Suppose you have recently responded to your first computer forensic incident. The case inquestion involves a potential underground hacking ring, which the police, working in conjunction with the Federal Bureau of Investigation have been investigating for several years. It has since been determined that an IP address confirms that location, and the identity of one of the suspects. Warrants have been issued for search and seizure of all electronic devices found on the premises.
1 Wireless access point
1 External media drive
1 Printer
1 Router
1 PC
1 Smart phone
The following picture depicts the setup found in the suspect’s home. Your job is to documentyour findings and secure all relevant evidence.
Write a paper in which you:
1. Investigate the legal statutes involved in this type of case, and outline specific legalconsideration to take when collecting evidence.
2. Preplan how to approach the crime scene, documenting the steps and procedures to process the digital evidence
3. Analyze the crime scene diagram, document and tag each device that will be collected for evidence, specifying the importance of each device.