Process Essay: The NYC Computer Forensics

Improved Essays
The NYC computer forensics investigative procedures contain eight stages with electronic tools that are used to support an investigation. The first step that is taken is obtaining a search warrant, & in order to do this there must be probable cause to present to a magistrate. How probable cause is identified is by an investigation, or information obtained in a legal standard& documented by the officer who is seeking the evidence, & he/she must prepare an affidavit that defines the area to be searched, & the evidence being sought (Volonino pp 56). The reason for obtaining a search warrant is so that a defendants Fourth Amendment is not violated.
The only time that an officer has the right to seize anything other than what is in the search warrant, at the time of the search warrant is a search & frisk, &only what is found on that person can be seized. Once the
…show more content…
The electronic tools used would be Safeback, Expert witness, & Snapback, & one of these tools will be used to complete a bit-stream backup that will be performed on the device. Once the drive is backed up, the drive information will then be saved on write optical disks & began a case file.
Two back up disks will be created for in case something were to happen to one of them. Sometimes it can be difficult completing the backups due to the age of the system, format of the drive, double spaced, & new high capacity devices, & if the devices are MaCintosh. Evidence extraction is the third step in the process, & the newest tool in the FIC is the Expert Witness which allows investigators to view evidence through built in content viewers or external views that the user adds, & this is done by using regular expression searches. Case creation is the fourth step, and Expert Witness is also used in this step. This process allows the extracted information to be placed in a case file, on a hard disk, a floppy disk, or removable

Related Documents

  • Improved Essays

    Blood splatter Collection of item: I would remove the dried blood from the surface by using a sterile cotton swab that is lightly moistened with distilled water that is air dried before being placed in a swab box, then I would place it into a paper or manilla envelope. I would store the evidence in a cool location until it was delivered to the laboratory. Processing of item: The analyst will study the mixed blood and through DNA testing he or she should be able to identify who’s blood belongs to whom 10. Body Collection of item: I would take pictures of the body and write a documentation of evidence on the body.…

    • 746 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Christopher, I enjoyed reading your thread, it brings back memories of when I first got started in information technology. I remember seating in class and having to build a computer from ground up, loading the 13 1.68 Mb DMF floppy disk for windows 95; that made a it a two day process. LTO tapes is probably the cheapest and fairly reliable tape backup nowadays, but organizations that are required to keep records for multiple years or medium to large organizations may want to look at other solutions. The current most reliable backup solution is hard disk, SATA, Solid State or Flash drives storage arrays. One of the leading solutions is EMC AVAMAR or Data Domain; both of these solutions can be replicated to another alike device at a DR…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    cases also relates to the Fourth Amendment, which requires "search and seizure" of evidence, also known as the exclusionary rule (Srinivas, 2012, p. 179). The exclusionary rule states that, “Evidence must be collected and analyzed without violating the rights of the defendant; if the rights of the defendant are violated, then the evidence will not be upheld in court” (Srinivas, 2012, p. 179). Savana Redding is a 13-year-old eighth grader enrolled at Safford Middle School. She is an honor student who has no history of disciplinary problems or substance abuse.…

    • 628 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Fourth Amendment Warrants

    • 169 Words
    • 1 Pages

    As followed, searches incident to arrest do not require a warrant if the search is in radius of the suspect. The officer may search the surrounding area for illegal contraband or weapons. Ultimately, to protect the officers around as well as to collect valuable…

    • 169 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    a) Consent to Search In R v. Wills (1992) the court found the following criteria necessary for a valid consent search: 1. There was consent, expressed or implied; 2. The giver of the consent had the authority to give the consent; 3. The consent was voluntary (not police coerced); 4. The giver of consent was aware of the police conduct; 5.…

    • 1052 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This paper argues that the Fourth Amendment effects law enforcement. In criminal cases, it is important that there is substantial evidence to reach a verdict. For the prosecution to obtain such evidence, they must perform a search and seizure. The Fourth Amendment protects citizens from unreasonable and unlawful search and seizures. It states that people have the right to secure their person and property from search and seizure without a warrant.…

    • 931 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The methods or ways which law enforcement can determine whether or not person (s) who granted consent to search someone else’s computer are found in the federal case of “U.S. v. Smith,” which involves a “third-party” consent to search a computer that is “normally” used by the third-party and others. In Smith, police were contacted by Smith’s live-in girlfriend to report that she had found child pornography on Smith’s computer which they “shared.” At the appeal trial, Smith’s attorney argued that Smith’s girlfriend; while she lived with him, did not have the legal authority as stated by the Supreme Court’s (the Court) ruling on exceptions to the Fourth Amendment, to grant consent to the search of his computer. (Knetzger, Michael and Muraski, Jeremy, 2008) (p. 245)…

    • 1746 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    There is a finite line between national security and the privacy of innocent Americans in their day to day lives. The right to have privacy was provided to people when it was installed in the 4th amendment to the constitution. Although the U.S. Government has been stretching out this basic right and invading the privacy right that every American has. The government should not be allowed to freely use surveillance programs to watch over innocent people 's every move. Stated in the 4th amendment there is the right for people “to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.…

    • 1138 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Once the officers’ have obtained everything on the search warrant the search is done. They have to leave the location. Before leaving they will and should inventory all the evidence or items seized, all the people, and people not there, even if the people are not included on the search warrant. The search warrant should have information of where the warrant was issued, names of people who are the witness or that signed the affidavits, the reason why they issued the search warrant, the officer(s) name that requested the search warrant, time of when search will be done, if possible, the name of the judge or magistrate to whom the warrant will be returned to, date it was issued, magistrate or judges signature and their official title. The police may search a person and the immediate surroundings without a search warrant when they arrest someone.…

    • 1567 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Ryan Smith12/12/17Forensics Final Project Part 1 Task 1) What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation? The Nature of the alleged crime is unauthorized access to 3 photos that belong to Brendan Oliver. The photos were stolen and are being sold without Mr. Oliver’s consent. The nature of the crime influences a prospective investigation because the photos contained some sensitive nature.…

    • 711 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    He seeks authorization to search the suspect 's home and any evidence which would connect the suspect to the scheme. The officers walk into the home, and search every inch of the house, and find bundles of cocaine in the bathtub. The law enforcement agent seizes the drugs because they are now in plain view of his search. He was searching for paperwork in relation to a financial scheme the officer now arrest the book the suspect for possession of an illegal substance, with intent to sell, which is a completely unrelated crime. In this example you see that, a warrant stating exactly what they are looking for is needed so that law enforcement agents can 't walk into a residence and search in hopes of finding something illegal regardless to if it 's connected to a crime or not.…

    • 771 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Assignment 5.3: Role of Investigator Introduction Investigators have an immense role in the criminal justice system. They have to ensure they follow due process, as well as, keeping the integrity of the evidence to prove continuity when entered into court. In the QB trial video, R v. Perry and Manitoba (2016), the investigating officer, Constable York, seized four exhibits: a wallet, a Timex watch, a kitchen knife, and a gun replica, which entered into court as physical evidence. Constable York also testified as a key witness, who then had to undergo a cross-examination by the defence counsel.…

    • 964 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The CSI will walk through taking notes on anything needed for the investigations, things such as fingerprint dusting kit, or blood spatter. After it is noted on what equipment is needed, the true heart of the investigation process beings. “Trace evidence is any material such as hairs, fibers, glass, soil, paint, etc., found at a crime scene on a person or object.” This evidence is then used to help find out more information about the crime committed, such as who was there. When finding the trace evidence it is important the following steps are completed: the written down location, the amount collected, the type of material, the condition of the material, and proper packing to help transport the trace evidence to the lab.…

    • 1708 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    Introduction Organizations handle vast amounts of data. A large organization may have to deal with terabytes or petabytes worth of data. For a company to be successful, there must be a meaningful way in which the data that is used as a part of company operations is managed. This includes an effective file management system, in which the files are appropriately secured, and the information is backed up in order to meet company requirements. The files generated as a part of company operations are company property, and as such the information must be managed effectively.…

    • 1077 Words
    • 5 Pages
    Superior Essays