2 Mistakes to Avoid with Digital Evidence

Digital devices are so versatile that every crime scene entails one or more components of digital evidence. Conducting a proper forensic analysis on this very kind of evidence can surely take some time, but it is usually the actions undertaken during the initial evidence-gathering stage that has the power of making or breaking the case. While experts like Elijaht m&a due diligence often avoid mistakes, it is important to be aware of some of the most common errors committed with digital evidence whether you’re working with a professional agency or not. You’re welcome!

 

  • Not being able to isolate a seized mobile phone from cellular or wireless networks

 

The gist of seizing a device is to analyze and investigate the info contained in it, but having control over a device doesn’t mean you have control over its data. If the mobile can connect to any network, the data it contains is posed at risk. Mobiles are syncing on a consistent basis with cloud based services that store all data. The background process has the power of corrupting or ruining digital evidence. This very feature doesn’t need much in the way of technical knowledge to implement. If the device is on and accessible, then you just have to turn off access to any remote connection by putting it on airplane mode. If the mobile is on and not accessible, you can switch the phone off and remove the battery.

 

  • Turning on a computer

 

When a computer is seized, it is tempting to immediately search for evidence. In cases of an immediate threat or terrorism, you may need to power on a computer to do so. But, with the many background processes that could be running, this is often a mistake in terms of the proper handling of digital evidence, since you cannot put a stop to background processes. Even though they may not affect the particular evidence that is essential to the case, the fact that the system is connected to the web means the info is at risk of being remotely deleted or altered. If the system is off, and you don’t need to, don’t turn it on. Digital forensic examiners use a specific equipment that lets them access the storage of a computer system without turning the computer on. Many labs have mobile or field versions of this equipment to perform an on-scene analysis that does not result in the corruption of the evidence. This means that, when planning a seizure, you need to plan ahead if you will need instant access to info on a computer or a hard drive.

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Captcha Here : *

Reload Image