Investigative Services (ABIS)

A forensic unit within a federal crime lab has been tasked with the investigation of an individual who is suspected of the manufacturing, transportation, and sale of illegal fireworks explosives. Upon responding to a fire at the suspect’s house, firefighters discover 2.5 tons of explosives, and therefore, put out the fire from a distance. When investigators arrive on the scene, several networked computers, PDAs, cell phones, and laptops are found in an upstairs office. As junior investigators, they are unsure of how the fourth and fifth amendments will affect their investigation, search warrants, and the ultimate seizure of these devices. In addition, they are unsure of the standard operating procedures for processing computer evidence within the First and Fourth Amendments' governance, so AB Investigative Services (ABIS) has been contracted to provide guidance in these areas.

Full Answer Section
  • In the context of a computer crime investigation, the Fourth Amendment may be used to challenge the admissibility of digital evidence that was obtained without a warrant. The First Amendment may be used to challenge the admissibility of digital evidence that was obtained if law enforcement believes that you were using your computer to exercise your First Amendment rights.

Standard Operating Procedures for Processing Computer Evidence

The standard operating procedures (SOPs) for processing computer evidence will vary depending on the jurisdiction. However, some common SOPs include:

  • Identifying the digital evidence and determining its potential value to the investigation.
  • Acquiring the digital evidence in a way that preserves its integrity.
  • Examination: The examiner examines the digital evidence to find relevant information.
  • Analysis: The examiner analyzes the information found in the digital evidence to draw conclusions about the crime.
  • Reporting: The examiner reports the findings of the analysis to the investigator.

Chain of Custody

Chain of custody is the process of tracking the movement of digital evidence from the time it is collected to the time it is presented in court. This helps to ensure that the evidence is not tampered with or altered in any way.

The chain of custody should include the following information:

  • Who collected the evidence.
  • When the evidence was collected.
  • How the evidence was collected.
  • Where the evidence was stored.
  • Who had access to the evidence.

Conclusion

The Fourth and Fifth Amendments are important considerations in any computer crime investigation. By following the SOPs and maintaining a proper chain of custody, law enforcement can help to ensure that the digital evidence they collect is admissible in court and that the rights of the accused are protected.

Recommendations

The following are some recommendations for AB Investigative Services (ABIS) to provide guidance to the junior investigators:

  • Explain the Fourth and Fifth Amendments and how they apply to computer crime investigations.
  • Provide the SOPs for processing computer evidence in their jurisdiction.
  • Explain the importance of maintaining a proper chain of custody for digital evidence.
  • Provide training on how to collect, preserve, and analyze digital evidence.
Sample Answer

Here are some things to consider when investigating a computer crime involving explosives:

  • The Fourth Amendment to the United States Constitution protects against unreasonable searches and seizures. This means that law enforcement cannot search or seize your property without a warrant, unless there is probable cause to believe that you have committed a crime.
  • The First Amendment to the United States Constitution protects freedom of speech, religion, press, assembly, and petition. This means that law enforcement cannot search or seize your computer without a warrant if they believe that you are using it to exercise your First Amendment rights.