Tuesday, July 22, 2008

Preparing For Computing Investigations


Computer forensic techniques and methodologies are commonly used for conducting computing investigations in the interest of figuring out what happened, when it happened, how it happened, and who was involved. Basically, computing investigations and computing forensics fall into two main categories : Public investigations and Private or Corporate investigations. In both situations, you need to equip yourself with knowledge of the legal rules and systems that govern Forensic Computing investigations. It includes the study of effective strategies for data collection, data preservation, data analysis and reporting of forensic computing investigations.

The task of investigating computers and computer data has increased considerably in the last 5-10 years and also with the use of computers to support ‘conventional’ crime, network security threats and cyber crimes are rising, which mean that computing forensics and security specialists are increasingly valued by government, law enforcement agencies and businesses. Law enforcement administrators historically have encountered significant problems finding individuals who possess technical expertise as well as investigative training.

There are experienced investigators and there are knowledgeable computer specialists, but rarely does one person command both sets of skills. So, both parties must work alongside to enable them to understand the key concepts and to manage the transformation of data collected into a legal case. In order to accomplish these goals, there are well-defined procedures, also derived from law enforcement, for acquiring and analyzing the evidence without damaging it and authenticating the evidence and providing a chain-of-custody that will hold up in court.

Another aspect that you need pay attention to is software used in investigation. Properly use modern forensic software tools to conduct an evidence investigation. To ensure evidence is gathered and preserved so it can be used in court, you will explore legal and ethical issues. Digital forensic evidence has a human side: legal and technical teams must work together, and the result of their efforts normally will be presented to non-specialists who render a decision within the societal framework of a court of law.

So, in general, when conducting a computer investigation, the legal processes you follow depend on local custom, legislative standard, and rules of evidence. It follows three stages: the complaint, the investigation and the procescution. Someone files a complaint, a specialist investigates the complaint and with the help of prosecutor, collects evidence and builds a case. If a crime has been commited, the case is tried in court. That's all you need to prepare youself before investigating a case.

No comments: