Digital Evidence Preservation

Improved Essays
As the realm of technology and digital forensics constantly expands, there is a need for you and your clients to become familiar with ways that contribute to the preservation of digital evidence. The fundamental importance of digital preservation is clear, as more lawyers and clients need to present evidence related to technological devices. For this reason, LMG Security wants to highlight the necessity of following a series of steps in the preservation of digital evidence, as even a small, inattentive move could lead to the loss of evidence and the break of a case.

For example, a local lawyer once was brought a phone to be analyzed for one of his clients. At that point in time, the phone had been OFF for several years. Instinctively, the lawyer thought that looking at the data on that
…show more content…
The phone should have been brought to forensic experts as soon as possible. They could have collected the phone, stored it in a safe faraday cage (which prevents signals from reaching the phone) and proceeded to collect a forensic image of the data in the device.

So then, what are those critical steps that need to be taken to prevent loss of data before bringing to the forensics experts? In following the next steps, act as quickly as you can and call a trained digital forensic specialist immediately. Time is highly important in digital evidence preservation:

- As a general rule, make sure you do not turn ON a device if it is turned OFF. For computers, make sure you do not change the current status of the device at all. If the device is OFF, it must be kept OFF. If the device is ON, call a forensics expert before turning it off or doing anything.

- If it is not charged, do not charge it; for mobile phones, if the device is ON, power it down to prevent remote wiping on data being overwritten.

- Ensure that you do not leave the device in an open area or other unsecured space. Document where the device is, who has access, and when it is

Related Documents

  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    a) Consent to Search In R v. Wills (1992) the court found the following criteria necessary for a valid consent search: 1. There was consent, expressed or implied; 2. The giver of the consent had the authority to give the consent; 3. The consent was voluntary (not police coerced); 4. The giver of consent was aware of the police conduct; 5.…

    • 1052 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It is impeditive that Forensic Professionals become accustomed to documentation of services early in their career not only for the consideration of ethical guidelines but for legal requirements as well. Forensic Professionals are encouraged to recognize importance of documentation of all data. According to APA Specialty Guidelines for Forensic Professionals, Documentation consist of any forms of proof that maybe subpoenaed for review by the courts or used as a reference during an expert testimony such as, letters, consultations, notes, recordings, transcriptions; assessments, test, scoring reports and interpretations and all other forms of proof major or minor that were created or exchanged. Documentation also consist of obtaining proper consent…

    • 1267 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    List and discuss the five key steps for first responder preservation of evidence. Law enforcement personnel understand the concept of the preservation of evidence, not only is it critical in the prosecution of a criminal case, but the position of evidence plays a factor in the forensics investigation with the cause of death or injury. Unfortunately, other emergency services personnel are not in tune with the importance of preserving evidence because it is not a primary job focus like law enforcement and the lack of education attributes to the disconnect. The more emergency services organizations can work together in the focus of evidence preservation, it will result in positive outcomes and minimize confusion and tensions between organizations.…

    • 1154 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Unnecessary personal health information on thumb drives, CDs or DVDs need to be destroyed. * Limit the access to personal health information to those who really need to see it. * Do what is necessary to prevent theft of equipment containing personal health records. * All passwords should expire in 180 days and all information is to be password-protected.…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The best way to retain the evidence in this case is to secure it in a container and log it into the computer system at the police station. The evidence should stay in the system until after the suspect is charged and has served his time in prison. It will probably be best to keep it at least a year after he is released just in case anything is later…

    • 71 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Computer Forensic Analysis

    • 1326 Words
    • 6 Pages

    All while following stringent guidelines and a plethora of privacy, communications and public safety laws that affect digital forensics. (Easttom, 2014) There are many ways a computer forensics specialist can help the private and public sectors alike. Many companies, law firms, prosecutors, schools, data recovery companies, insurance companies and individuals require computer forensics for assistance in gathering information related to embezzlement, sexual harassment, discrimination, fraud, theft of physical property, theft of intellectual property, network or computer intrusions, employment disputes and inappropriate use of company email and internet. (Easttom,…

    • 1326 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Digital Forensic Analysis

    • 523 Words
    • 3 Pages

    Windows registry is an excellent data source for digital forensic analysis because it is one of the quickest and most efficient uses of the forensic investigators time to decide whether a particular computer is of value to an investigation (especially in cases where multiple unknown computers are of interest). It can contain very rich data about an investigation without too much research and troubleshooting. The Windows registry two main task for the operating system; it stores all the setting for the applications and the operating system itself as well as is stores all the configuration of the hardware on the machine. A forensics investigator can characterize the valuable data from the Windows registry in five groups; system information, application information, network information, attached devices and history list (Alghafli, Jones, & Martin, 2014). The system information will relay all pertinent information about the computer speed, processor, user names, nick names, and shut down…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    We might detest how technology can track our daily lives in ways that might be deemed as unethical to many of us. Yet, when it comes to the greater good technology does definitely aid. Looking back into history, the development of a variety of technological devices have improved our security. CCTV footage helps immensely with surveillance; it helps identify individuals, deter robbery and produce a safe environment for society. In addition, digital footprints while collected without our consent inevitably helps locate and single out individuals that have malicious intentions.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Ryan Smith12/12/17Forensics Final Project Part 1 Task 1) What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation? The Nature of the alleged crime is unauthorized access to 3 photos that belong to Brendan Oliver. The photos were stolen and are being sold without Mr. Oliver’s consent. The nature of the crime influences a prospective investigation because the photos contained some sensitive nature.…

    • 711 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Coroner's Toolkit is a group of basically free tools designed by Wietse Venema and Dan Farmer to be used in the forensic analysis of a UNIX machine. There are several reasons as to why local law enforcement agencies. First, the Coroner's Toolkit is specifically designed to be used in cyber-crime investigation (Farmer & Venema, 2005). This is an exceptionally powerful suite and therefore proper training of UNIX is a major condition in order to manage the Toolkit. Another important reason for purchasing this toolkit is that it helps in reconstructing the activities of an intruder by inspecting the documented times of file accesses and recuperating erased documents.…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Digital Forensic Essay

    • 790 Words
    • 4 Pages

    There are many cases that made use of computer forensic, such as Corey Beantee Melton’case in 2005. Another import branch is mobile device forensic, one famous case is the Brad Cooper in 2008. For both computer and mobile device forensic, they deal with logs such as browser history, email history, call log, and actual file in the device, like pictures and videos. For now, most important files are extracted from computers, however, as Danyl Bosomworth pointed out in his report about mobile marketing, smart phones are getting more and more usage comparing to computers, moreover, nowadays, any $300 worth smart phone is powerful enough for daily use, combining with cloud and internet, people are more likely to put personal data such as pictures, calendars or chat logs in their smart phones due to the easiness and convenience to use, which makes this mobile device forensic more and more important.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Case Study #3 The main goal of a computer forensic investigator is to conduct investigations through the application of evidence gathered from digital data. As a forensic investigator, it’s important to have a strong understanding of the different types of evidence that maybe encountered and the appropriate steps for retrieving and preserving it. The information that is collected during an investigation is extremely fragile and must be properly processed. In order to accomplish this, forensic scientists use a variety of tools to solve computer related crimes.…

    • 1161 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The CSI will walk through taking notes on anything needed for the investigations, things such as fingerprint dusting kit, or blood spatter. After it is noted on what equipment is needed, the true heart of the investigation process beings. “Trace evidence is any material such as hairs, fibers, glass, soil, paint, etc., found at a crime scene on a person or object.” This evidence is then used to help find out more information about the crime committed, such as who was there. When finding the trace evidence it is important the following steps are completed: the written down location, the amount collected, the type of material, the condition of the material, and proper packing to help transport the trace evidence to the lab.…

    • 1708 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Identity Theft Protection

    • 1090 Words
    • 5 Pages

    Keep all digital storage devices and media secured, updated and protected. Install anti-virus software, anti-spyware software, and firewalls on all computers and set preference to update these protections often. This will protect against intrusions and infections that can compromise computer files or passwords. Additionally install recommended manufacturer security patches on loaded operating system(s) and other software programs (Taking charge what, 2013). Keep home network secure and never leave WIFI network(s) unencrypted.…

    • 1090 Words
    • 5 Pages
    Superior Essays