Seizing Electronic Evidence: Best Practices - Secret Service Electronic Crime Scene Investigation - NIJ
Seizing Electronic Evidence: Best Practices - Secret Service Electronic Crime Scene Investigation - NIJ
Seizing Electronic Evidence: Best Practices - Secret Service Electronic Crime Scene Investigation - NIJ
http://www.treasury.gov/usss/electronic_evidence.htm
http://www.ojp.usdoj.gov/nij/pubs-sum/187736.htm
Concerns
The seizure
1) Evidence Tape
3) Reading Glasses
4) Inventory forms
8) Sharpies, pens
9) Adhesive tape
11) Gloves
More stuf
13) TableauPelican (ATA, SCSI, eSATA, Firefly) with power supplies and line cords. Firewire I/F
cables, laptop adaptor. Small laptop adaptor.
17)eSATA interface
21) UPS
31)F-Response CD
33) Flashlight
36)Blank Labels
Fruits of crime
Repository of contraband
Stolen computers
Toons, Tunes
Potential Evidence
Contraband computer
HW or SW stolen?
Data storage
Seize what
HW
SW
Data
Seize/Search where
Suspects:
Interview
Passwords
Location of data
Installed software
Network
Etc.
Expectation of Privacy
ECPA 1986
CALEA
Search Warrants
Warrantless Searches
Subpoenas
Wire Taps/Surveillance
NSA ???
Search Warrant
Specifies
Place
Persons
Warrants
Expectation of privacy
In public places
Requires subpoena
Warrant
Back to Warrants
HW
Contents
Information
Be very careful
Number 1:
Number 2:
Warrantless Searches
Permission
Incident to arrest
Plain sight
Search Warrants
Stored Data
Examination of data
More Planning
Photographs, video
Proprietary information
Classified information
Business records
Business continuity
Notes
Details
Time
Order
Rule # 1
Such as cables
Blinking lights
Get a specialist
Pictures of Everything
Floor plan
Photograph/Video graph
Photos
Each Item
Placement
Front
Back
Cables
After Pictures of an on PC
Vista is diferent
Do not turn it of
If it is a laptop
New World
Business interruption
Live acquisition
Live acquisition
Network activity
Network snifer
Examples Screen(s)
Back
Photo of the back with all of the connections tagged. More photos
of each connection identified. In your log both ends of each connection
should identified and cross refrenced with your photos.
Front
Inside
Network Gear
Dont forget all the network connections and devices. Photos should show
connection labels as well as general configuration. Multiple photos.
Examples Media
Photograph the media. Also be able to show the location of the media fou
Cross reference to the sketch. Also the media should be assigned a Item #
Evidence Collection
Locate Evidence
Tie to sketch
Connectivity
Photograph evidence
Evidence
Inventory
Form
Network
Network Spaghetti
Seizure
Liabilities
Every step
Other Devices
Cell phones
Printers
Cordless phones
CD duplicators
Caller ID devices
Pagers
Digital cameras,
video
Fax
GPS
Copiers
Game boxes
Home electronic
devices
PDAs
Tivos
Magnetic strip
Readers& writers
ID card writers
Smart cards
RFID
Security systems
Check writers
Hologram writers
Special printers
Counterfeiting
Cell Phones
Cell Phones
Numbers
PIN numbers
Messages
Voice, text
Time lines
Cell Phones
Cookies
Cached data
Stored programs
ISP information
Recent syslogs
Subpoena information
Cell Phones
Architecture
Computer
User interface
Transceiver
OS
Networking stack
I/O
Blue tooth
IR
Serial
Seizure - On
If it is on, leave it on
Lockout features
Photograph screen
Be very careful It is on
Seizure - Of
Get to an expert
Head set
Remotes
Serial connects
Subpoena
Cordless Telephones
Perhaps Caller ID
Voice mail
Recent
Answering Machines
Caller ID Boxes
If of leave it of
If on leave on
Get everything
Pagers
Pages
Numeric
Voice mail
Pagers
Architecture
Transceiver
Reasonable display
Pagers - Seizure
On
Turn it of
Of
Architecture
Computer
Ethernet
Phone line
Stored documents
Sent
To be sent
Received opened
Seizure
If of leave it of.
If on
Custom Stuf
RFID readers/writers
Security Systems
Service provider
System info
Text, video
Stuf