of a computer that can be picked up. ISP: Internet service provider. A company that sells access to the Internet via telephone or cable line to your home or office.
  • 23. GLOSSARY MEMORY: The electronic holding place for instructions and data that a computer's microprocessor can reach quickly. MODEM: A device that connects a computer to a data transmission line. MONITOR: A device on which the computer displays information. OPERATING SYSTEM: This software is usually loaded into the computer memory upon switching the machine on. It is a prerequisite for the operation of any other software. PERSONAL ORGANIZER or PERSONAL DIGITAL ASSISTANT (PDA): These are pocket-sized machines usually containing phone and address lists, diaries and other information. PIRATE SOFTWARE: Software that has been illegally copied. RAM: Random access memory. The computer's short-term memory that is lost when the computer is turned off. REMOVABLE MEDIA: Floppy disks, CDs, DVDs, cartridges and tapes that store data and can be easily removed. REMOVABLE MEDIA CARDS: Small data storage media which are more commonly found in other digital devices such as cameras, PDAs and music players. ROUTER: A network device that forwards packets from one network to another. USB STORAGE DEVICES: Small storage devices accessed using a computer's USB ports. They store large volumes of data files. They are easily removed, transported and concealed. They are about the size of a car key or highlighter pen. WARDRIVING: Driving around an area with a laptop and a wireless network adapter in order to locate unsecured wireless networks. WIRELESS NETWORK CARD: An expansion card present in a computer that allows a cordless connection between that computer and other devices on a computer network. The card communicates by radio signals to other devices present on the network. ZIP DRIVE / DISK: A 3.5-inch removable disk drive. The drive is bundled with software that can catalogue disks and lock files for security.
  • 24. Online Identity Theft Guide PREVENTION • Never give out any of the following information to unknown sources: Date / Place of Birth Social Security Number Credit Card Number Mother's Maiden Name Address Phone Number • Review credit reports at least once a year. • Ensure secure online transactions by locating the closed lock icon at the bottom right side of your web browser before disclosing personal information. • Unless absolutely necessary, do not store any financial information on a computer. • Prior to discarding a computer, destroy all information contained on the hard drive. A wiping utility is necessary, as formatting will not safely destroy data. • Use strong passwords and do not allow programs to save passwords. • Use virus protection software and firewalls to prevent the loss of personal information from your computer or the introduction of malware. RESPONSE • Contact bank or credit card issuer to report fraud. • Place a fraud alert with the following credit agencies: Equifax - 800-525-6285 Experian - 888-397-3742 TransUnion - 800-680-7289 • File an identity theft complaint with your local police department and the Federal Trade Commission (FTC) at 877-382-4357.