Monday, July 29, 2019
Interoffice Memo Essay Example | Topics and Well Written Essays - 2000 words
Interoffice Memo - Essay Example I do believe that law enforcement agents can be an asset in this field of investigation where digital evidence need to be handled with care much like any physical evidence should be handled in order to be assured that evidence would not be tampered with from the time it is collected unto the time that the evidence is used in court. As you have informed me, your team is not computer-trained. This should not stop your team from broadening the scope of their responsibility. It used to be that only people who are highly trained in computers are able to assist in such cases of crime as involves computers or data objects found in computer files. However, due to the proliferation of computer crimes in recent years, it has become quite impractical to be only employing the "experts" as it slows down the investigation process. It is not only impractical; it becomes quite unreasonable to have a few experts perform these duties by themselves (O'Shea, n.d.). Thus it has become necessary that law enforcement agents also be involved in the "chain of custody" in a crime scene where computers are directly involved. In this connection it would be a good thing to come together and discuss vital issues on the management of digital evidence. Your law enforcement team could undergo basic training on how to recognize, seize, transport and store original evidence in order to preserve it for forensic examination. Details of this training will be discussed in a meeting that I hope to soon have with your team. But in a nutshell, let me lay out what I hope would give you an overview of how your law enforcement team could participate in the investigation of the case at hand. Seizure Methodology Let us discuss seizure methodology. Traditionally, the first thing that must be done is to secure the physical scene, followed by securing the digital scene. In such a scenario, "all hardware and media are seized, documented, labeled and packaged for delivery to the lab" (O'Shea, n.d.). In the lab, all seized data is analyzed. This is the simplest chain of duties to be done. This, however, works well if there is only a single computer or a few computers involved. In our case where a number of computers are involved, the methodology becomes a bit more detailed because seizing all the computers would be quite impractical to do. In the event where there are a handful of computers involved, the following steps are involved: digital media identification, prioritizing the physical media so as to minimize the crime scene and then the seizure of storage devices and media. In digital media identification we simply try to find the digital media that has the highest probability of having the much sought after evidence. After the identification of all possible media involved, it must be determined which among these contain information leading to the crime. It would be impractical to get all the devices at the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.