SlideShare a Scribd company logo
1 of 63
Crime Scene Investigation ,[object Object],[object Object],[object Object]
Conducting the High Tech Raid Planning Resource Collection Practice Review Execution
Crime Scene Investigation ,[object Object],[object Object],[object Object]
Evaluate the scene in advance.  ,[object Object]
Map the area.  LEGEND: 1) Drafting Table  2) File Cabinet  3) Desk 4) Computer 5) Printer 6) Computer 7) Bookshelves 9) Desk 10) Storage Cabinet 11) Chairs 10 9 8 7 3 1 2 11 11 4 5 6 11
Draw out the site or obtain a copy of the floor plan if available ,[object Object]
Determine the type and number of computers and media involved. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Plan what equipment you will need for the raid ,[object Object]
Obtain necessary Hardware/Software ,[object Object],[object Object]
Make sure you have all the items for your tool box, in advance.  ,[object Object]
Prepare a Check List ,[object Object]
Have necessary media for backups and copies.  ,[object Object],[object Object],[object Object],[object Object]
Unforeseen requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
. ,[object Object],[object Object]
Set up Investigative Teams.  ,[object Object],[object Object],[object Object]
Planning S ituation M ission E xecution A venues of approach and escape C ommunication
How to Create a Plan ,[object Object]
SMEAC ,[object Object],[object Object]
SMEAC  ,[object Object],[object Object]
SMEAC  ,[object Object],[object Object]
SMEAC  ,[object Object],[object Object]
SMEAC  ,[object Object],[object Object],[object Object]
  Computer Search Warrant Team ,[object Object]
Computer Search Warrant Team  ,[object Object]
Computer Search Warrant Team  ,[object Object]
Computer Search Warrant Team  ,[object Object]
Case Supervisor ,[object Object]
“ EXPERTS” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ EXPERTS” ,[object Object],[object Object],[object Object],[object Object],[object Object]
Interview Team ,[object Object]
Sketch & Photo Team ,[object Object]
Sketch & Photo Team  ,[object Object]
Note:  When using a video camera,  turn the sound off   ,[object Object],[object Object]
Physical Search Team ,[object Object]
Security and Arrest Team ,[object Object]
Technical Evidence Seizure and Logging Team ,[object Object]
Sketch & Photo Team  ,[object Object]
Sketch & Photo Team ,[object Object]
Sketch & Photo Team  ,[object Object]
Sketch & Photo Team ,[object Object]
Note:Consider skills in handling and recognition of evidence in picking team members.  ,[object Object],[object Object]
The Technical Evidence Seizure and Logging team  ,[object Object]
The Technical Evidence Seizure and Logging team  ,[object Object]
The Technical Evidence Seizure and Logging team ,[object Object]
Assemble the required personnel. ,[object Object],[object Object]
Assign team member responsibilities.  ,[object Object],[object Object]
Assign team member responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Establish a plan of attack.  ,[object Object]
Prepare the Search Warrant.  ,[object Object]
Prepare the Search Warrant.  ,[object Object]
Execute the Warrant  ,[object Object]
Knock and notice.  ,[object Object],[object Object],[object Object],[object Object]
Video Taping ,[object Object],[object Object]
Secure the Scene  ,[object Object],[object Object],[object Object]
Each computer must be physically protected by an officer.   ,[object Object]
Have a location to interview suspects and witnesses.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Teams perform their functions  ,[object Object],[object Object]
Reports are written by one member of each team.  ,[object Object]
Note:  ,[object Object],[object Object]
This bears repeating Document Document Document
Completing the Search  ,[object Object],[object Object],[object Object],[object Object]
Search and Seizure Law ,[object Object],[object Object]
Resources Excerpts from: Investigating Computer Crime Copywrite 1996 by CRC Press Written by Franklin Clark and Ken Diliberto

More Related Content

What's hot

Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video Forensics
Dipika Sengupta
 
Active shooter updated
Active shooter   updatedActive shooter   updated
Active shooter updated
Jim Bane
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentation
Mcypp Ncmf
 
Crime scene preservation
Crime scene preservationCrime scene preservation
Crime scene preservation
gillyann
 
Crime scene sketching basics
Crime scene sketching basicsCrime scene sketching basics
Crime scene sketching basics
nruhland
 
Crime Scene Processing
Crime Scene ProcessingCrime Scene Processing
Crime Scene Processing
warren142
 

What's hot (20)

Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
crime scene investigation
crime scene investigationcrime scene investigation
crime scene investigation
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video Forensics
 
Ambush revised
Ambush  revisedAmbush  revised
Ambush revised
 
First-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.pptFirst-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.ppt
 
3 handcuffing foxtroot
3 handcuffing foxtroot3 handcuffing foxtroot
3 handcuffing foxtroot
 
Active shooter updated
Active shooter   updatedActive shooter   updated
Active shooter updated
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Crime drama script
Crime drama script Crime drama script
Crime drama script
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentation
 
Crime scene preservation
Crime scene preservationCrime scene preservation
Crime scene preservation
 
Crime scene sketching basics
Crime scene sketching basicsCrime scene sketching basics
Crime scene sketching basics
 
Sheppard v. Maxwell
Sheppard v. MaxwellSheppard v. Maxwell
Sheppard v. Maxwell
 
Iwahig prison and penal farm
Iwahig prison and penal farmIwahig prison and penal farm
Iwahig prison and penal farm
 
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
 
NARCO_ANALYSIS.pptx
NARCO_ANALYSIS.pptxNARCO_ANALYSIS.pptx
NARCO_ANALYSIS.pptx
 
Active Shooter Booklet
Active Shooter BookletActive Shooter Booklet
Active Shooter Booklet
 
Crime Prevention and Community Preparedness
Crime Prevention and Community PreparednessCrime Prevention and Community Preparedness
Crime Prevention and Community Preparedness
 
Crime Scene Processing
Crime Scene ProcessingCrime Scene Processing
Crime Scene Processing
 
Police patrol preview
Police patrol previewPolice patrol preview
Police patrol preview
 

Viewers also liked

FIP 128 Ch01
FIP 128 Ch01FIP 128 Ch01
FIP 128 Ch01
parkerjc
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Joe
 
IMT Verification Report Summary
IMT Verification Report SummaryIMT Verification Report Summary
IMT Verification Report Summary
IAGorgph
 
COOP_Igor Nesterenko_Reference
COOP_Igor Nesterenko_ReferenceCOOP_Igor Nesterenko_Reference
COOP_Igor Nesterenko_Reference
Igor Nesterenko
 
Office 1 summary report
Office 1 summary reportOffice 1 summary report
Office 1 summary report
guest87cb3bd
 
Ancient greece murder mystery (3)
Ancient greece murder mystery (3)Ancient greece murder mystery (3)
Ancient greece murder mystery (3)
Ainaramorales
 
Wiki powerpoint
Wiki powerpointWiki powerpoint
Wiki powerpoint
Office6
 
Murder in a country house
Murder in a country houseMurder in a country house
Murder in a country house
maryeugenne2929
 

Viewers also liked (20)

FIP 128 Ch01
FIP 128 Ch01FIP 128 Ch01
FIP 128 Ch01
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
IMT Verification Report Summary
IMT Verification Report SummaryIMT Verification Report Summary
IMT Verification Report Summary
 
Getting-away-with-murder
Getting-away-with-murderGetting-away-with-murder
Getting-away-with-murder
 
COOP_Igor Nesterenko_Reference
COOP_Igor Nesterenko_ReferenceCOOP_Igor Nesterenko_Reference
COOP_Igor Nesterenko_Reference
 
Office 1 summary report
Office 1 summary reportOffice 1 summary report
Office 1 summary report
 
Jefflin Brochure
Jefflin BrochureJefflin Brochure
Jefflin Brochure
 
Ancient greece murder mystery (3)
Ancient greece murder mystery (3)Ancient greece murder mystery (3)
Ancient greece murder mystery (3)
 
r87Homicide
r87Homicider87Homicide
r87Homicide
 
5 Would you really_want_to_be_a_gladiator
5 Would you really_want_to_be_a_gladiator5 Would you really_want_to_be_a_gladiator
5 Would you really_want_to_be_a_gladiator
 
Wiki powerpoint
Wiki powerpointWiki powerpoint
Wiki powerpoint
 
Trabajo de ingles.. gongora
Trabajo de ingles.. gongoraTrabajo de ingles.. gongora
Trabajo de ingles.. gongora
 
4. murder of caesar
4. murder of caesar4. murder of caesar
4. murder of caesar
 
Murder Mystery Game rules
Murder Mystery Game rulesMurder Mystery Game rules
Murder Mystery Game rules
 
Murder in a country house
Murder in a country houseMurder in a country house
Murder in a country house
 
A REVIEW OF BPAT
A REVIEW OF BPATA REVIEW OF BPAT
A REVIEW OF BPAT
 
Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene Investigation
 
Toshiba Investigation Report (Summary)
Toshiba Investigation Report (Summary)Toshiba Investigation Report (Summary)
Toshiba Investigation Report (Summary)
 
The conclusion paragraph
The conclusion paragraphThe conclusion paragraph
The conclusion paragraph
 
Recommendation Report and Proposal Project
Recommendation Report and Proposal ProjectRecommendation Report and Proposal Project
Recommendation Report and Proposal Project
 

Similar to Crime Scene Investigations

Criminal Investigative Team
Criminal Investigative TeamCriminal Investigative Team
Criminal Investigative Team
CTIN
 
Raidprep
RaidprepRaidprep
Raidprep
CTIN
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
gitagrimston
 
Forensic Expert Cross Examination
Forensic Expert Cross ExaminationForensic Expert Cross Examination
Forensic Expert Cross Examination
ivneetsingh
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
feetshoemart
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdf
noelbuddy
 

Similar to Crime Scene Investigations (20)

Criminal Investigative Team
Criminal Investigative TeamCriminal Investigative Team
Criminal Investigative Team
 
Raidprep
RaidprepRaidprep
Raidprep
 
Evidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docxEvidence IdentificationYour initial task in an investigation is .docx
Evidence IdentificationYour initial task in an investigation is .docx
 
Forensic Expert Cross Examination
Forensic Expert Cross ExaminationForensic Expert Cross Examination
Forensic Expert Cross Examination
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
 
Cyber
CyberCyber
Cyber
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
Digital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdfDigital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdf
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdf
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
Evidence Collection Process
Evidence Collection ProcessEvidence Collection Process
Evidence Collection Process
 

More from CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Nra
NraNra
Nra
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 

More from CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 

Recently uploaded

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Crime Scene Investigations

  • 1.
  • 2. Conducting the High Tech Raid Planning Resource Collection Practice Review Execution
  • 3.
  • 4.
  • 5. Map the area. LEGEND: 1) Drafting Table 2) File Cabinet 3) Desk 4) Computer 5) Printer 6) Computer 7) Bookshelves 9) Desk 10) Storage Cabinet 11) Chairs 10 9 8 7 3 1 2 11 11 4 5 6 11
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Planning S ituation M ission E xecution A venues of approach and escape C ommunication
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60. This bears repeating Document Document Document
  • 61.
  • 62.
  • 63. Resources Excerpts from: Investigating Computer Crime Copywrite 1996 by CRC Press Written by Franklin Clark and Ken Diliberto