There are several steps to be taken when collecting digital evidence from the site of a crime scene. First, one should start by getting a legal search warrant from the relevant authority. The warrant gives permission that devices should be physically seized by the authority and also allows an examination to be done on the devices. The second steps involve getting a legal authorization that permits one to search as well as to seize the property and make a record of the chain of custody. This step is important as it ensures the integrity of the devices (Clarke, 2010) . The third step involves acquiring raw data from the device. This step also involves legally preserving and maintaining the integrity of the seized device. This third step is important as it ensures that the device can hold up to the legal standards the law requires. Fourthly, one needs to analyze his/her results (Sheetz, 2013)s . It is important to do such analysis as this enables one to verify if his/her results are true and accurate. The fifth step involves developing a finding for the report. The report one ought to include all the relevant information that might be pertinent to the case.
Upon entering the room where the computers were located, the first thing I did was to document everything that I had seen. These included: what the computers had been plugged into, what was plugged into the computers, the power state of the computers and other devices, where the computer was located, and what I saw on the screen. Once I completed documenting everything, I secured the evidence and then went ahead to create a chain of custody for every item.
Delegate your assignment to our experts and they will do the rest.
Once the pieces of evidence were presented to the laboratory, by went further to document every piece was. This documentation included the model, serial numbers, and the make of each piece. Before doing an invasive analysis, bit-level copies of every storage device was created so as to perform the analysis on them. The original copies were then marked as “original”.
Reference
Clarke, N. (2010). Computer forensics . Ely: IT Governance Pub.
Sheetz, M. (2013). Computer Forensics . Somerset: Wiley.