You are on page 1of 2

Taken from "ICOE Training and KSA's" draft version.

The International Organizati on on Computer Evidence (IOCE) was set up to provide an international forum for law enforcement agencies to exchange information concerning computer investigati on and digital forensic issues. "Agencies that will initiate and/or have established digital evidence programs m ust be financially committed to supporting the cost associated with training. Co mputer related criminal techniques and capabilities change more rapidly than tho se in more traditional areas of criminal activities. Therefore a considerable ef fort is required in the area of continuous specialized training." ---------------------------"Mobile device forensics is an ever-evolving field filled with challenges and op portunities when analyzing a mobile device for forensic evidence in support of a criminal investigation. The process can be more difficult than traditional comp uter forensics due to the volatile nature of electronic evidence. The software a pplications for mobile forensic testing are often not 100% forensically sound . A w ell trained, highly skilled digital forensics investigator plays an essential ro le in the criminal investigation process when performing forensics analysis of m obile devices that belong to suspects, witnesses, victims or through the analysi s of network traffic in response to computer security incidents (Curran, K., Rob inson, A., Peacocke, S. and Cassidy, S., 1-4)." http://articles.forensicfocus.com/2011/08/22/the-challenges-facing-computer-fore nsics-investigators-in-obtaining-information-from-mobile-devices-for-use-in-crim inal-investigations/ ----------------------------"According to the International Organization on Computer Evidence, some general principles should be followed in recovering digital evidence for chain of custod y: 1.All of the general forensic and procedural principles should be adhered to whe n dealing with digital evidence. 2.Upon seizing digital evidence, any actions taken should not modify the origina l evidence. 3.When it is necessary for personnel to access the original digital evidence, th e personnel should be appropriately trained for the purpose. 4.All activities associated to the seizure, access, storage or transfer of digit al evidence must be fully and properly documented, preserved and available for r eview. 5.An individual is responsible for all actions taken with respect to digital evi dence when digital evidence is in that individual s possession. 6.Any agency that is responsible for seizing, accessing, storing or transferring digital evidence is responsible for compliance with all six principles (Guideli nes for Best Practice in the Forensic Examination of Digital Technology 17-18)."

http://articles.forensicfocus.com/2011/08/22/the-challenges-facing-computer-fore nsics-investigators-in-obtaining-information-from-mobile-devices-for-use-in-crim inal-investigations/

-------------------Following is a list of government offices and watchdog groups that address vario us aspects of computer forensics: FBI: Federal Bureau of Investigations SEARCH: The National Consortium for Justice Information and Statistics HTCIA: High Technology Crime Investigation Association FACT: Forensic Association of Computer Technologists NC3: National White Collar Crime Center USPS: US Postal Inspection Service

International Society of Forensic Computer Examiners

You might also like