Responding to a computer forensic incident.

Suppose you have recently responded to your first computer forensic incident. The case in question involves a potential underground hacking ring, which the police, working in conjunction with the Federal Bureau of Investigation (FBI) have been investigating for several years. It has since been determined that an IP address confirms that location, and the identity of one of the suspects. Warrants have been issued for search and seizure of all electronic devices found on the premises.

View the setup found in the suspect’s home. Then document your findings and secure all relevant evidence.

Instructions

Write a 2–3 page paper in which you:

Investigate the legal statutes involved in this type of case and outline specific legal consideration to take when collecting evidence.
Pre-plan how to approach the crime scene, documenting the steps and procedures to process the digital evidence.
Analyze the crime scene diagram and document and tag each device that will be collected for evidence, specifying the importance of each device.

Full Answer Section

Legal Considerations

When collecting evidence in a computer forensics case, it is important to take the following legal considerations into account:

  • The Fourth Amendment: Law enforcement must have a warrant to search a person's electronic devices.
  • The SCA: Law enforcement cannot access stored communications without a warrant.
  • The CFAA: Law enforcement cannot access protected computers without a warrant.
  • Chain of custody: The evidence must be properly documented and preserved to ensure that it is admissible in court.
  • Admissibility of evidence: The evidence must be relevant and reliable in order to be admissible in court.

Approach to the Crime Scene

The following steps should be taken when approaching a computer forensics crime scene:

  1. Secure the scene to prevent contamination of the evidence.
  2. Document the scene, including the location of all electronic devices.
  3. Photograph or video record the scene.
  4. Label and tag all electronic devices.
  5. Disconnect all electronic devices from the network.
  6. Transport the electronic devices to a secure location for further analysis.

Crime Scene Diagram

The following devices should be collected for evidence:

  • The suspect's computer
  • Any other computers that were used by the suspect
  • Any storage devices, such as external hard drives, USB drives, or CDs
  • Any mobile devices, such as smartphones or tablets
  • Any documentation related to the hacking, such as chat logs, emails, or files

The importance of each device will depend on the specific case. For example, the suspect's computer may be the most important device if it contains evidence of the hacking. However, other devices, such as storage devices or mobile devices, may also contain important evidence.

Conclusion

The legal statutes and legal considerations outlined in this paper are important to keep in mind when conducting a computer forensics investigation. By following these guidelines, you can help ensure that the evidence you collect is admissible in court.

In addition to the legal considerations, it is also important to have a plan for how to approach the crime scene and collect the evidence. The crime scene diagram can be helpful in this regard. By carefully documenting the scene and labeling and tagging all of the evidence, you can help ensure that the investigation is conducted in a professional and thorough manner.

Sample Answer

The legal statutes involved in this type of case are the Fourth Amendment of the United States Constitution, the Stored Communications Act (SCA), and the Computer Fraud and Abuse Act (CFAA).

The Fourth Amendment protects against unreasonable searches and seizures. This means that law enforcement must have a warrant to search a person's property, including their electronic devices. The warrant must be specific and must be based on probable cause.

The SCA prohibits the unauthorized access of stored communications, such as emails and text messages. The CFAA prohibits the unauthorized access of protected computers.