Flashcards in Highfill - 392 - Policies and Procedures - Investigative Procedures Deck (26)
If an officer/detective comes into contact with any digital media device which meets ___________ standards or the device may contain evidence, they should first seek
____________ by completing a ___________, and have the form signed by the owner or the authorized agent of the device.
consent to search
Consent to Search Computer(s), Computer Peripherals, & Related Audiovisual or Digital Media/Devices Form (P-0527)
Form P-0527 should be _______________ and stored in the ___________.
Note that consent to search ______ valid if the PIN or password to the device is not provided.
retained as evidence
Property and Evidence Facility
Regardless of computer knowledge or technical aptitude, an officer/detective __________ search through any digital device or request a complainant, victim, or suspect to search any device acting as an agent of the Jacksonville Sheriff’s Office (JSO). Any search done in this manner could render the evidence ________ in court.
Any ___________ who searches through a digital device (scrolling through cell phone image gallery, searching computer internet history, etc.) will __________ in an Incident or Supplement Report.
document the actions taken
If Consent to Search Form (P-0527) cannot be obtained, and there exists exigency
and/or facts are known to indicate a crime has been committed using the digital device, __________. A _________ can be obtained later to conduct an examination of the device.
seize the device
An officer/detective attempting to obtain a search warrant should consult with a ________________ to ensure that a properly structured and worded search warrant is drafted.
Digital Forensic Examiner
An officer/detective should ________ inform the owner/agent of a digital device to remove or delete any item(s) from a digital device.
If data, image, or digital evidence is ___________ on a computer or mobile device
screen, the officer/detective should if possible _____________ of what is in plain
view, without manipulating the digital device and consult a digital forensic examiner.
in plain view
take a photograph
An officer/detective not assigned to the Computer Forensic Investigations Unit ________
guess or otherwise make __________ to enter the unknown password of a locked
Blindly attempting to enter a device may ________ or ________ the device, without warning, and cause permanent evidence destruction that could have been otherwise obtained during
a forensic analysis.
If the digital device is OFF, ____________.
leave it OFF
If the digital device is ON, document _________, _______, and _______, without imputing
data into the device.
If the digital device is ON, _______ or _________ into the device.
There may be times when this cannot be avoided. If this happens, document ________
used and document ______ this step was necessary.
do NOT type
An officer/detective should NOT ______ or _______ any type of software or hardware (i.e., flash/thumb drives, external hard drives, etc.).
When collecting a desktop computer: if it is ON, _________ and simply unplug the power cord from the back of the computer.
*** However, if the computer is on and there is an articulable belief that hard drive(s) are encrypted, ____________ the computer.
Instead, consult with the on-call digital forensic examiner. Encryption may be an issue if the subject of the investigation displays computer knowledge that exceeds that of an average user.
leave it ON
do NOT unplug or power off
When collecting a laptop computer: if it is ON, __________ and ____________ first,
then the power cord. Upon removal, do NOT reinsert the battery to prevent accidental
start-up. The same policy concerning encryption applies.
leave it ON
remove the battery
Cellular phones and mobile devices (eReaders, tablets, GPS, etc.) should be collected in
the same manner as laptops. Remove the _________ from the device and do ____ reinsert
it. This will prevent remote wipe and GPS tracking by the device owner.
Cellular phones and mobile devices considering that powering off the device
may require __________ when powered back on, it is imperative to obtain the password
before turning the device off.
Cell phone and mobile devices: If removing the battery is ________; turn off the device and wrap it in at least ____ layers of aluminum foil. Note, however, that doing so while the device is powered on will quickly drain the battery and could cause damage due to overheating.
To prevent evidence tampering and destruction of digital evidence, _________ search through it. Scrolling through __________, __________, and _________ can modify metadata that is vital to the investigation and cannot be unchanged.
messages, images and other files
If a seized/obtained device may need a password to gain entry, the _______ receiving the device shall ask the possessor/owner of the device for the ____________.
An officer/detective should document the name of the individual who provided the information about a seized device even if the password is ________.
unknown or refused
If a device's password is a ________, document the pattern and have it confirmed by the possessor/owner of the device.
Investigations involving computers or any other related device where individuals have user profiles (user accounts), require the investigating officer/detective to obtain all of the user _______ and ________ used on the device.
When computers are submitted for analysis, the case agent or detective must submit a searchable _________ to the digital forensic examiner conducting the analysis.