U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cyber Crime Fighting II Digital Evidence Search, Seizure, and Preservation

NCJ Number
212409
Date Published
2005
Length
0 pages
Annotation
This DVD provides instruction for law enforcement officers on how computers are used in various crimes, the types of digital evidence that may be contained in computers, the preservation of digital evidence, and techniques for retrieving digital evidence from suspects' computers.
Abstract
The instruction is divided into four parts. The first part is primarily for first responders to a crime scene. It provides instruction on how computers may be used by criminals to commit crimes; the nature of digital evidence and where it may be found; the securing of the crime scene so that digital evidence is not erased or compromised; and procedures for identifying, handling, and transporting digital evidence. Part II is primarily for investigators involved in computer-related cases. It instructs them in the various methods that criminals use to hide, disguise, or eliminate computer evidence of their crimes. It also suggests investigative techniques that can link computer evidence to a suspect, including techniques for conducting interviews with suspects. Part III is primarily for forensics experts who will examine digital information for evidence. Among the topics addressed are documentation, copying and examining the suspect's computer drives, and techniques for obtaining evidence from corrupted drives. Part IV presents eight case files in which computer evidence played a part in identifying suspects and gaining convictions. The types of crimes involved are the poisoning of a woman, a woman shot to death, a child murdered, a woman beaten to death, identity theft, fraudulent Internet purchases, mystery e-mails, and Internet auction fraud. The format for presenting the instructional material consists of lectures by the host instructor, a listing of learning points after each instructional segment, comments by investigators from across the country who have been involved in computer-related cases, and video footage from actual cases.