Digital Evidence for First Responders Flashcards Preview

CITP Test 3 > Digital Evidence for First Responders > Flashcards

Flashcards in Digital Evidence for First Responders Deck (11):
1

Name the four uses of computers in criminal activity

1. As a target of a crime
2. As the instrument or tool of criminal activity
3. As repositories of evidence and other information
4. As the fruit of criminal activity, or the results of computer operations can be fruit of a crime

2

What are the four roles of computers as a target of a crime?

1. Embezzlement
2. Espionage (theft of national security data)
3. Terrorism (destruction of critical systems)
4. Software Piracy/theft

3

What are the four roles of computers as the instrument or tool of criminal activity?

1. Solicitation of minors
2. Electronic stalking
3. Identity theft
4. Credit card scams

4

What are four types of information stored on computers and other electronic devices?

1. Photographs (pedophilia)
2. Address books
3. Call records
4. Temporary internet files

5

What are three types of fruit of criminal activity generated from computers?

1. Counterfeit credit cards
2. Computer-generated reports
3. Counterfeited cell phones

6

What are some electronic devices that may contain evidence?

1. Computers
2. Cell phones
3. PDA's
4. Pagers
5. Laptop Computers
6. Digital Cameras
7. MP3 Players
8. External Storage Devices
9. Bluetooth Interfaces
10. Flash Memory
11. Optical media (CDs, DVDs, Blue-ray Disks)
12. Jaz and Zip Disks
13. Wireless Routers
14. Off-line Storage
15. Networks and Network Servers

7

What are four ways electronic evidence may be altered or destroyed?

1. Magnets
2. Electro-Static Discharge
3. Extreme temperatures
4. Water

8

What are some non-electronic related items that may be important in the investigation of an electronic crime?

1. Latent fingerprints
2. DNA samples
3. Trace evidence (fibers, etc.)
4. Software documentation
5. Computer-generated reports
6. Magazines and Letters to tie the subject to the workstation
7. Photographs
8. Address books
9. List of passwords or access codes
10. All notes and paper scraps at the computer workstation

9

If a computer is off, what should you do?

Leave it off

10

If a computer is on, what should you do?

Record anything on the computer screen
Pull the plug, battery

11

What are the four rules for cell phones?

1. leave on or off if on or off,
2. use the faraday bag,
3. bring all cabling and accessories,
4. don't remove from the faraday bay for analysis until in a lab suited for it