Incident Scene
Locard’s Exchange Principle - perps leave something behind
Evidence Types
Identification: labeling, recording serial number, etc.
Evidence must be preserved and identifiable
*Collection, documentation, classification, comparison, reconstruction
Evidence Lifecycle
Witnesses that evidence are trustworthy - description of procedures, normal business method collections, error precaution and correction
Best Evidence
Secondary Evidence
Direct Evidence
Conclusive Evidence
- requires no other corroboration
Circumstantial Evidence
- cannot stand on it’s own to directly prove a fact
Corroborative Evidence
Hearsay Evidence
Interviewing
Gather facts and determine the substance of the case
Interrogation
Evidence retrieval method, ultimately obtain a confession
The Process / Due Process
Involves:
Other Notes:
Opinion Rule
Requires witnesses to testify only about the facts of the case, cannot be used as evidence in the case
*context - Federal Rules of Evidence (FRE), a court will permit a person who isn’t testifying as an expert to testify in the form of an opinion if it’s both rationally based on their perception and helps to explain the witness’s testimony
Expert Witnesses
Used to educate the jury and can be used as evidence
Six Principles for Digital Evidence Technicians
Media Analysis
Identification and extraction of information from storage media. May include:
Techniques used for media analysis may include:
Software Analysis
Forensic review of applications or the activity that takes place within a running application.
May need to review and interpret log files from application or database servers, seeking other signs of malicious activity, such as SQL injection attacks, privilege escalations, or other application attacks.
When malicious insiders are suspected, the forensic analyst may be asked to conduct a review of software code, looking for back doors, logic bombs or other vulns.
Hardware / Embedded Device Analysis
Forensic analysts often must review the contents of hardware and embedded devices.
This may include a review of personal computers & smartphones
Admissible Evidence
Five Rules of Evidence
Forensic Disk Controller
Write blocking - intercepts write commands sent to the device and prevents them from modifying data on the device
Return data requested by a read operation
Return access-significant information from device
Reporting errors from device to forensic device.
LOGS TAKEN IN NORMAL COURSE OF BIZ
MOM
Means, opportunity and motive
Victimology
Why certain people are victims of a crime, and how lifestyle affects the chances that a certain person will fall victim to a crime investigation