THE ENHANCED DIGITAL INVESTIGATION ON CRIME SCENE

Size: px
Start display at page:

Download "THE ENHANCED DIGITAL INVESTIGATION ON CRIME SCENE"

Transcription

1 THE ENHANCED DIGITAL INVESTIGATION ON CRIME SCENE SHIVANAND S. ULLEGADDI 1 AND DR. SANTOSH L. DESHPANDE 2 1 M.Tech Scholar, Computer Network Engineering, Dept. Of PG Studies VTU, Belagavi, India 2 Professor, Computer Network Engineering, Dept Of PG Studies VTU, Belagavi, India Abstract The enhanced digital investigation provides tools and techniques that can be used to identify and analyze evidences on crime scene. The article introduces is a layered, consistent and secure approach to digital investigation. The digital investigation shall retrieve to obtain the evidences that will be acceptable by judiciary. The work focused on layered and consistent approach to digital investigation for law enforcement agencies. Present manual investigation process can be altered to get better result. The article deals with unique smart phone based software which aims at identifying activities that facilitate and improve investigation processes that involves in digital investigation like (a) Collection of crime evidences from possible sources of related data like images, video, audio records and notes related to crime in a tamper proof manner. (b)examination of collected evidences as per the investigation procedure which may involve noise removing, evidence extraction from images to gather accurate information.(c)analysis of evidences with legally justifiable methods and techniques of law enforcement agencies to get the relevant information of suspect or victim. (d) Reporting which is the outcome of analysis process which gives proper documentation. The article also provides law enforcement agencies a secure, accurate and consistent means for evidence gathering, including documentation with photographs, audio, video and scene notes. The enhanced digital investigation on crime scene shall eventually improve organization productivity, save time and reduce the number of other devises that investigating officers need to carry for documenting the crime scene. It would also provide scene of control, real time information and better understanding of crime scene to senior officers so they can make out smart decision and better allocate resources for effective crime scene investigation. The result from the evaluation is going to produce a new model to improve the whole investigation process. Keywords crime, evidence, investigation, scene. I. INTRODUCTION The Enhanced Digital investigation on Crime scene reporting is unique smart phone based software which aim to provides law enforcement agencies a secure, accurate and consistent means for evidence gathering, including documentation with photographs, audio, video and scene notes with the help of sensors and well advanced features of a smart phone. The goal of a Enhanced digital crime-scene investigation is to recognize, document and collect evidence at the scene of a crime. Solving the crime will then depend on piecing together the evidence to form a picture of what happened at the crime scene. Some of the evidences get lost soon after the occurrence; the other evidences disappear, gets contaminated or changed with further passage of time. The opportunity to examine the scene is available once, if the same is not fully exploited. The Wealth of information is lost forever. The report must be purely factual. The crime scene investing officials or evidence recovery technician should document what he/she sees, not what he/she thinks. A general description of the crime scene should be given just as the investigator sees it when he/she does the first walk through of the scene. The final report should tell a descriptive story. II. EXISTING INVESTIGATION MODELS The digital investigation is a process that can be modeled with some reasonably established levels. Most proposed digital models have focused on The investigation process and the different levels, they explained the complexity of an investigation and functionality of devices, and the most important principles of an investigation [1]. A. Digital Forensics Research Workshop Investigation Model (DFRWS) Digital Forensic Research Workshop (DFRWS) proposed a model on digital investigation this process has six phases. DFRWS Investigation starts with Identification phase which identify evidences which are available at the crime scene. The next phase comes is Preservation phase aim to setup a proper case management and manage the data from contamination. Evidences related to crime like images, audio, video, notes are preserved for further investigation. 465

2 III. PREFERRED INVESTIGATION MODEL Figure 1: DFRWS Investigation model. The next phase is known as collection where the relevant data are to be collected based on various recovery techniques. Examination and Analysis are the two important phases the task performed are evidence tracing, evidence validation and evidence recovery of hidden/encrypted data. The last phase is presentation phase which is related to documentation of all evidences and submitting to the court for judgment. B. Abstract Digital Investigation Model (ADIM) This model is based on DFRWS model but additional three phases are added this the total phases become nine; the additional phases are preparation, Approach strategy and Returning evidence. considering Preparation phase, activities such as preparing tools, identifying techniques and getting management that support for crime is done. Approach strategy has two major things one is to maximize the acquisition of unturned evidences and at the same time minimize any negative impact to the victim and surrounding people. Returning evidence phase tells us about submitting evidences to court for further investigation and judgment. Figure 2: Abstract digital investigation model. A. Enhanced Digital Investigation on Crime Scene Model (EDICS) There are four main considerations in digital investigation as per the standers shown in figure. 1. Collection: The first phase of investigation is to identify crime scene, label, record and gather data from possible sources of related data. 2. Examination: Data gathered is examined as per the investigation procedure which may be the regular for the investigation officials. 3. Analysis: The next phase is to analyze the result of the examination, using legally justifiable methods and techniques to get the relevant information of suspect or victim. Analysis may include noise removing, evidence extraction from images. Figure 3: Enhanced digital investigation model. 4. Reporting: The final phase is reporting the outcome of analysis, which may include describing the actions taken, describing what are the tools and procedures were selected on investigation [2]. A digital investigation follows certain stages and procedures when working on a case. First identify the crime, along with the object (victim) and other tools used to commit the crime then an investigation officer looking at all the digital evidences builds suitable chain of custody. Once officer recovers all evidences, after evidences has been analyzed the officer must act as an expert witness and present the evidence in court. The investigating officer becomes the tool which law enforcement must use to track and prosecute on criminals [3]. At the outset the crime investigation seems to be very crucial and difficult to solve the situation but the evidences that have to be taking at the crime scene are to be going to propose to find the suspect. At the crime scene, the case investigator and crime scene personal work to define the secure areas that may contain evidences: examine and document the scene; collect physical evidences and images, videos of whole crime scene and tools used to crime. Preserve all evidences for further investigation. Digital investigation will provide exact means of evidences which helps to examine and analyze the case on the basis of strong evidences at crime scene [4]. Digital evidences must be admissible, precise, authenticated and accurate in order to accept by court. Digital evidences are exact in nature and handled properly and carefully. A detailed digital investigation procedure provides important aspects to digital investigation as per the court law. A digital investigation carried out in the form of models this gives an advantage of finding the suspect related to crime. The model can also help to capture the 466

3 expertise of investigation as a basis to the development of advanced tools incorporating techniques such as automated evidence collection [3]. B. Digital Investigation Process (DIP) Figure 4: Digital investigation process. In Acquisition phase, evidences are to be gathered in acceptable manner with proper approval from the authority which is followed by identification phase where the task is to identify the evidences which leads to suspect and convert them to the format which is understood by human. The evaluation phase comprise of the task to determine whether the evidences identified in the previous phase is needed relevant to the case being investigated and the case further be lead to suspect. In final phase that is Admission the acquired and extracted evidences are presented in the court of law [4]. C. Ease of Use Collecting physical evidence from a scene can help an investigator recreate the crime scene and establish the sequence of events. Physical evidence can also corroborate statements made by the victim, suspects and witnesses [5]. Various Scene that can be documented while crime scene reporting Burglars Suicides Fires Auto thefts Auto accidents. Data transfer to server carried out through online or high speed data cable. B. Centralized Server The data collected using Mobile Application from the jurisdictions of various police stations will get accumulated in the central server, which Can be accessed by supervisors at any level from the Police Station up to state or country. Accordingly the reporting tool loaded in the central server provides the facility for analysis and generation of reports about the crime scene situation in the jurisdiction of a police station up to a state/province or the country as a whole. The user is free to choose the period for which the data is to be analyzed and reported. Thus this reporting tool provides a comprehensive report by cross classifying the crime data for the user selected period (duration) and selected jurisdiction (area/network: district, city, province, etc) including causal analysis. These secured and scientific data on crime scene, collected and managed with greater ease, are expected to revolutionize in solving the crimes. Server application from where all or selected cases can be viewed and can add the further instructions to the officers to proceed with case. List of all cases can be viewed: Location wise on MAP Category wise (Thefts, Murder, etc) Officer wise Case number wise / Date of Offence wise Data Transfer: Crime details collected from the scene of crime can be transferred online from mobile phone to server connecting through internet or can be transferred offline connecting mobile phone through data cable to server IV. PROPOSED WORK AND METHODOLOGY The proposed article explores a complete electronic record of all cases, scenes and ensures that you have a centralized place for all of your data in any environment. The regular routine of manual investigation pretended to a high magnified level which emphasis the real time investigation in better way. The work aimed to help the investigating agencies to be accurate and consistent means of evidence collection, examination, analysis and reporting. Because data is to be centralized, this gives all accumulated information to the investigating agencies which comes under jurisdictions of various police stations up to state or country. The proposed system will have two modules A. Mobile Application An android smart phone is an important aspect in which the proposed application is to be installed; this can be carried by police officer s on the field. Smart phone is expected to operate with a high speed, High resolution camera (audio/video), Smart storage capacity, 3G network facility to fetch location. The application is built in such a way that user pretend the case in all the directions and capture most possible evidences and put them to server with one touch. C. Schematic Diagram of Enhanced Digital Investigation on Crime scene System Figure 5: Architecture of Enhanced Digital Investigation System. D. Post implementation benefits and another features Productivity: once implemented would increase the productivity and reduce the time required to document the scene drastically. 467

4 Data security: From the instance evidence is collected is locked and transferred to the centralized server/cloud. Easy access to seniors: The data once transferred to the server/cloud can be easily accessed by the senior officers moreover the crime scenes can be searched by desired parameter like location, type of crime etc Empower filed force: system would reduce the need of carrying too many devices while caring out crime scene investigation. It would also reduce a lot of paper work and time spent on compiling reports. Transparency: Eliminate any possibility of manipulation of crime scene or evidence and give almost real time visibility to senior officers. E. Results and Discussions The enhanced digital investigation on crime scene gives perfect figures of crime with different analysis methods which give glance about the cases registered some of standard analysis techniques used are listed below. Severity level analysis Severity is mentioned while the case being registered. The graph deals with three severity levels high, low, medium. The analysis pretends the investigating officials to control over crime. Date crime analysis Case type analysis History of different case types like robbery, rape case, murder has been seen on one screen with graph. It clearly shows the comparison among different case category. This type of analysis over crime investigation helps investigating officials to analyze about different types of crime. V. CONCLUSION The enhanced digital crime scene investigation system will be an enhanced version is defined to redefine forensic process in crime scene. It describe the development right from the point when the initial infrastructure is put in place, to investigations when the incident is reported, through the trace back phases that would lead to the point where the crime was committed and finally to the ultimate investigations that would lead to conclusive interpretations of the evidence collected and also will helps law enforcement agencies (police) to monitor the crime scene on real time which will quickly gather the information of a crime and also higher authority will come to know the information of crime happened in particular area by sending auto generated message. Once the evidences are stored in cloud or at SP/IGP servers, the evidences are secured for longer time and no changes are made on the evidences. This proposed article is fully electronic way of investigating a crime which helps the officials to analyze the case and conclude it within less time efficiently. Thus Enhanced digital investigation on crime scene is best suitable for digital crime scene investigation. REFERENCES Date crime analysis gives detail idea about number of case registered on particular date. This helps investigating agencies to link with different crimes to get evidences. [1] Yunus Yusoff, Roshan Ismail and Zainuddin Hassan, Common Phases of Computer Forensics Investigation Models International Journal of Computer Science and Information Technology (IJCSIT), Vol 3, No 3, June 2011, pp 18,19. [2] Inkipo O. Ademu, Dr Chris O. Imfiden, Dr David S. Preston A new Approach of digital Forensics Model for Digital Forensics Investigation International Journal of advanced Computer science and Applications(IJACSA) Vol 2, No 12, 2011, pp 176. [3] Sabah Al-Fedaghi and Bashayer Al-Babtain Modeling the Forensics process, International Journal of Security and its Applications, Vol 6, No 4, October. 2012, pp

5 [4] Norulzahrah M. Zainudin, Madjid merabti, David Llewellyn-Jones, ISBN: 2010 PGNet A Digital Forensics Investigation Model for Online Social Networking unpublished. [5] Saferstein, Richard. A Simplified Guide to Crime Scene Investigation. 469

Survey on Different Phases of Digital Forensics Investigation Models

Survey on Different Phases of Digital Forensics Investigation Models Survey on Different Phases of Digital Forensics Investigation Models Priya S. Patil 1, Prof. A. S. Kapse 2 P. R. Patil College of Engineering and Technology, Amravati, India ABSTRACT: Most forensics models

More information

CRIME SCENE INVESTIGATION

CRIME SCENE INVESTIGATION CRIME SCENE INVESTIGATION CHAPTER 2 Mr. Moss 1 CRIME SCENE INVESTIGATION Crime scenes tell a story Crime scene investigators must be careful and systematic Crime scene investigators must follow protocol

More information

1/26/15. Chapter 2 Crime Scene

1/26/15. Chapter 2 Crime Scene Chapter 2 Crime Scene Chapter 2 Crime Scene By the end of this chapter you will be able to: By the end of this chapter you will be able to: Investigation and Evidence Collection 1 Investigation and Evidence

More information

COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS

COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS Yunus Yusoff, Roslan Ismail and Zainuddin Hassan College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia yunusy@uniten.edu.my,

More information

The Enhanced Digital Investigation Process Model

The Enhanced Digital Investigation Process Model The Enhanced Digital Investigation Process Model Venansius Baryamureeba and Florence Tushabe barya@ics.mak.ac.ug, tushabe@ics.mak.ac.ug Institute of Computer Science, Makerere University P.O.Box 7062,

More information

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict

More information

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 1811 Occupational Series is Marked by Support

More information

East Haven Police Department

East Haven Police Department East Haven Police Department Type of Directive: Policies & Procedures No. 410.2 Subject/Title: Issue Date: Preliminary Criminal Investigations July 29, 2014 Effective Date: References/Attachments: N/A

More information

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.

More information

Using Your Pocket Notebook

Using Your Pocket Notebook Using Your Pocket Notebook Introduction Much of a police officer s time is spent gathering facts and evidence that will be used in court to support a criminal prosecution. The pocket notebook is used to

More information

Sufficiency of Windows Event log as Evidence in Digital Forensics

Sufficiency of Windows Event log as Evidence in Digital Forensics Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK

More information

LAW ENFORCEMENT OFFICER

LAW ENFORCEMENT OFFICER Class Code: 7824 TITLE: REPORTS TO: SUPERVISES: Law Enforcement Officer Grade 21 Director Law Enforcement N/A JOB FUNCTION: Perform a variety of law enforcement activities for an assigned school District

More information

SAULT COLLEGE SAULT STE. MARIE, ONTARIO COURSE OUTLINE

SAULT COLLEGE SAULT STE. MARIE, ONTARIO COURSE OUTLINE SAULT COLLEGE SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Introduction to Applied Forensic Science CODE NO. : NRL 210 SEMESTER: 2 PROGRAM: AUTHOR: Natural Resources/Environmental Law Inspection

More information

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Information Technology Audit & Forensic Techniques. CMA Amit Kumar Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques

More information

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene

More information

Crime scene evidence who is involved? Police officer and SOCO (Scenes of Crime Officer) or CSI (Crime Scene Investigator)

Crime scene evidence who is involved? Police officer and SOCO (Scenes of Crime Officer) or CSI (Crime Scene Investigator) Police officer and SOCO (Scenes of Crime Officer) or CSI (Crime Scene Investigator) Task 1 Police officers and SOCOs both attend crime scenes, but they have different jobs to do. Read the statements from

More information

Course Forensic Science. Unit II History

Course Forensic Science. Unit II History Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History

More information

POLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II

POLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II CITY OF ROSEVILLE POLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II DEFINITION To perform a variety of technical and specialized duties related to the investigation of crimes and traffic accidents;

More information

Rules and Procedures. Rule 312 August 23, 2001. Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES

Rules and Procedures. Rule 312 August 23, 2001. Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES Rules and Procedures Rule 312 August 23, 2001 Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES Rule 312, Crime Laboratory - Evidence and Crime Scenes, is hereby re-issued to establish Police Department

More information

TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631)

TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) 1. Initiates investigations of alleged loss or theft of department property such as inventory, assets, and/or cash after notification of such

More information

Mobile Audio/Video Recorder Policy

Mobile Audio/Video Recorder Policy Mobile Audio/Video Recorder Policy 446.1 PURPOSE AND SCOPE The Fort Collins Police Services has equipped selected vehicles and officers with a Mobile Audio/Video Recording (MAV) system and also allows

More information

Anti-human trafficking manual for criminal justice practitioners. Module 11

Anti-human trafficking manual for criminal justice practitioners. Module 11 Anti-human trafficking manual for criminal justice practitioners Module 11 11 UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Anti-human trafficking manual for criminal justice practitioners Module 11:

More information

CITY OF CARLSBAD CLASS SPECIFICATION COMMUNITY SERVICE OFFICER I /II

CITY OF CARLSBAD CLASS SPECIFICATION COMMUNITY SERVICE OFFICER I /II CITY OF CARLSBAD CLASS SPECIFICATION JOB TITLE: DEPARTMENT: COMMUNITY SERVICE OFFICER I /II POLICE BASIC FUNCTION: Under direct supervision, performs a variety of routine community service, paraprofessional

More information

Evidence Technician s School

Evidence Technician s School Evidence Technician s School Program Overview The Evidence Technician s School is designed to provide your Evidence Technician or Crime Scene Investigator with a sound foundation of the basic principles

More information

CRIME SCENE INVESTIGATION AND FORENSIC SCIENCE TRAINING PROGRAMMES

CRIME SCENE INVESTIGATION AND FORENSIC SCIENCE TRAINING PROGRAMMES CRIME SCENE INVESTIGATION AND FORENSIC SCIENCE TRAINING PROGRAMMES Broadstone Mill Broadstone Road Stockport Manchester SK4 5HS Tel: +44 (0) 871 99 88 777 Email: enquiries@pgitraining.com Visit: www. pgitraining.com

More information

Introduction to Crime Scene Dynamics

Introduction to Crime Scene Dynamics Chapter 1 Introduction to Crime Scene Dynamics OVERVIEW The development of the field of forensics has been a process steeped in science and research. On the other hand, the practice of crime scene investigation

More information

Crime Scene Search and Processing

Crime Scene Search and Processing Objective: Crime Scene Search and Processing Crime scene search scenarios involve significant teamwork. Each team member should be assigned a specific duty during the crime scene processing. Explorers

More information

Dudesville: A crime scene under the microscope. QUT Extreme Science

Dudesville: A crime scene under the microscope. QUT Extreme Science Dudesville: A crime scene under the microscope QUT Extreme Science Glossary QUT Extreme Science DNA Chromatography Forensic Science Locard s Principle (Deoxyribonucleic acid) an extremely long macromolecule

More information

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings: BOR 6432 Cybersecurity and the Constitution Course Description This course examines the scope of cybercrime and its impact on today s system of criminal justice. Topics to be studied include: cybercrime

More information

Computer Forensics: an approach to evidence in cyberspace

Computer Forensics: an approach to evidence in cyberspace Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based

More information

COMMUNITY SERVICES OFFICER

COMMUNITY SERVICES OFFICER COMMUNITY SERVICES OFFICER Class specifications are intended to present a descriptive list of the range of duties performed by employees in the class. Specifications are not intended to reflect all duties

More information

Copyright and Terms of Service

Copyright and Terms of Service Forensic Science Copyright and Terms of Service Copyright Texas Education Agency, 2011. These materials are copyrighted and trademarked as the property of the Texas Education Agency (TEA) and may not be

More information

Reporting the crime to the police

Reporting the crime to the police Section 4 Reporting the crime to the police Why report the crime to the police? It is your choice whether you report the crime to the police. Some people choose not to report or may not report straight

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

On Integrating Mobile Applications into the Digital Forensic Investigative Process

On Integrating Mobile Applications into the Digital Forensic Investigative Process On Integrating Mobile Applications into the Digital Forensic Investigative Process April Tanner, Ph.D. Department of Computer Science Jackson State University Jackson, USA Soniael Duncan Department of

More information

Florida Fish and Wildlife Conservation Commission Division of Law Enforcement ACCIDENT INVESTIGATIONS AND DEATH NOTIFICATION

Florida Fish and Wildlife Conservation Commission Division of Law Enforcement ACCIDENT INVESTIGATIONS AND DEATH NOTIFICATION Florida Fish and Wildlife Conservation Commission Division of Law Enforcement TITLE ACCIDENT INVESTIGATIONS AND DEATH NOTIFICATION APPLICABILITY ALL MEMBERS GENERAL ORDER 29 EFFECTIVE DATE December 1,

More information

CAREER: FORENSIC SCIENCE TECHNICIAN 1

CAREER: FORENSIC SCIENCE TECHNICIAN 1 CAREER: FORENSIC SCIENCE TECHNICIAN 1 Career: Forensic Science Technician Mary C. Cartwright Middlesex Community College CRJ 111-52 Heloisa DaCunha November 29, 2012 CAREER: FORENSIC SCIENCE TECHNICIAN

More information

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,

More information

A Victim s Guide to Understanding the Criminal Justice System

A Victim s Guide to Understanding the Criminal Justice System A Victim s Guide to Understanding the Criminal Justice System The Bartholomew County Prosecutor s Office Victim Assistance Program Prosecutor: William Nash 234 Washington Street Columbus, IN 47201 Telephone:

More information

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES CLASS TITLE POSITION CODE STATE POLICE EVIDENCE TECHNICIAN I 41901 STATE POLICE EVIDENCE TECHNICIAN

More information

Goal to recognize, document and collect evidence at a crime scene

Goal to recognize, document and collect evidence at a crime scene Crime Scene Investigation and Evidence Collection Lecture Credits: Anthony (Bud) Bertino Goal to recognize, document and collect evidence at a crime scene Sherlock Holmes» Sir Arthur Conan Doyle in the

More information

How To Solve A Violent Home Invasion With A United Force

How To Solve A Violent Home Invasion With A United Force Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone

More information

Guidelines on Digital Forensic Procedures for OLAF Staff

Guidelines on Digital Forensic Procedures for OLAF Staff Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to

More information

Spoliation of Evidence. Prepared for:

Spoliation of Evidence. Prepared for: Spoliation of Evidence Prepared for: Spoliation Nationwide anti-spoliation trend Cases can be thrown out of court Insurers can be denied subrogation claims An insured who destroys evidence of a claim can

More information

Ten Deadly Sins of Computer Forensics

Ten Deadly Sins of Computer Forensics Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This

More information

Open Source Digital Forensics Tools

Open Source Digital Forensics Tools The Legal Argument 1 carrier@cerias.purdue.edu Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a

More information

Digital and Cloud Forensics

Digital and Cloud Forensics Digital and Cloud Forensics Stavros Simou Cultural Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, University Hill, GR 81100 Mytilene, Greece ssimou@aegean.gr

More information

8 Interpreting Crime Data and Statistics

8 Interpreting Crime Data and Statistics 8 Interpreting Crime Data and Statistics Rachel Boba T he goal of this chapter is to provide knowledge of how to appropriately apply and interpret statistics relevant to crime analysis. This chapter includes

More information

STATE OF MONTANA DEPARTMENT OF CORRECTIONS POLICY DIRECTIVE

STATE OF MONTANA DEPARTMENT OF CORRECTIONS POLICY DIRECTIVE STATE OF MONTANA DEPARTMENT OF CORRECTIONS POLICY DIRECTIVE Subject: CRIME SCENE AND PHYSICAL EVIDENCE Policy No. DOC 3.1.28 PRESERVATION Chapter 3: FACILITY / PROGRAM OPERATIONS Page 1 of 6 Section 1:

More information

Comparative Analysis of Digital Forensic Models

Comparative Analysis of Digital Forensic Models Journal of Advances in Computer Networks, Vol. 3, No. 1, March 2015 Comparative of Digital Forensic s Fakeeha Jafari Rabail Shafique Satti process s are: : Evidences can be collected in this phase : on

More information

Concepts of digital forensics

Concepts of digital forensics Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence

More information

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics for Attorneys Overview of Digital Forensics Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence

More information

Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/

Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Note that not every case goes through all of the steps outlined here. Some states have different procedures. I. Pre-Trial Crimes that would

More information

Investigation Techniques

Investigation Techniques Investigation Techniques Sources of Information 2016 Association of Certified Fraud Examiners, Inc. Internal vs. External Internal sources may be all that s available (accounting and business tax records,

More information

Framework for a Digital Forensic Investigation

Framework for a Digital Forensic Investigation Framework for a Digital Forensic Investigation Michael Kohn 1, JHP Eloff 2 and MS Olivier 3 1 mkohn@cs.up.ac.za, 2 eloff@cs.up.ac.za, 3 molivier@cs.up.ac.za Information and Computer Security Architectures

More information

Key Crime Analysis Data Sources. Crime

Key Crime Analysis Data Sources. Crime Part 2 Processes of Crime Analysis coming into the police agency, but those dispatched to or initiated by officers. Because of the vast information contained in a CAD system, information is often purged

More information

Cell Phone Forensics For Legal Professionals

Cell Phone Forensics For Legal Professionals 1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones

More information

Management of Crime Scenes

Management of Crime Scenes Management of Crime Scenes When the Call comes Document date, time, information received, and your actions and responses Prepare yourself Be calm Be safe Think Upon Arrival Duty to render aid Duty to protect

More information

LAW ENFORCEMENT OFFICER, GS-1802-05

LAW ENFORCEMENT OFFICER, GS-1802-05 Standard Job No. N1017 LAW ENFORCEMENT OFFICER, GS-1802-05 Introduction The incumbent of this position is responsible for performing full-time law enforcement duties including detection, apprehension,

More information

RISK MANAGEMENT SERVICES Office of The Executive Vice President & COO Allan F. Brooks, M.A, CPCU, ARM, Director, Risk Management

RISK MANAGEMENT SERVICES Office of The Executive Vice President & COO Allan F. Brooks, M.A, CPCU, ARM, Director, Risk Management Incident/Accident Reporting Policy and Procedure Helping to Ensure Your Safety and Health at Chapman University Purpose Accident/incident investigations are necessary to identify causation and to help

More information

Development of Forensic Nursing in Australia: Associate Professor Linda Saunders 4 th December 2008

Development of Forensic Nursing in Australia: Associate Professor Linda Saunders 4 th December 2008 Development of Forensic Nursing in Australia: Associate Professor Linda Saunders 4 th December 2008 Working with Offenders Country Total Criminal Population Population Australia 20,090,437 22,458 Canada

More information

Recording of Custodial Interrogations. Municipal Police Training Council. Model Policy. www.criminaljustice.ny.gov

Recording of Custodial Interrogations. Municipal Police Training Council. Model Policy. www.criminaljustice.ny.gov Recording of Custodial Interrogations NEW YORK STATE DIVISION OF CRIMINAL JUSTICE SERVICES 80 South Swan Street Albany, New York 12210 www.criminaljustice.ny.gov STATE OF NEW YORK Division of Criminal

More information

TEXAS CRIME ANALYSIS 2

TEXAS CRIME ANALYSIS 2 2011 CRIME IN TEXAS TEXAS CRIME ANALYSIS 2 CRIME MEASUREMENTS Crime affects every Texan in some fashion. To gain a measurement of crime trends, Texas participates in the Uniform Crime Reporting (UCR) program.

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE SUPERVISORY CRIMINAL INVESTIGATOR II 43* D 13.241 SUPERVISORY CRIMINAL INVESTIGATOR

More information

Accident/Near Miss Investigation Guidelines

Accident/Near Miss Investigation Guidelines Accident/Near Miss Investigation Guidelines Accident Investigation Introduction An accident, incident or near miss has occurred, now what? Whether it is an accident, incident or near miss, it is imperative

More information

Digital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices.

Digital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices. Digital Forensics Ravneet Kaur, Amandeep Kaur Assistant Professor in Computer Science SDSPM College for Women, Rayya (Asr) Guru Nanak Dev University, India International Journal of Computer Applications

More information

HUNTINGTON WOODS DEPARTMENT OF PUBLIC SAFETY GOALS AND OBJECTIVES PROGRAM DETAIL

HUNTINGTON WOODS DEPARTMENT OF PUBLIC SAFETY GOALS AND OBJECTIVES PROGRAM DETAIL The following presents a detailed outline of goals and objectives of this Department organized by Department function. It is intended to provide a guideline for use in assessing progress in attaining the

More information

Cloud Digital Investigations based on a Virtual Machine Computer History Model

Cloud Digital Investigations based on a Virtual Machine Computer History Model Cloud Digital Investigations based on a Virtual Machine Computer History Model Sean Thorpe 1, Indrajit Ray 2, Tyrone Grandison 3, Abbie Barbir 4 1 Faculty of Engineering & Computing, University of Technology,

More information

5) Familiarity of witness with exhibit for identification

5) Familiarity of witness with exhibit for identification Medical Records: If the custodian of records delivers them by subpoena, pursuant to N.C. Gen. Stat. 1A- 1, Rule 45(c)(2), for the sole purpose of delivering the medial records, the custodian need not appear

More information

CRIME SCENE MANAGEMENT: A GUIDE FOR LICENSEES

CRIME SCENE MANAGEMENT: A GUIDE FOR LICENSEES CRIME SCENE MANAGEMENT: A GUIDE FOR LICENSEES Produced by the Thames Valley Police Licensing Team March 2012 2 i n t r o d u c t i o n The key to the successful investigation is the gathering and securing

More information

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer. Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,

More information

GLOBAL INCIDENT & AUDIT MANAGEMENT SOFTWARE

GLOBAL INCIDENT & AUDIT MANAGEMENT SOFTWARE GLOBAL INCIDENT & AUDIT MANAGEMENT SOFTWARE LOSS PREVENTION What would you do with $31 billion? THAT S HOW MUCH MONEY IS LOST TO THEFT, ACCOUNTING ERRORS, VENDOR FRAUD AND ORGANIZED CRIME (ORC) LP Software

More information

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal

More information

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in 1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies

More information

1. Abstract. 2. The Problem / Need for the Program

1. Abstract. 2. The Problem / Need for the Program Program Information: Montgomery County, Maryland Program Title: A GIS Platform for Emergency Management and Response: Common Operational Pictures (COP) Program Category: # 14, Information Technology 1.

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

Design and Implementation of a Live-analysis Digital Forensic System

Design and Implementation of a Live-analysis Digital Forensic System Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan amber8520@gmail.com

More information

70250 Graduate Certificate in Digital Forensics

70250 Graduate Certificate in Digital Forensics 70250 Graduate Certificate in Digital Forensics Course overview The certificate course was inspired by experienced practitioners working in academia and the field of Digital Forensics, who saw the benefits

More information

To Catch a Thief: Computer Forensics in the Classroom

To Catch a Thief: Computer Forensics in the Classroom To Catch a Thief: Computer Forensics in the Classroom Anna Carlin acarlin@csupomona.edu Steven S. Curl scurl@csupomona.edu Daniel Manson dmanson@csupomona.edu Computer Information Systems Department California

More information

NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)

NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP) NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP) Sundresan Perumal 1, and Norita Md Norwawi. 2 1 Universiti Sains Islam Malaysia,sundresan@hotmail.com 2 Universiti Sains Islam Malaysia,

More information

Chapter TEXAS CRIME ANALYSIS

Chapter TEXAS CRIME ANALYSIS Chapter 2 TEXAS CRIME ANALYSIS 2007 CRIME IN TEXAS TEXAS CRIME ANALYSIS 2 CRIME MEASUREMENTS Crime affects every Texan in some fashion. To gain a measurement of crime trends, Texas participates in the

More information

UML MODELLING OF DIGITAL FORENSIC PROCESS MODELS (DFPMs)

UML MODELLING OF DIGITAL FORENSIC PROCESS MODELS (DFPMs) UML MODELLING OF DIGITAL FORENSIC PROCESS MODELS (DFPMs) Michael Köhn 1, J.H.P. Eloff 2, MS Olivier 3 1,2,3 Information and Computer Security Architectures (ICSA) Research Group Department of Computer

More information

Cyber Forensic for Hadoop based Cloud System

Cyber Forensic for Hadoop based Cloud System Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division

More information

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence

More information

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015 `STATE OF OHIO (DAS) CLASSIFICATION SPECIFICATION SERIES PURPOSE CLASSIFICATION SERIES Medicaid Special Agent MAJOR AGENCIES Attorney General Only SERIES NUMBER 2614AG EFFECTIVE 11/15/2015 The purpose

More information

Voice and data recording Red Box makes it easier than you imagine

Voice and data recording Red Box makes it easier than you imagine Voice and data recording Red Box makes it easier than you imagine SIMPLER SMARTER VOICE If you re reading this, there s a good chance your organization has to record phone calls, radio conversations or

More information

STATE POLICE TROOPER

STATE POLICE TROOPER JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE TROOPER Employees in this job are police officers, responsible for the enforcement of all traffic and criminal laws of the

More information

Instructions for the Incident/Accident Investigation Form (SORM-703)

Instructions for the Incident/Accident Investigation Form (SORM-703) Instructions for the Incident/Accident Investigation Form (SORM-703) Purpose of Form: Effective loss control efforts require documentation of incidents and accidents to determine hazards or problem areas,

More information

Republic of Latvia State Police Forensic Service Department

Republic of Latvia State Police Forensic Service Department With the financial support of the Prevention of and Fight against Crime Programme European Commission Directorate General Home Affairs Republic of Latvia State Police Forensic Service Department implements

More information

Model Policy on Eyewitness Identification

Model Policy on Eyewitness Identification Model Policy on Eyewitness Identification I. Purpose The purpose of this model policy is to outline proper protocol for eyewitness identification procedures for photographic, show-up, and live lineup identifications

More information

Chain of evidence refers to the continuity of custody of material and items collected as evidence.

Chain of evidence refers to the continuity of custody of material and items collected as evidence. University of Wisconsin Madison Police Policy: 83.2 SUBJECT: EVIDENCE PROCESSING EFFECTIVE DATE: 06/01/10 REVISED DATE: 12/31/11, 11/01/13 REVIEWED DATE: 01/07/15 INDEX: 83.2.1 COLLECTING, PROCESSING,

More information

White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011

White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011 White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011 FBI 2009 Report: 1,756 terabytes of data processed 58,609 pieces of digital media 21,810 CDs

More information

Frequently Asked Questions - FAQ s

Frequently Asked Questions - FAQ s Frequently Asked Questions - FAQ s For information on how to report a crime CLICK HERE For information on contact details for Garda Stations CLICK HERE FAQ s (Sourced from Crime Victims Helpline) 1. What

More information

Digital Evidence Collection and Use. CS 585 Fall 2009

Digital Evidence Collection and Use. CS 585 Fall 2009 Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

Getting Physical with the Digital Investigation Process

Getting Physical with the Digital Investigation Process Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this

More information

Providing leading edge digital forensic services with proven experience and expertise

Providing leading edge digital forensic services with proven experience and expertise Providing leading edge digital forensic services with proven experience and expertise Today s prevalence of electronic data demands a reliable proven solution. At CY4OR, we provide a leading edge service

More information

Crime in Arkansas 2001

Crime in Arkansas 2001 State of Arkansas Mike Huckabee Governor Arkansas Crime Information Center Crime in Arkansas A publication of the Statistical Analysis Center Special Services Division Arkansas Crime Information Center

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information