4.3 Summary


4.3 Summary

This chapter provided a formalized process to help investigators reach conclusions that are reliable, repeatable, well documented, as free as possible from error, and supported by evidence. Heavy reliance on the scientific method helps overcome preconceived theories, encouraging investigators to validate their findings by trying to prove themselves wrong, leading to well-founded conclusions that support expert testimony. Fundamental concepts such as Locard's Exchange Principle, class and individuating characteristics, and establishing continuity of offense were discussed. The important concepts of case management and analysis were discussed along with each discrete step in the investigative process. The ultimate aim of this investigative model is to help investigators and examiners ascend a sequence of steps that are generally accepted, reliable, and repeatable, and lead to logical, well documented conclusions of high integrity. All six tenats have a common purpose - to form the most persuasive argument possible based upon facts, not supposition, and to do so considering the legal criteria for admissibility.

The success of each step of the investigative process is dependent on preparation in the form of policies, protocols, procedures, training, and experience. Anyone responding to an accusation or incident should already have policies and protocols to follow and should have the requisite knowledge and training to follow them. Similarly, anyone processing and analyzing digital evidence should have standard operating procedures, necessary tools, and the requisite training to implement them.




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net