Chain of custody and evidence preservation Understanding the rules of evidence is an important aspect in planning for processing the crime scene. I will ensure my team has a clear understanding and knowledgeable about the rules and regulations that are applied to digital evidence. My team needs to comply with State and Federal principles of evidence, as well as stay current with latest rulings and directives on collecting, processing, and yielding advanced digital evidence (Luttgen, Pepe, & Mandia, 2014). When managing digital evidence, standard criminology and procedural principles should be followed (Muskasey, Sedgwick, & Hagy, 2001): - The digital evidence should not be changed during the process of collecting, securing, and transporting. …show more content…
Chain of Custody form is an important form filling in as identifying the evidence, identifies individual who handled the evidence, record MD5 and SHA-1 hash value, and date/time when the evidence was handled. In addition, my team with tags and bags to store and document all evidence. If the Chain of Custody is tempered or broken, the evidence might be prohibited in the court and the investigation might be compromised. All step taken to acquire data or changes of evidence must be documented in the Chain of Custody form (Ryder, 2002). For that reason, BMF has the evidence management which includes: where the evidence is collected, record all personnel who handles and processes the evidence to extract the data, guaranteeing secure evidence storage with limited accessibility. If the evidence are misused, the evidence will undoubtedly be voided from the …show more content…
Writing a report that will be utilized in a court is the most important factor of the investigation agent’s obligation. Individuals who read and translate the report are not experts, so all clarifications, conclusions and articulations (especially while portraying factual frequencies or probability of event) ought to be written in plain, clear and basic language to avoid ambiguity or misunderstanding (Maher, 2004). As a suggestion from UMUC in Module 5 of CSEC650: Cybercrime Investigation and Digital Forensics, my team will prepare a written report to include the following