Forensic Examination of Digital Evidence

28.06.2016 Views

FORENSIC EXAMINATION OF DIGITAL EVIDENCE: A GUIDE FOR LAW ENFORCEMENT Example 3: Department of Maryland State Police Computer Forensic Laboratory Department of Maryland State Police Computer Forensic Laboratory REQUEST FOR SERVICE TELEPHONE 410-290-1620 FAX 410-290-1831 7155 C Columbia Gateway Drive, Columbia, Maryland 21046 Date Submitted: MSP Complaint Control #: Submitting Agency: Address: County: Agency Case #: Submitting Officer ID#: E-mail Address: Telephone: Location Seized: Date Seized: Agency Property #: Case Title: Suspect's Last Name, First Name, MI: Sex: Age: Tracking Number: M F Crime: Date of Offense: Date Charges Filed: Court Date: Court / Location: Owner of Property - Name: Address: Telephone: Type of Seizure: (Circle) Search Warrant Consent Administrative Federal Grand Jury Other: Number of Computers: CCU Consulted Reference Seizure: (Attach a copy of the Search Warrant Affidavit and the Inventory/Return) Has this evidence been previoulsy viewed, accessed, and/or examined by anyone? (Explain) Yes No Are you aware of any pirvileged information contained within the evidence being submitted for examination? Explain) Yes No Are you aware of any other information related to the evidence being submitted? (Explain) Yes No Urgent Request for Examination Date Request Received: Person Making Request - Name / Title Telephone # where you can be reached: Date Analysis Needed: Reason for Request: (Except for Imminent Court dates, ALL Urgent requests must be accompanied by a letter of justification.) SERVICE REQUESTED: (Requests for field service must be received at least 2 business days prior to search) INSTRUCTIONS Please prepare one form for each search site (address). Please provide ALL requested information and note any unusual circumstance in the "Service Requested" area. Please attach a Request for Laboratory Examination Chain of Custody Log (MSP Form 67) and a copy of your agency /installation Property Record, listing each container or package submitted as evidence. Please attach a Detailed Summary of suspect information, which includes personal data, e-mail addresses, nicknames, screen names, passwords, target websites, accomplices, and a list of unique keywords relevant to your investigation. LABORATORY USE ONLY: LabCASE #: Date Case Received: Received by: Case Priority: Priority Established by: 1 2 3 4 5 57

Appendix E. Legal Resources List Publications Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Washington, D.C.: U.S. Department of Justice, Computer Crime and Intellectual Property Section, July 2002. (Online under http://www.cybercrime. gov/searching.html#A.) Prosecuting Cases That Involve Computers: A Resource for State and Local Prosecutors (CD-ROM), National White Collar Crime Center, 2001. (See http://www.nctp.org and http://www. training.nw3c.org for information). Forward Edge: Computer Training on Seizing Electronic Evidence (CD-ROM), U.S. Secret Service, 2001. (Contact your local U.S. Secret Service office.) Legislation Electronic Communications Privacy Act (ECPA). 18 USC 2510 et seq.; 18 USC 2701 et seq.; 18 USC 3121 et seq. Privacy Protection Act (PPA). 42 USC 2000aa et seq. USA PATRIOT ACT of 2001, Public Law 107-56, amended statutes relevant to computer investigations. Statutes amended include 18 USC 1030; 18 USC 2510 et seq.; 18 USC 2701 et seq.; 18 USC 3121 et seq.; and 47 USC 551. Web sites Computer Crime and Intellectual Property Section of the U.S. Department of Justice, 202–514–1026, http://www.cybercrime.gov. National Cybercrime Training Partnership, 877–628–7674, http://www.nctp.org. http://www.forensicsweb.com/downloads/ cfid/isplist/isplist.htm 59

Appendix E. Legal Resources List<br />

Publications<br />

Searching and Seizing Computers and<br />

Obtaining Electronic <strong>Evidence</strong> in Criminal<br />

Investigations. Washington, D.C.: U.S.<br />

Department <strong>of</strong> Justice, Computer Crime<br />

and Intellectual Property Section, July 2002.<br />

(Online under http://www.cybercrime.<br />

gov/searching.html#A.)<br />

Prosecuting Cases That Involve<br />

Computers: A Resource for State and<br />

Local Prosecutors (CD-ROM), National<br />

White Collar Crime Center, 2001. (See<br />

http://www.nctp.org and http://www.<br />

training.nw3c.org for information).<br />

Forward Edge: Computer Training on<br />

Seizing Electronic <strong>Evidence</strong> (CD-ROM),<br />

U.S. Secret Service, 2001. (Contact your<br />

local U.S. Secret Service <strong>of</strong>fice.)<br />

Legislation<br />

Electronic Communications Privacy Act<br />

(ECPA). 18 USC 2510 et seq.; 18 USC<br />

2701 et seq.; 18 USC 3121 et seq.<br />

Privacy Protection Act (PPA). 42 USC<br />

2000aa et seq.<br />

USA PATRIOT ACT <strong>of</strong> 2001, Public Law<br />

107-56, amended statutes relevant to<br />

computer investigations. Statutes amended<br />

include 18 USC 1030; 18 USC 2510 et<br />

seq.; 18 USC 2701 et seq.; 18 USC 3121<br />

et seq.; and 47 USC 551.<br />

Web sites<br />

Computer Crime and Intellectual<br />

Property Section <strong>of</strong> the U.S.<br />

Department <strong>of</strong> Justice, 202–514–1026,<br />

http://www.cybercrime.gov.<br />

National Cybercrime Training Partnership,<br />

877–628–7674, http://www.nctp.org.<br />

http://www.forensicsweb.com/downloads/<br />

cfid/isplist/isplist.htm<br />

59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!