SlideShare a Scribd company logo
Conducting the High Tech Raid Planning Resource Collection Practice Review Execution
Planning S ituation M ission E xecution A venues of approach and escape C ommunication
  Computer Search Warrant Team Even when just one stand-alone computer is seized there is too much to do for just one person to handle. All of the work can be accomplished by two people when necessary but the time on scene is reduced directly in relation to the number of additional trained personnel available.
Computer Search Warrant Team  The Search Warrant Team is a best case scenario. In the real world, you may not have the number of people available to form a complete team and one person may be required perform several functions to compensate.
Computer Search Warrant Team  Know the skills and abilities of your team and use them in the function they are best qualified to perform. Don't be afraid to call for outside expert assistance.  Generally speaking, the time required is directly related to the number of people on hand to take care of the crime scene and the quality of the equipment used to backup the systems.
Computer Search Warrant Team  We strongly recommend computer crime investigators have a powerful portable or laptop computer, high capacity SCSI/Parallel tape drive, SCSI cards and necessary cables, investigative software and other equipment at hand which allows for obtaining data or disk images as dictated by the facts of the case.
Case Supervisor The Case Supervisor should have extensive investigative experience in complex cases. The Case Supervisor handles all media relations, manages and schedules manpower and equipment needs and oversees the case. He may not have to stay at the scene beyond the initial entry and securing of the scene.
Interview Team This team is comprised of one or more people depending on the number of suspects and persons to be interviewed.  Their responsibility is to interview each witnesses/suspect.  These team members should have excellent Interview & interrogation skills.
Sketch & Photo Team This team is comprised of one or more persons.  Immediately sketch search scene and assign room letters.  Photograph scene and all evidence.  They may use any or combination of Polaroid, 35mm, digital and or video cameras.  We strongly suggest the use of digital and video cameras.
Sketch & Photo Team  We have had a case actually hinge on a picture of a door lock we were not even concerned about when serving the warrant but the issue of whether or not a lock was on the door or not became critical during the trial. Photograph the entire scene inside and out.
Note:  When using a video camera,  turn the sound off   (as required by Washington State “all party consent law”)  If this is not possible the entire team needs to be aware the scene is being recorded and they should be very careful what they say as it will be recorded for posterity and words lightly spoken could prove to be embarrassing when viewed in court.
Physical Search Team This team is comprised of one or more persons assigned to search each room. They locate and mark evidence in each room with colored stick on dots for easy location by the Seizure Team. They do not need to be computer experts but should be throughly briefed on the items to search for and they should be thorough.
Security and Arrest Team Provide physical security of building entrances, persons and evidence as needed. They also handle arrests, transportation and interview of suspects.  The size of this team can almost never be too large considering the available man power. This team is often comprised of uniform patrol officers.
Technical Evidence Seizure and Logging Team This team is comprised of two or three people who seize evidence, enter evidence data into the computer, label the evidence and place it in bags or boxes and label the boxes after evidence is photographed.  This team is responsible for taking down a computer after the area is secure and the computer is photographed.
Sketch & Photo Team  This team should include at least one person who is a computer investigator and another who ideally is a computer professional who has received specialized training in the handling and evaluation of evidence.  In most instances this technical team will also conduct forensic analysis of the evidence. When a regional, state or Agency lab is not available for such duties. Some agencies simply box up the computer and send the evidence to a lab for analysis.
Sketch & Photo Team  This team should include at least one person who is a computer investigator and another who ideally is a computer professional who has received specialized training in the handling and evaluation of evidence.
Sketch & Photo Team In most instances this technical team will also conduct forensic analysis of the evidence. When a regional, state or Agency lab is not available for such duties. Some agencies simply box up the computer and send the evidence to a lab for analysis.
Note:Consider skills in handling and recognition of evidence in picking team members.  Use members in context of their skills and abilities If law enforcement is involved in the case they should be local officers as they will be needed in court for "chain" of custody issues and they should know how to handle the electronic and magnetic evidence found.
The Technical Evidence Seizure and Logging team  Decides on appropriate action after discussing special circumstances with the Case Manager.  They backup the computer to removable media, run investigative software and shut down the system.
The Technical Evidence Seizure and Logging team  They then mark all cables and safely pack the computer, cables and attachments in preparation for transport.  They then insure all evidence is logged and marked by Seizure and Evidence Team.
The Technical Evidence Seizure and Logging team For investigations involving a large number of computers, the Case Manager may appoint either an investigator or computer expert proficient in both roles to be in charge of all computer seizure teams and to handle all technical questions and problems.

More Related Content

PPT
Crime Scene Investigations
PDF
Forensic Expert Cross Examination
PPTX
Ethical Hacking Definitions Matter - Covering Vulnerability Scanning, Vulnera...
PDF
Become an Internet Sleuth!
PPT
July132000
PPTX
Capturing forensics image
PPTX
Facebook Forensics Toolkit(FFT)
PPT
G Infomgnt
Crime Scene Investigations
Forensic Expert Cross Examination
Ethical Hacking Definitions Matter - Covering Vulnerability Scanning, Vulnera...
Become an Internet Sleuth!
July132000
Capturing forensics image
Facebook Forensics Toolkit(FFT)
G Infomgnt

Viewers also liked (20)

PPT
Edrm
PPTX
NTFS vs FAT
PPTX
Files and Folders in Windows 7
PPT
Linux forensics
PPTX
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
PPTX
Computer forensic 101 - OWASP Khartoum
PPT
Installation of Joomla on Windows XP
ODP
File carving tools
PDF
Windows 7 forensics -overview-r3
PPTX
Windows 10 Forensics: OS Evidentiary Artefacts
PPT
File system
PDF
Windows logging cheat sheet
PPT
Registry forensics
PPT
Computer Forensics & Windows Registry
ODP
Introduction to memory forensics
PPT
Part6 Private Sector Concerns
PDF
Forensic Anaysis on Twitter
PDF
Cheatsheet of msdos
PDF
The Future of Digital Forensics
PPT
File Management Presentation
Edrm
NTFS vs FAT
Files and Folders in Windows 7
Linux forensics
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
Computer forensic 101 - OWASP Khartoum
Installation of Joomla on Windows XP
File carving tools
Windows 7 forensics -overview-r3
Windows 10 Forensics: OS Evidentiary Artefacts
File system
Windows logging cheat sheet
Registry forensics
Computer Forensics & Windows Registry
Introduction to memory forensics
Part6 Private Sector Concerns
Forensic Anaysis on Twitter
Cheatsheet of msdos
The Future of Digital Forensics
File Management Presentation
Ad

Similar to Raidprep (20)

PDF
Lab 1 Bag & Tag (cyber forensics)
PPT
Criminal Investigative Team
PPT
Seizing Electronic Evidence & Best Practices – Secret Service
PPTX
Processing Crimes and Incident Scenes
PPT
Evidence Seizure Level One
PPT
Evidence Seizure
PPT
Evidence Seizure Sandyb
DOCX
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
PDF
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
PPTX
BASICS OF INVESTIGATION OF CYBER CRIME CASES.pptx
PPT
Bag and Tag
PPTX
Crime Scene Processing Ol
PPTX
Crime Scene Processing Ol
PPTX
Crime Scene Processing Ol
PDF
Search & Seizure of Electronic Evidence by Pelorus Technologies
PDF
CS6004 Cyber Forensics - UNIT IV
PPTX
PACE-IT: Basic Forensic Concepts
PPT
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
PPTX
Introduction To Forensic Methodologies
Lab 1 Bag & Tag (cyber forensics)
Criminal Investigative Team
Seizing Electronic Evidence & Best Practices – Secret Service
Processing Crimes and Incident Scenes
Evidence Seizure Level One
Evidence Seizure
Evidence Seizure Sandyb
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
BASICS OF INVESTIGATION OF CYBER CRIME CASES.pptx
Bag and Tag
Crime Scene Processing Ol
Crime Scene Processing Ol
Crime Scene Processing Ol
Search & Seizure of Electronic Evidence by Pelorus Technologies
CS6004 Cyber Forensics - UNIT IV
PACE-IT: Basic Forensic Concepts
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Introduction To Forensic Methodologies
Ad

More from CTIN (20)

PPTX
Mounting virtual hard drives
PPTX
Open Source Forensics
PDF
Encase V7 Presented by Guidance Software august 2011
PDF
Windows 7 forensics event logs-dtl-r3
PPTX
Msra 2011 windows7 forensics-troyla
PPTX
Windows 7 forensics thumbnail-dtl-r4
PPTX
Windows 7 forensics jump lists-rv3-public
PPTX
Time Stamp Analysis of Windows Systems
PPT
Vista Forensics
PPT
Mac Forensics
PPT
Nra
PPT
Live Forensics
PPT
Translating Geek To Attorneys It Security
PPT
Computer Searchs, Electronic Communication, Computer Trespass
PPT
CyberCrime
PPT
Search Warrants
PDF
Sadfe2007
PPT
Networking Overview
PPT
M Compevid
PPT
L Scope
Mounting virtual hard drives
Open Source Forensics
Encase V7 Presented by Guidance Software august 2011
Windows 7 forensics event logs-dtl-r3
Msra 2011 windows7 forensics-troyla
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics jump lists-rv3-public
Time Stamp Analysis of Windows Systems
Vista Forensics
Mac Forensics
Nra
Live Forensics
Translating Geek To Attorneys It Security
Computer Searchs, Electronic Communication, Computer Trespass
CyberCrime
Search Warrants
Sadfe2007
Networking Overview
M Compevid
L Scope

Recently uploaded (20)

PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
A Presentation on Touch Screen Technology
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Tartificialntelligence_presentation.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
project resource management chapter-09.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mushroom cultivation and it's methods.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
August Patch Tuesday
PPTX
TLE Review Electricity (Electricity).pptx
A novel scalable deep ensemble learning framework for big data classification...
A Presentation on Touch Screen Technology
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
cloud_computing_Infrastucture_as_cloud_p
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Hindi spoken digit analysis for native and non-native speakers
Building Integrated photovoltaic BIPV_UPV.pdf
Zenith AI: Advanced Artificial Intelligence
Tartificialntelligence_presentation.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
project resource management chapter-09.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mushroom cultivation and it's methods.pdf
Chapter 5: Probability Theory and Statistics
Programs and apps: productivity, graphics, security and other tools
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
August Patch Tuesday
TLE Review Electricity (Electricity).pptx

Raidprep

  • 1. Conducting the High Tech Raid Planning Resource Collection Practice Review Execution
  • 2. Planning S ituation M ission E xecution A venues of approach and escape C ommunication
  • 3. Computer Search Warrant Team Even when just one stand-alone computer is seized there is too much to do for just one person to handle. All of the work can be accomplished by two people when necessary but the time on scene is reduced directly in relation to the number of additional trained personnel available.
  • 4. Computer Search Warrant Team The Search Warrant Team is a best case scenario. In the real world, you may not have the number of people available to form a complete team and one person may be required perform several functions to compensate.
  • 5. Computer Search Warrant Team Know the skills and abilities of your team and use them in the function they are best qualified to perform. Don't be afraid to call for outside expert assistance. Generally speaking, the time required is directly related to the number of people on hand to take care of the crime scene and the quality of the equipment used to backup the systems.
  • 6. Computer Search Warrant Team We strongly recommend computer crime investigators have a powerful portable or laptop computer, high capacity SCSI/Parallel tape drive, SCSI cards and necessary cables, investigative software and other equipment at hand which allows for obtaining data or disk images as dictated by the facts of the case.
  • 7. Case Supervisor The Case Supervisor should have extensive investigative experience in complex cases. The Case Supervisor handles all media relations, manages and schedules manpower and equipment needs and oversees the case. He may not have to stay at the scene beyond the initial entry and securing of the scene.
  • 8. Interview Team This team is comprised of one or more people depending on the number of suspects and persons to be interviewed. Their responsibility is to interview each witnesses/suspect. These team members should have excellent Interview & interrogation skills.
  • 9. Sketch & Photo Team This team is comprised of one or more persons. Immediately sketch search scene and assign room letters. Photograph scene and all evidence. They may use any or combination of Polaroid, 35mm, digital and or video cameras. We strongly suggest the use of digital and video cameras.
  • 10. Sketch & Photo Team We have had a case actually hinge on a picture of a door lock we were not even concerned about when serving the warrant but the issue of whether or not a lock was on the door or not became critical during the trial. Photograph the entire scene inside and out.
  • 11. Note: When using a video camera, turn the sound off (as required by Washington State “all party consent law”) If this is not possible the entire team needs to be aware the scene is being recorded and they should be very careful what they say as it will be recorded for posterity and words lightly spoken could prove to be embarrassing when viewed in court.
  • 12. Physical Search Team This team is comprised of one or more persons assigned to search each room. They locate and mark evidence in each room with colored stick on dots for easy location by the Seizure Team. They do not need to be computer experts but should be throughly briefed on the items to search for and they should be thorough.
  • 13. Security and Arrest Team Provide physical security of building entrances, persons and evidence as needed. They also handle arrests, transportation and interview of suspects. The size of this team can almost never be too large considering the available man power. This team is often comprised of uniform patrol officers.
  • 14. Technical Evidence Seizure and Logging Team This team is comprised of two or three people who seize evidence, enter evidence data into the computer, label the evidence and place it in bags or boxes and label the boxes after evidence is photographed. This team is responsible for taking down a computer after the area is secure and the computer is photographed.
  • 15. Sketch & Photo Team This team should include at least one person who is a computer investigator and another who ideally is a computer professional who has received specialized training in the handling and evaluation of evidence. In most instances this technical team will also conduct forensic analysis of the evidence. When a regional, state or Agency lab is not available for such duties. Some agencies simply box up the computer and send the evidence to a lab for analysis.
  • 16. Sketch & Photo Team This team should include at least one person who is a computer investigator and another who ideally is a computer professional who has received specialized training in the handling and evaluation of evidence.
  • 17. Sketch & Photo Team In most instances this technical team will also conduct forensic analysis of the evidence. When a regional, state or Agency lab is not available for such duties. Some agencies simply box up the computer and send the evidence to a lab for analysis.
  • 18. Note:Consider skills in handling and recognition of evidence in picking team members. Use members in context of their skills and abilities If law enforcement is involved in the case they should be local officers as they will be needed in court for "chain" of custody issues and they should know how to handle the electronic and magnetic evidence found.
  • 19. The Technical Evidence Seizure and Logging team Decides on appropriate action after discussing special circumstances with the Case Manager. They backup the computer to removable media, run investigative software and shut down the system.
  • 20. The Technical Evidence Seizure and Logging team They then mark all cables and safely pack the computer, cables and attachments in preparation for transport. They then insure all evidence is logged and marked by Seizure and Evidence Team.
  • 21. The Technical Evidence Seizure and Logging team For investigations involving a large number of computers, the Case Manager may appoint either an investigator or computer expert proficient in both roles to be in charge of all computer seizure teams and to handle all technical questions and problems.