During the seizure of digital evidence, is the suspect allowed to touch the computer system?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

During the seizure of digital evidence, is the suspect allowed to touch the computer system?

Explanation:
The key idea is preserving evidence integrity by preventing any changes to the device or its data during seizure. Allowing the suspect to touch the computer can unintentionally or intentionally alter data, modify timestamps, create new files, wipe traces, or influence volatile memory. To maintain a defensible chain of custody and ensure forensically sound collection, investigators should isolate the device, prevent user interaction, and perform proper imaging and documentation using write blockers and established procedures. If the suspect’s involvement is needed for information like passwords, that should be handled without letting them interact with the hardware in a way that could modify the evidence. So, the suspect is not allowed to touch the system.

The key idea is preserving evidence integrity by preventing any changes to the device or its data during seizure. Allowing the suspect to touch the computer can unintentionally or intentionally alter data, modify timestamps, create new files, wipe traces, or influence volatile memory. To maintain a defensible chain of custody and ensure forensically sound collection, investigators should isolate the device, prevent user interaction, and perform proper imaging and documentation using write blockers and established procedures. If the suspect’s involvement is needed for information like passwords, that should be handled without letting them interact with the hardware in a way that could modify the evidence. So, the suspect is not allowed to touch the system.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy