Electronic Evidence Seizure Course for First Responders

image233

EES

Each responder must understand the fragile nature of electronic evidence and the principles and procedures associated with its collection and preservation. Actions that have the potential to alter, damage, or destroy original evidence may be closely scrutinized by the courts. We must also identify qualified agencies, examiners and laboratories that can correctly process our evidence​.


This course is designed to introduce officers to computer evidence seizure procedures, Computer Crimes and Processing of Computer Crime Scenes.  The course will also address Legal Principals regarding Computer Crimes, Digital Investigative Units, Computer Investigations and Cyber Terrorism. Areas addressed in this course include evaluating computer evidence, correlating disparate data in forming conclusions, network considerations and report writing.   

COURSE OBJECTIVES

​​-Describe applicable laws and basic legal reasoning related to computer evidence seizure.

-Describe crime scene management considerations with digital media.

-Describe the procedures and expectations for working at a crime scene following the “Best   

 Practices” model from the United States Secret Service and the Nation Institute of Justice (NIJ). 

 NIJ provides objective, independent, evidence-based knowledge and tools to enhance the 

 administration of justice and public safety.

-Describe the methods/procedures required with the securing, packaging, & transport of 

  electronic media.

-Describe methods for searching for digital evidence with software such as ILOOK, FTK, 

 Encase, etc.

-Describe methods of collecting and preserving digital evidence with the “Best Practices” model 

 from the United States Secret Service and the Nation Institute of Justice (NIJ).

-Describe analytical thinking techniques related to crime scenes.

-Describe digital evidence and its forms.

-Describe the locations of computer forensic evidence storage (hardware/media, etc). Locate 

  the hard drive in a central processing unit (CPU).

-Describe the “chain of custody” as it relates to the proper collection and documentation of 

 digital evidence.

                                              On-site training is available 

Please contact an E-Kit Representative for more information.   815-245-8476