Forensic notes 

electronic devices : types , description , and potential evidence 

 

computer systems - hardware , software , documents , images , emails and attachments , dbs, financial information , Internet browsing history , chat logs , event logs , on data stored on external devices

storage devices :

hard drives – SCSI, SATA, IDE, laptop hard drives, IDE 40 pin, 2.5 IDE 44pin, SATA, SCSI hd 65 pin, SCSI IDC 50 pin

                internally : magnetically charged , glass , ceramic or metal platters that store data

 

external hard drives - network storage devices , 3.5 , 2.5

removable media - zip discs , floppy discs , CD & DVD

thumb drives - small lightweight and normally disguised as watches or lighters or toys

memory cards - smart media , secure digital (SD), mini cards , micro cards, memory stick , compact flash card

                evidence : email messages , Internet browser , chat logs , photos , image files , DB , financial records , event logs

 

handheld devices :

Phones, PDA pages, digital cameras, GPS - may contain software applications data and information such as emails , browsing, documents, email messages , photos , image files , financial records

NOTE:

peripheral devices : Keyboard, mouse, microphones , USB on firewire hubs, web cameras , memory card readers , VoIP devices.

other potential sources of digital evidence :

data storage tape drives , surveillance equipment , digital cameras and video cameras, digital audio recorders , digital video recorders , MP3 players , satellite audio , video recorders and access cards, computer chop headsets , keyboard mouse and video , sharing switch  , SIM card reader , thumbprint reader , and reference materials such as books

 

Computer Networks:

Network up , laptop network card , Internet modems , network switch power supply , wireless access points , wireless network server , directional antennas for wireless cards , wireless USB devices

 

 

Chapter 2 :

investigation tools and equipment 

Tools and materials for collecting digital evidence:

first responders need the following : cameras , cardboard boxes , notepads, gloves, evidence inventory logs, evidence tape , paper evidence bags , evidence tags and labels , crime scene tape , anti static bags, permanent markers and non magnetic tools.

 

 

Securing and evaluating the scene 

first responders primary considerations: officer safety , safety of everyone at the crime scene , all actions to be compliant with the law for collecting on site evidence .

after securing the site: 

 

when securing and evaluating the scene the first responder should: 

remember components such as keyboards mouse removable storage media holds evidence such as fingerprints and DNA so physical evidence should not be compromised during documentation.

 

if computer is on or it cannot be determined, the first responder:

 

preliminary interviews:

 

 

Chapter 4 

documenting the scene 

initial documentation:

documentation should include :

 

 

  1. record any network or wireless access points that may be present and capable of linking other computers and devices so this may be classed as extra evidence which is beyond the crime scene
  2. even if the first responder cannot collect all the devices this may be due to the laws in place he or she should still document them

 

 

 

 

 

 

 

 

 

Chapter 5

Evidence Collection 

 

Chapter 6

packaging transportation storage of digital evidence 

digital evidence : is fragile and sensitive to extreme temperatures , humidity , physical shocks , static electricity and magnetic fields

 

packaging procedures : collected properly labelled marked photographed video recorded or sketched and inventoried before it is packaged .

-all Connections and connected devices should be labelled for easy configurations of the system later

-packing anti static bags

-plastic material should not be used when collecting digital evidence because plastic companies use or convey static electricity and allow humidity and condensation to develop so it may damage or destroy the evidence

-pack mobile phones and signal blocking materials such as the Faraday isolation bugs or radio frequency shielding material or aluminium foil to protect messages sent send for the phone

-collect all power supplies and adapters for all electronic devices seized

transportation procedures:

storing procedures: