FINALS
FINALS
Videos
The use of scientifically derived Contact List
and proven methods toward the Porn
following: CVIAD Calendars
Collection and preservation, Porn
Validation, Operating Systems
Identification, Porn
Analysis and interpretation,
Documentation and presentation of Other Digital Storage Devices
digital evidence derived from digital Printers
sources for the purpose of Faxes
facilitating or furthering the VoIP phones
reconstruction of events found to
be criminal. Summary
Digital Evidence Comes in Many
Computer Forensics Examples Shapes and Sizes
Recovering thousands of Investigators must know What and
deleted emails Where to look
Performing investigation Educated Prosecutors and Judges
post-employment understand SCOPE of Search
termination
Recovering evidence post Seizure of Mobile Phone Devices
formatting hard drive The following principles should be
Performing investigation followed when seizing mobile phone
after multiple users had devices:
taken over the system Have the proper equipment
available
Who Uses Computer Forensics? Proper evidence handling
Criminal Prosecutors Fingerprints?
Rely on evidence obtained Preserve the integrity of the
from a computer to evidence
prosecute suspects and Turn off / faraday
use as evidence. bag?
Civil Litigations Properly & sufficiently
Personal and business data document the equipment
discovered on a computer that was seized
can be used in fraud, Evidence forms
divorce, harassment, or
discrimination cases. Seizure Equipment
Insurance Companies Investigators should have the following
Evidence discovered on tools in a standard “raid” kit:
computer can be used to PPPPAMMALUU2
mollify costs (fraud, worker’s Precision Screwdrivers
compensation, arson, etc) Pens
Private Corporations Pencils
Obtained evidence from Permanent markers
employee computers can be Anti-static bags
used as evidence in harassment, MicroSD cards with adapter
fraud, and theft cases. MiniDV Camcorder
Law Enforcement Officials Aluminum Foil
Rely on computer forensics to Legal notepads
backup search warrants and USB write block
post-seizure handling. USB forensic card reader
Individual/Private Citizens 2 GB Flash Drive
Obtain the services of
professional computer forensic Safety
specialists to support claims of As with all types of seized evidence,
harassment, abuse, or wrongful ensuring officer safety is the most
termination from employment. important initial step.
Before handling *any* evidence,
Finding Potential Digital Evidence take the time to visually inspect it,
Types of Electronic Media without touching it.
Desktops to Servers In the Counter-Terrorism world,
CellPhones, PDA’s &iPods cell-phones are often used as
remote detonators, use extreme
What can be on Those iPods? caution.
Music
If the phone looks unusual, has – Identification and seizure
external wires visible or is attached to – Packaging, transportation and
another object, call the proper safety storage
personnel for a safety evaluation. – Chain of custody
Recruitment