About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Politics
Anarchism
Central Intelligence Agency (CIA)
Corporatarchy - Rule by the Corporations
Economic Documents
Federal Bureau of Investigation (FBI)
Foreign Military & Intelligence Agencies
Green Planet
International Banking / Money Laundering
Libertarianism
National Security Agency (NSA)
Police State
Political Documents
Political Spew
Right to Keep and Bear Arms
Terrorists and Freedom Fighters
The Nixon Project
The World Beyond the U.S.A.
U.S. Military
Technology
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Best Practices for Seizing Electronic Evidence

by Secret Service

BEST PRACTICES FOR SEIZING ELECTRONIC EVIDENCE A Joint Project of the International Association of Chiefs of Police and the United States Secret Service

Outline
Purpose
Introduction
Recognizing Potential Evidence
Preparing for the Search and/or Seizure
Conducting the Search and/or Seizure
Secure the Scene
Secure the Computer as Evidence
Other Electronic Storage Devices
Wireless Telephones
Electronic Paging Devices
Facsimile Machines
Caller ID Devices
Smart Cards
Tracing an Internet E-mail
About this Publication
Credits
Feedback Contact

Purpose

To develop a basic understanding of key technical and legal factors regarding searching and seizing electronic storage devices and media.

Introduction

Scope of the Problem

As computers and related storage and communication devices proliferate in our society, so does the use of those devices in conducting criminal activities. Technology is employed by criminals as a means of communication, a tool for theft and extortion, and a repository to hide incriminating evidence or contraband materials. Law enforcement officers must possess up-to-date knowledge and equipment to effectively investigate today's criminal activity. The law enforcement community is challenged by the task of identifying, investigating and prosecuting individuals and organizations that use these and other emerging technologies to support their illicit operations.

Recognizing Potential Evidence

Computers and digital media are increasingly involved in unlawful activities. The computer may be contraband, fruits of the crime, a tool of the offense, or a storage container holding evidence of the offense. Investigation of any criminal activity may produce electronic evidence. Computers and related evidence range from the mainframe computer to the pocket-sized personal data assistant to the floppy diskette, CD or the smallest electronic chip device. Images, audio, text and other data on these media are easily altered or destroyed. It is imperative that law enforcement officers recognize, protect, seize and search such devices in accordance with applicable statutes, policies and best practices and guidelines.

Answers to the following questions will better determine the role of the computer in the crime:

Is the computer contraband of fruits of a crime?

For example, was the computer software or hardware stolen?

Is the computer system a tool of the offense?

For example, was the system actively used by the defendant to commit the offense? Were fake IDs or other counterfeit documents prepared using the computer, scanner, and color printer?

Is the computer system only incidental to the offense, i.e., being used to store evidence of the offense?

For example, is a drug dealer maintaining his trafficking records in his computer?

Is the computer system both instrumental to the offense and a storage device for evidence?

For example did the computer hacker use her computer to attack other systems and also use it to store stolen credit card information?

Once the computer's role is understood, the following essential questions should be answered:

  • Is there probable cause to seize hardware?
  • Is there probable cause to seize software?
  • Is there probable cause to seize data?
  • Where will this search be conducted?

For example, is it practical to search the computer system on site or must the examination be conducted at a field office or lab?

If law enforcement officers remove the system from the premises to conduct the search, must they return the computer system, or copies of the seized date, to its owner/user before trial?

Considering the incredible storage capacities of computers, how will experts search this data in an efficient, timely manner?

Preparing for the Search and/or Seizure

Using evidence obtained from a computer in a legal proceeding requires:

Probable cause for issuance of a warrant or an exception to the warrant requirement.

Caution: If you encounter potential evidence that may be outside the scope of your existing warrant or legal authority, contact your agency's legal advisor or prosecutor as an additional warrant may be necessary.

Use of appropriate collection techniques so as not to alter or destroy evidence.

Forensic examination of the system completed by trained personnel in a speedy fashion, with expert testimony available at trial.

Conducting the Search and/or Seizure

Once the computer's role is understood and legal requirements are fulfilled:

Secure the Scene

  • Officer safety is paramount.
  • Preserve area for potential fingerprints.
  • Immediately restrict access to computer(s).
  • Isolate from phone lines (because data on the computer can be access remotely).

Secure the Computer as Evidence

  • If computer is "OFF", do not turn "ON".
  • If computer is "ON"
    • Stand-alone computer (non-networked)
      • Consult computer specialist
      • If specialist is not available
        • Photograph screen, then disconnect all power sources; unplug from the wall AND the back of the computer.
        • Place evidence tape over each drive slot.
        • Photograph/diagram and label back of computer components with existing connections.
        • Label all connectors/cable end to allow reassembly as needed.
        • If transport is required, package components and transport/store components as fragile cargo.
        • Keep away from magnets, radio transmitters and otherwise hostile environments.
    • Networked or business computers
      • Consult a Computer Specialist for further assistance
  • Pulling the plug could:
    • Severely damage the system
    • Disrupt legitimate business
    • Create officer and department liability

Other Electronic Storage Devices

Electronic devices may contain viable evidence associated with criminal activity. Unless an emergency exists, the device should not be accessed. Should it be necessary to access the device, all actions associated with the manipulation of the device should be noted in order to document the chain of custody and insure its admission in court.

Wireless Telephones

Potential Evidence Contained in Wireless Devices:

  • Numbers called
  • Numbers stored for speed dial
  • Caller ID for incoming calls

Other information contained in the memory of wireless telephones:

  • Phone/pager numbers
  • Names and addresses
  • PIN numbers
  • Voice mail access number
  • Voice mail password
  • Debit card numbers
  • Calling card numbers
  • E-mail/Internet access information
  • The on screen image may contain other valuable information

On/Off Rule

  • If the device is "ON", do NOT turn it "OFF".
  • Turning it "OFF" could activate lockout feature.
  • Write down all information on display (photograph if possible).
  • Power down prior to transport (take any power supply cords present).
  • If the device is "OFF", leave it "OFF".
  • Turning it on could alter evidence on device (same as computers).
  • Upon seizure get it to an expert as soon as possible or contact local service provider.
  • If an expert is unavailable, USE A DIFFERENT TELEPHONE and contact 1-800-LAWBUST (a 24:7 service provided by the cellular telephone industry).
  • Make every effort to locate any instruction manuals pertaining to the device.

Electronic Paging Devices

Potential Evidence Contained in Paging Devices:

  • Numeric pagers (receives only numeric digits; can be used to communicate numbers and code)
  • Alpha numeric pagers (receives numbers and letters and can carry full text)
  • Voice Pagers (can transmit voice communications (sometimes in addition to alpha numeric)
  • 2-way pagers (containing incoming and outgoing messages)

Best Practices

  • Once pager is no longer in proximity to suspect - turn it off. Continued access to electron communication over pager without proper authorization can be construed as unlawful interception of electronic communication.
  • Search of stored contents of pager.
  • Incident to arrest
  • With probable cause + exception
  • With consent

Facsimile Machines

Fax machines can contain:

  • Speed dial lists
  • Stored faxes (incoming and outgoing)
  • Fax transmission logs (incoming and outgoing)
  • Header line
  • Clock setting

Best practices

  • If fax machine is found "ON", powering down may cause loss of last number dialed and/or stored faxes.

Other Considerations - Search issues

  • Record telephone line number fax is plugged into
  • Header line should be the same as the phone line; user sets header line.
  • All manuals should be seized with equipment, if possible.

Caller ID Devices

  • May contain telephone and subscriber information from incoming telephone calls.
  • Interruption of the power supply to the device may cause loss of data if not protected by internal battery backup.
  • Document all stored data prior to seizure or loss of data may occur.

Smart Cards

A plastic card the size of a standard credit card that holds a microprocessor (chip) which is capable of storing monetary value and other information.

Awareness

  • Physical characteristics of the card
  • Photograph of the smart card
  • Label and identify characteristics.
  • Features similar to credit card/driver's license.
  • Detect possible alteration or tampering during same examination.

Uses of Smart Cards

  • Point of sale transactions
  • Direct exchange of value between cardholders
  • Exchange of value over the Internet
  • ATM capabilities
  • Capable of storing other data and files similar to a computer

Circumstances Raising Suspicion Concerning Smart Cards

  • Same as credit cards
  • Numerous cards (different names or same issuing vendor)
  • Signs of tampering (cards can be found in the presence of computer or other electronic devices)

Questions to Ask When Encountering Smart Cards

  • Who is card issued to (the valid cardholder)?
  • Who issued the card?
  • What are the uses of the cards?
  • Why does the person have numerous cards?
  • Can this computer or device alter the card?

Other Considerations

Smart Card technology is used in some cellular phones and may be found in or with cellular devices (see Wireless section)

Tracing an Internet E-mail

When an internet e-mail message is sent, the user typically controls only the recipient line(s) (To and Bcc) and the Subject line.

Mail software adds the rest of the header information as it is processed. Reading an E-mail Header:

----- Message header follows -----
(1) Return-path:
(2) Received: from o167832.cc.army.mil by nps.navy.mil (4.1/SMI-4.1) id AAO868O; Thur, 7 Nov 96 17:51:49 PST
(3) Received: from localhost byo167832.navy.mil (4.1/SMI-4.1) id AA16514; Thur 7 Nov 96 17:50:53 PST
(4) Message-ID: <[email protected]>
(5) Date: Thur, 7 Nov 1996 17:50:53 -0800 (PST)
(6) From: "M. Bottoms"
(7) To: Tom Whitt
(8) Cc: Real 3D , Denis Adams , Joe Arion Line (1) tells other computers who really sent the message and where to send error messages (bounces and warning).

Line (2) and (3) show the route the message took from sending to delivery. Each computer that receives this message adds a Received field with its complete address and time stamp; this helps in tracking delivery problems.

Line (4) is the Message-ID, a unique identifier for this specific message. This ID is logged, and can be traced through computers on the message route if there is a need to track the mail.

Line (5) shows the date, time, and time zone when the message was sent.

Line (6) tells the name and e-mail address of the message originator (the "sender").

Line (7) shows the name and e-mail address of the primary recipient; the address may be for a:
mailing list,
system-wide alias,
a personal username.

Line (8) lists the names and e-mail addresses of the "courtesy copy" recipients of the message. There may be "Bcc:" recipients as well; these "blind carbon copy" recipients get copies of the message, but their names and addresses are not visible in the headers.

About this Publication

The Best Practices for Seizing Electronic Evidence was developed as a project of the International Association of Chiefs facilitated Advisory Committee for Police Investigative Operations. The Committee convened a working group of a variety of law enforcement representatives, facilitated by the United States Secret Service, to identify common issues encountered in today's crime scenes. This manual was developed by representatives from the following agencies:

Alexandria, Virginia Police Department
Boston, Massachusetts Police Department
Baltimore County Police Department
Clarkstown, New York Police Department
Department of Justice - Computer Crimes & Intellectual Property Section
Florida Department of Law Enforcement
Florida Statewide Prosecutors Office
High Intensity Drug Trafficking Area (HIDTA) Program
Los Angeles County District Attorneys Office
Los Angeles Police Department
Lubbock, Texas Police Department
Maryland Heights, Missouri Police Department
National Association of Attorneys General
National Institute of Justice
National Sheriffs Association
New Jersey Division of Criminal Justice
New York City Police Department
New York County District Attorneys Office
New York State Organized Crime Task Force
Provo, Utah Police Department
Richardson, Texas Police Department
Rockland County New York District Attorneys Office
St. Louis County Police Department
United States Secret Service
Utah County Attorneys Office

Feedback

If you have comments on this manual, please send an email to [email protected].

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Why Marxism IS Economically Exploitive...
Situation in Turkey
Putin not playing nicely
So, I hear they have Mcdonalds in China...
china? russia? usa?
I have created..
Universal Health Care Why Are you Against it?
Armchair POTUS
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS