150 words agree or dis agree
according to the National Institute of Justice (2008), there are several steps that should take place when processing an electronic crime scene. The first step in processing an electronic crime scene is to secure and evaluate the scene. First responders need to ensure that they do not alter or change the condition of electronic devices located in the area of the crime scene. Protect perishable data (physically and electronically) and identify any phone lines that are attached to the devices. Other physical evidence should be preserved such as those items which may have latent fingerprints.
The second step of the process is to conduct preliminary interviews of persons at the scene of the crime. Data such as passwords, user names, internet service providers and documentation about the hardware and software installed must be obtained from the individuals.
The documentation of the scene is the next step. This includes documentation of the physical scene such as the location of the computer or modem, identifying and documenting electronics that will not be collected, and taking photographs of the entire scene. Evidence collection is also a significant part of the process but this may require a warrant. Careful handling of physical evidence must be exercised. Some pieces of evidence may require special collection, packaging, transporting and storing, for example, antistatic packages and special bags that protect the device from being altered or cleaned remotely. Non-electronic evidence must also be secured and preserved. After the collection of the evidence, the forensic process continues with the next three phases namely, the examination, analysis, and reporting. The examination process helps to make the evidence visible. The origin and significance of such evidence should be explained. Whereas examination is a technical review, analysis of the evidence is performed by the investigative team. The analysis is concerned with the value of the evidence to the case. Lastly, a written report is accomplished which contains all data recovered and the examination process.
Using the Locations of Cell Tower Information in a Criminal Investigation
Due to the nature/design of the cellular network to allow cell phones to talk with multiple nearby cell towers and have those towers evaluate the signal strength of the cell phone, network analysis software can be used to estimate how far a cell phone is from a cell tower. Making locations of cell tower information useful in a criminal investigation to determine the approximate location of a suspect at the time of a crime or in real time. Through the principles of triangulation, if a cell phone talks with three or more cell towers, triangulation software can make an estimate of its geographic position on a three-dimensional plane by using the cell phone’s signal strength from each tower. However, it must be pointed out that this method does not pinpoint precise, exact locations.
Type of Evidence That Can Be Extracted from a Mobile Device
A mobile device contains several data types that can be extracted and used as evidence in mobile forensics. This data includes call detail records, global positioning system (GPS) and location history, application data, short message service (SMS) and text messages, photos, and videos. Call detail records give information on the time the call started and ended, originating and terminating towers, if the call was incoming or outgoing, duration of the call, and who was called and who made the call. GPS on the other hand, can pinpoint previous locations of the criminal and place them in a particular place at a particular time. The app data can access media files, camera, and GPS. SMS and text messages offer information on the date and time of messages and the telephone number of the sender and receiver. Photos and videos are very good sources of evidence depending on their relevance. A mobile device contains valuable data because it stores personal information which gives a glimpse of an individual’s life. It offers digital evidence of a person’s movements and motives.
References
Imam, F. (n.d.). What data types can you collect from a mobile device? Retrieved from https://resources.infosecinstitute.com/category/computerforensics/introduction/mobile forensics/common-mobile-forensics-tools-and-techniques/
National Institute of Justice. (2008). Electronic crime scene investigation – A guide for first responders. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/219941.pdfccording to the National Institute of Justice (2008), there are several steps that should take place when processing an electronic crime scene. The first step in processing an electronic crime scene is to secure and evaluate the scene. First responders need to ensure that they do not alter or change the condition of electronic devices located in the area of the crime scene. Protect perishable data (physically and electronically) and identify any phone lines that are attached to the devices. Other physical evidence should be preserved such as those items which may have latent fingerprints.
The second step of the process is to conduct preliminary interviews of persons at the scene of the crime. Data such as passwords, user names, internet service providers and documentation about the hardware and software installed must be obtained from the individuals.
The documentation of the scene is the next step. This includes documentation of the physical scene such as the location of the computer or modem, identifying and documenting electronics that will not be collected, and taking photographs of the entire scene. Evidence collection is also a significant part of the process but this may require a warrant. Careful handling of physical evidence must be exercised. Some pieces of evidence may require special collection, packaging, transporting and storing, for example, antistatic packages and special bags that protect the device from being altered or cleaned remotely. Non-electronic evidence must also be secured and preserved. After the collection of the evidence, the forensic process continues with the next three phases namely, the examination, analysis, and reporting. The examination process helps to make the evidence visible. The origin and significance of such evidence should be explained. Whereas examination is a technical review, analysis of the evidence is performed by the investigative team. The analysis is concerned with the value of the evidence to the case. Lastly, a written report is accomplished which contains all data recovered and the examination process.
Using the Locations of Cell Tower Information in a Criminal Investigation
Due to the nature/design of the cellular network to allow cell phones to talk with multiple nearby cell towers and have those towers evaluate the signal strength of the cell phone, network analysis software can be used to estimate how far a cell phone is from a cell tower. Making locations of cell tower information useful in a criminal investigation to determine the approximate location of a suspect at the time of a crime or in real time. Through the principles of triangulation, if a cell phone talks with three or more cell towers, triangulation software can make an estimate of its geographic position on a three-dimensional plane by using the cell phone’s signal strength from each tower. However, it must be pointed out that this method does not pinpoint precise, exact locations.
Type of Evidence That Can Be Extracted from a Mobile Device
A mobile device contains several data types that can be extracted and used as evidence in mobile forensics. This data includes call detail records, global positioning system (GPS) and location history, application data, short message service (SMS) and text messages, photos, and videos. Call detail records give information on the time the call started and ended, originating and terminating towers, if the call was incoming or outgoing, duration of the call, and who was called and who made the call. GPS on the other hand, can pinpoint previous locations of the criminal and place them in a particular place at a particular time. The app data can access media files, camera, and GPS. SMS and text messages offer information on the date and time of messages and the telephone number of the sender and receiver. Photos and videos are very good sources of evidence depending on their relevance. A mobile device contains valuable data because it stores personal information which gives a glimpse of an individual’s life. It offers digital evidence of a person’s movements and motives.
References
Imam, F. (n.d.). What data types can you collect from a mobile device? Retrieved from https://resources.infosecinstitute.com/category/computerforensics/introduction/mobile forensics/common-mobile-forensics-tools-and-techniques/
National Institute of Justice. (2008). Electronic crime scene investigation – A guide for first responders. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/219941.pdf