CHFI

Writing-th- Investigation-Report-&-Testifying-in-the-Court-Room

Writing the Investigation Report & Testifying in the Court Room

In this article explain Writing the Investigation Report , Testifying in the Court Room & Closing the Case in detail. Writing the Investigation Report Report writing is a crucial stage in the outcome of the investigation, as it summarizes all the investigation process into a readable report, presented to a court of law. Based on the accuracy and certainty of this report, the court will prosecute the suspects. The report should be clear, concise, and …

Writing the Investigation Report & Testifying in the Court Room Read More »

Data-Analysis-&-Evidence-Assessment

Data Analysis & Evidence Assessment

Data Analysis & Evidence Assessment refers to the process of going through the data and finding the relevant evidential data and its relevance to the crime. This section will explain the process of analyzing the data in order to use it for proving the crime and the perpetrator. Data Analysis Data analysis refers to the process of examining, identifying, separating, converting, and modeling data to isolate useful information. In forensic investigation, the data analysis helps …

Data Analysis & Evidence Assessment Read More »

Duplicate-the-Data-&-Recover-Data-Lost

Duplicate the Data & Recover Data Lost

Duplicate the Data & Recover Data Lost this article explain in investigation evidence how should be duplicate data should be recover and which software are use for recovery data. Duplicate the Data (Imaging) Performing the investigation on the original evidence can misdirect the investigation to different results and could make the original evidence vulnerable. Data duplication is an important step in securing the original evidence. Investigating the original evidence can cause damage to the identity …

Duplicate the Data & Recover Data Lost Read More »

Understand-the-Chain-of-Custody-and-It’s-Importance

Understand the Chain of Custody and It’s Importance

Understand the Chain of Custody and It’s Importance In this Chain of custody is a legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory. It is a roadmap that shows how investigators collected, analyzed, and preserved the evidence. The investigators need to present this document in court. It ensures accurate auditing of the original data evidence, imaging of the source media, tracking of the …

Understand the Chain of Custody and It’s Importance Read More »

Declarant-Unavailable

Declarant Unavailable

Declarant Unavailable in this article explain principle for declarant unavailable and rules 1002,1003 and 1004. Following are the principles for Hearsay Exceptions; if Declarant is Unavailable 1. Definition of unavailability: Unavailability as a witness” includes situations during which the declarant: is exempted by ruling of the court on the bottom of privilege from testifying concerning the topic matter of the declarant’s statement; or persists in refusing to testify concerning the topic matter of the declarant’s …

Declarant Unavailable Read More »

Availability-of-Declarant-Immaterial

Availability of Declarant Immaterial

Availability of Declarant Immaterial in this article explain twenty three rules for declarant witness. The following are not excluded by the hearsay rule, even though the declarant is available as a witness: 1. Present sense impression: a press release describing or explaining an occasion or condition made while the declarant was perceiving the event or condition, or immediately thereafter. 2. Excited utterance: a press release concerning a startling event or condition made while the declarant …

Availability of Declarant Immaterial Read More »

Rules-of-Evidence

Rules of Evidence

In Rules of Evidence prior to the investigation, it’s important for the investigator to know the principles of evidence. The submission of evidence during a proceeding , especially in computer crime cases, can have major challenges. Specific knowledge is required to gather , preserve, and transport the evidence because the evidence obtained from a cybercrime case might vary from the normal sorts of evidence. Often, evidence related to computer crimes is within the sort of …

Rules of Evidence Read More »

computer-forensic-investigation

Collect Physical Evidence in computer forensic investigation

The victim computer and its elements are vital evidence sources in a computer forensic investigation. Collect all the electronic devices or any other media found at the crime scene. Seize storage devices like hard drives, memory cards, and removable media as they can have stored information. Handheld devices like smart phones, mobile phones, PDAs, digital multimedia devices, and GPS receivers can have valuable evidence information like Internet browsing history, e-mails, chat logs and friend lists, …

Collect Physical Evidence in computer forensic investigation Read More »

Planning-the-Search-and-Seizure-of-investigation

Planning the Search and Seizure of investigation

Planning the Search and Seizure of investigation in this investigators need to design a strategic process to conduct the search and seizure process after analyzing the crime scene. This will help them distribute tasks between the team members to complete the seizure and allow the team to use time and tools in a well-defined manner. Initial Search of the Scene Once the forensic team has arrived at the scene and unloaded their equipment, they will …

Planning the Search and Seizure of investigation Read More »

Documenting-the-Electronic-Crime-Scene

Documenting the Electronic Crime Scene

Documenting the Electronic Crime Scene is necessary to maintain a record of all the forensic investigation processes applied to identify, extract, analyze, and preserve the evidence. The details should include location of the crime, status of the system, connected network devices, storage media, smart phones, mobile phones, PDAs, Internet and network access, The document will help trace the serial numbers or other identifiers of the procured devices. Documenting also includes taking photographs, video, notes, and …

Documenting the Electronic Crime Scene Read More »