Cyb15 Resources
Cyb15 Resources
Objectives
Page 1 of 4
Participant Guide Introduction to Computer Crime Investigations
A. Computers, and their hard drives and memory chips, are only the beginning of possible
places where digital evidence may be located
C. Printers, scanners, copiers, and fax machines are often overlooked and contain
transaction records, phone books, and digital copies of documents
D. Mobile phones can contain huge amounts of information, including dialing records,
photos and videos, address books, documents, music, and other applications
F. Service providers
1. Internet infrastructure relies on service providers
2. Service providers control important digital evidence
a. Electronic communications
b. Stored data
c. Customer information
G. Data is volatile
1. Deleted by a keystroke
2. Service providers, businesses, other entities, and individuals may delete data in the
normal course of business
3. Read only memory (RAM) is lost when a computer is turned off
4. Specialized knowledge and tools are needed to recover deleted data
5. Some data cannot be recovered
Cyber Crime Workshop rev. 12/28/08
Page 2 of 4
Participant Guide Introduction to Computer Crime Investigations
B. On location
1. Secure and evaluate the scene
a. Follow established procedures; do not alter the condition of any electronic devices
b. Protect perishable data physically and electronically
c. Identify telephone lines and other cables attached to devices
d. Collect physical evidence; for example, a keyboard may have fingerprints
e. Conduct preliminary interviews
2. Document the scene
a. Observe and document the physical scene
b. Document the condition and location of the computer system and other devices
c. Identify and document related electronic components
d. PHOTOGRAPH the entire scene, the computers and other devices (front and
back), what appears on the monitor; in addition, videotaping may be appropriate
3. Collect the evidence
a. Imaging drives and other digital storage devices is critical for data preservation
and analysis
b. Procedures for stand-alone and laptop evidence will be different than those for
computers in complex environments
c. Gather other electronic devices and peripheral evidence
d. Don’t forget non-electronic evidence!
e. Package, transport, and store everything to protect and preserve the evidence
4. Forensic examination – on scene, at the lab?
Page 3 of 4
Participant Guide Introduction to Computer Crime Investigations
C. Special considerations: The evidence may not be on the scene or may be mingled with
other digital information
1. Service providers often have established procedures for providing digital evidence to
law enforcement
a. Internet service providers (ISP)
b. Website hosting and data storage providers
2. Businesses and other networked entities may be disrupted or harmed by a search
3. International issues arise when digital evidence is located outside of a country; this
occurs frequently, especially when ISPs are involved
This presentation was developed by the Computer Crime and Intellectual Property Section,
Criminal Division, United States Department of Justice, www.cybercrime.gov
Page 4 of 4