Professional Documents
Culture Documents
CYBERCRIME UNIT
CORDILLERA
Identification and Seizure
of Digital/Electronic
Evidence CRI
ME
SCE
NE
VIRTUAL ETIQUETTE FOR
PARTICIPANTS
Be an active listener.
Participate in discussions.
M MUTILATE
A ALTER
C CONTAMINATE
(COLLECTION TECHNIQUE TO PRESERVE
AND PROTECT POTENTIAL EVIDENCE)
MOBILE PHONES and Similar Devices
1. If the power is OFF
a) Do not turn ON;
b) Place phone in a sealed envelope before placing in an evidence
bag to prevent from being turned ON; and
c) If possible, seize the mobile phone charger.
2. If the power is ON
a) Consideration should be given before turning OFF the device
because of passwords/passcodes;
b) Immediately switch to flight mode (Airplane mode) or place
phone on a faraday bag, aluminum foil or signal blocking
container; and
c) If possible, seize the mobile phone charger.
(COLLECTION TECHNIQUE TO PRESERVE
AND PROTECT POTENTIAL EVIDENCE)
COMPUTER/LAPTOPS
1. If the power is OFF
a) Make sure the computer/laptop is powered off otherwise treat it
as one that is switched ON;
b) Photograph everything including system makeup and what
connects with what;
c) Photograph screen;
d) Unplug power from all devices. Remove power lead from the
computer end, not the wall socket end; and
e) Label all connectors on the end of the cable and socket to which
they connect so the system can later be reconstructed.
(COLLECTION TECHNIQUE TO PRESERVE
AND PROTECT POTENTIAL EVIDENCE)
COMPUTER/LAPTOPS
2. If the power is ON
a) If the screen shows a screensaver or is blank, then move the
mouse or pressing the up or down arrow key to restore the
screen;
b) Photograph screen and/or record all program running that you
can see;
c) If a destructive program is running that could cause loss of
evidence (Format, Wipe, Evidence Eliminator type Programs),
pull the power from the back of the evidence;
d) Collect volatile data ( refers to data stored in Random-Access
Memory (RAM));
(COLLECTION TECHNIQUE TO PRESERVE
AND PROTECT POTENTIAL EVIDENCE)
COMPUTER/LAPTOPS
e) If there is any media located in the drives, the media should be
photographed and then removed to protect the evidence from
being destroyed or altered. CD-ROMS may be scratched in
transit and therefore may become unreadable. At this time,
remove any media in the drive bays and place evidence tape
over the drives;
f) Unplug power from all devices. Remove power lead from the
computer end not the wall socket end;
g) Label all connectors on the end of the cable and socket to which
they connect so the system can later be reconstructed.
h) Record all actions performed using working notes
Seizing Electronic Evidence
,
.
When disassembling the computer system,
Label each part and peripherals so it can
be reassembled in court, if necessary.
Use corresponding labels for any cables
or devices that were connected.
Label any empty ports “MTY”
WHERE IS THE EVIDENCE ?
Digital Evidence
֎ Volatile data
֎ Non-volatile data
TYPE OF COMPUTER DATA
Volatile Data
Non-Volatile Data