Evidence Tracking For Class, Date, Professor, And ID

Evidence Trackingevidence Trackingnameclassdateprofessorevidence Track

Evidence Tracking evidence Trackingnameclassdateprofessorevidence Track

Evidence Tracking Evidence Tracking Name Class Date Professor Evidence Tracking Evidence is essential to solving any case and proving the guilt of an offender in a court of law. Once a crime has been reported the first step of the responding officer is to secure the crime scene to ensure it is properly preserved until forensic investigators can arrive on the scene. The evidence collection process begins with thoroughly documenting the crime scene. The process begins with a walk through of the crime scene in order to identify potential evidence and to develop an idea of what occurred at the crime scene. Once the evidence has been identified the evidence collection process will begin with collecting evidence that is fragile or easily damaged or destroyed.

In the rape scenario DNA evidence is crucial to proving a crime occurred and showing the guilt of the offender. Rape cases are hard to prosecute and require physical evidence to prove the act of rape even occurred. In a majority of cases it is the word of the victim against the word of the perpetrator. DNA evidence can provide conclusive evidence that a sexual assault occurred and point to the guilty offender. In the rape scenario evidence that was located and will need to be collected is the semen on the comforter and the tissue located in the trash can.

This evidence can contain valuable DNA that points directly to the offender. The semen and the tissue can contain the DNA profile of the offender and the tissue. The evidence collection process begins first by identifying the evidence in a walk through and then properly documenting the evidence. Documenting the evidence is an essential step in the collection process. This begins with photographing the evidence where it sits in order to show the court where the evidence was located and in what condition.

Once the evidence has been photographed it must be collected using uniform collection standards. The comforter that was located contained a semen stain that must be collected in order to develop DNA on the criminal suspect. Most items of evidence will be collected in paper containers such as packets, envelopes, and bags and liquid items can be transported in non-breakable, leak proof containers (Schiro, 2006). When collecting DNA from the comforter the forensic technician will mark the wet stain with a permanent marker in order to make it easier to locate during the DNA analysis. The technician will then wait for the comforter to air dry before placing it in a clean package and properly sealing and documenting for transportation.

The second piece of evidence that was located at the crime scene was a tissue in a waste paper basket. The tissue will need to be collected using a pair of tweezers or using a pair of gloves and then be placed in a plastic container. The plastic container will need to be sealed and then properly documented for transportation. Documentation does not include just sketching and photographing the evidence located at the crime scene but also includes detailing every step of the evidence collection process, transportation, and steps taken in the analysis of the evidence at the lab. Documenting includes ensuring the person that collect the evidence labels the document with their name, date, time, number, and the steps that were taken in the collection process.

When the evidence is transported these steps also need to be documented. The person transporting the evidence needs to document time and date evidence was transported and by whom. Once the evidence reaches the lab for analysis each step in the process must also be carefully documented. Documenting every step in the evidence collection, transportation, and analysis process is known as the chain of the custody. The chain of custody is defined as the witnessed, written record of all of the individuals who maintained unbroken control over the items of evidence (Byrd, 2009).

The chain of custody shows the court where the evidence was located and shows exactly what steps were taken to collect, transport, and analysis the evidence. The chain of evidence establishes proof for the court that shows who had contact with evidence, circumstances surrounding the collection of evidence, and any changes to the evidence. Processing protocols are the uniform standards that must be followed when collecting evidence or processing a crime scene. These protocols as discussed previously include preserving the evidence, conducting a walk through, sketching the scene, photographing the scene, using standardized methods to collect evidence, document the evidence, and lastly transport the evidence to the forensic lab.

The evidence located at the crime scene must be collected using processing protocols to protect the integrity of the evidence that is located. Preserving DNA evidence is one of the most crucial steps that will be taken by forensic personnel. It falls to the responding police officers to quickly and properly secure a crime scene to ensure that evidence is not lost, damaged, or destroyed. DNA evidence can be extremely fragile and requires the roper processing controls and the preservation of the evidence. When processing DNA evidence, which has been transported to the forensic lab, it is essential to run negative controls and apply background controls through the entire process (Riley, 2005).

This will ensure any containment is identified so the evidence does not be contaminated during the analysis process. The potential DNA evidence on the tissue would be considered to be trace evidence because there is a possibility that minute amounts of DNA may be present on the evidence. Trace evidence is physical evidence fund in the smallest amounts and includes skin cells, fibers, and hair. The physical evidence located on the comforter is considered biological evidence or body fluids and can contain valuable DNA evidence that will point directly to a criminal suspect. DNA evidence can be located on the comforter through the use of ultra violet lights or chemicals.

Physical evidence is essential to the success of any criminal case. While many cases are solved with circumstantial evidence, physical evidence provides the court with more definitive evidence of the criminal defendant’s guilt. In order to ensure that physical evidence can be presented in court it must first be properly collected following uniform standards and it must be properly documented each step of the way. If evidence is not collected using uniform standards or is not properly documented there is no clear chain of custody. When the chain of custody has been broken the evidence will no longer be eligible for the court process.

If physical evidence is thrown out of court a guilty offender could go free. The chain of custody ensures that the court is aware of every step taken with the physical evidence and can prove the evidence being presented in court is the evidence that was located at the crime scene. The proof is established through the chain of custody and ensures the physical evidence is eligible for the court process. In order to prove the guilt of an offender there must be evidence pointing to a criminal offender that leaves no reasonable doubt in the minds of the jury. In the case of the rape crime scene the evidence that is collected will be crucial to identifying the suspect as well as proving their guilt.

References Byrd, M. (2009). Proper Tagging and Labeling of Evidence for Later Identification. Retrieved November 19, 2012 from Riley, D. (2005). DNA Testing: An Introduction For Non-Scientists An Illustrated Explanation. Retrieved November 19, 2012 from Schiro, G. (2006). Collection and Preservation of Evidence. Retrieved November 19, 2012 from System Security SEC440 System Security Plan Name Class Date Professor System Security Plan A bank is a financial institute that is responsible for safeguarding the money of its customers. When a bank does not have an adequate security system the result will be security breaches that will result in financial loss for the bank and its customers. In the past the bank only need worry about internal attacks from employee or external attacks from bank robbers but in modern society there is no a threat from unseen external threats that aces the bank and its private information through the banks information systems. In current society the bank must have the necessary physical security measures in place as well as the necessary information system security. Description of Bank A bank is a financial institution that stores the money of organizations, large and small, and the money of the private citizen. The bank is responsible for investing the money of its customers and for loaning money to other customers in order to obtain interest. Banks are privately owned but in order to ensure that if the citizen’s money is stolen in a bank robbery the bank must be insured and must have the necessary security measures in place to protect the citizen’s money. There are many different types of banks, from national banks, state banks, and central banks. The Federal Reserve is the nation’s banking authority tasked with providing the nation with a safer, more flexible, and more stable monetary and financial system. The Federal Reserve watches over banking and money in the United States and is called a central bank. It supervises and regulates the banking industry and maintains the stability of the financial market to ensure event, such as the Great Depression, did not result in citizens losing the money they had entrusted to their banks. The bank has many assets as it hold the money of giant corporations or the funds of the average consumer. They have access to precious metals such as gold and silver and store an unaccountable mount of wealth in their safe deposit boxes. A bank also has tens of thousands if not hundreds of thousands of dollars in the bank at any given time and holds important financial documents such as saving bonds and mortgages. Banks have investment securities, reserves, loans, and the money of the customers. Loans generate revenue but loans are funded though the money of the bank customer. A bank has many different types of vulnerabilities both physical and digital. A bank is a building that has always tempted criminals to rob of its valuable assets. It has always been essential that the bank has the necessary physical security in place to ensure that bank robbers cannot enter the bank after hours and steal all of the money as well as security during the days to ensure that criminals are deterred from physically robbing the bank. This includes security cameras, vaults, security alarms, and security guards. While these physical security measures do not always deter the criminal from robbing the bank they help limit the amount of money received by the robber as well as help the police to identify the offender. The other type of vulnerability faced by the bank comes from outsides threat especially those posed by new cyber threats. In the new information age, technology now poses as big a threat to a financial institution as a physical threat. The bank faces the threat of the cyber criminal accessing their private security systems in order to access the financial information of customers or in order to illegally transfer funds from the bank. The bank is vulnerable to outside attacks that will create major damage to information systems or result in the secrets of the financial institution being stolen. In order to ensure that the private information of the bank and its customer are aptly protected from both the internal and external threats the bank must have a systems security pan in place to prevent these security breaches, losses, or attacks. Cyber attacks on the biggest U.S. banks, including JPMorgan Chase & Co. and Wells Fargo & Co., have breached some of the nation’s most advanced computer defenses and exposed the vulnerability of its infrastructure, said cyber security specialists tracking the assaults (Strohm, 2012). These attacks have also resulted in major financial loss for the financial institution, the FDIC, and the customer. Systems Security Plan The system security plan is the vital to ensuring the bank can keep the money and possessions of the customers safe from threat or loss. This includes not only securing the physical perimeter of the bank and putting the necessary security measures in place to stop employee theft, it also includes ensuring that outside threats and internal threats from employees do not occur through the backs information systems. In order to ensure the customer can be guaranteed this protection the bank will need to employ at minimum a security system that protects information networks from damage from malicious code, viruses, and spyware as well as ensure the necessary internal security steps are put into place. Types of Information in Security Plan The types of information that should be located in the security plan involve information on the types of threats posed to the bank. These threats include computer related crimes that could affect the bank and the different types of attacks that can be conducted against the banks information systems. Other information that needs to be contained in the security plan is common threats such as phishing scams, hackers, wireless intrusions, malware, malicious insiders, and mobile devices. The security plan will explain the company’s security policy and provide data on the appropriate countermeasures. It will include a security risk and threat assessment and information on attest measures used by cyber criminals. The security plan will evaluate our electronic and physical methods of accessing, collecting, storing, using, transmitting, protecting, and disposing of our customers’ non-public personal information (Smith, 2010). The purpose of the pan is to protect the private information of the banks and their customers form internal and external intrusion. The plan will assist the bank in protecting information systems against threats and assist the bank in anticipating the potential risks. The security plan will assist in preventing unauthorized access and identify potential threats. Data is a key factor in determining what areas are vulnerable and what recommendations should be made. The type of information that will be gathered in the threat assessment includes what needs to be protected, the potential threats or vulnerabilities faced by the organization, value to organization, and to identify ways to minimize damage or loss. In other words the security plan will identify gaps in security that must be addressed and provide the best practices for closing this security gap. Other important organization data that needs to be collected include the policies and procedures will be collected, past and present security documents, interviews with key personnel, and i mportant information on security systems and networks. the type of operating system being used, services the organization is running, network applications, physical location of information systems, access controls, intrusion detection, firewalls, and networks surveying measures. Internal and External Data Access Needs · Establish information networks and systems security password guidelines · Passwords are essential to ensuring the information of the customer and the employee are properly protected. · Passwords should be regularly changed and kept confidential · Limit access to passwords · Identify reasonably foreseeable internal and external threats that could result in unauthorized disclosure, misuse, alteration, or destruction of customer information or information systems (Smith, 2010). · Authorized personnel · Evaluate existing IT security policies · Testing of the security controls and safeguards · Security practices of information providers · Evaluating and adjusting the plan · Firewall software blocks unauthorized access · Employees sign confidentiality agreements to protect customer private information Potential IT System Vulnerabilities · Internal and External threats · Misuse by Employees · Hackers, Phishers, Malicious scammers · Misuse by customer · Security gaps by information providers · Former employees · Weakness in design · Failure in security software Disaster Recovery Plans The disaster recovery plan will need to have an action plan in place in order to respond to any attacks to the IT system and ensure an immediate recovery.

It is essential that the bank be prepared to sufficiently respond to any internal and external threats to limit the impact to the customer and to limit the negative exposure the bank could receive. The data disaster recovery plan will protect critical data and immediately take steps to limit or stop the security breach and information loss. The ability to recover critical data soon after a disaster is a cardinal requirement, which cannot be over looked (Patel, 2006). This includes the implementation of a daily back up routine. The disaster recovery plan includes understanding the consequences of a security breach on the bank and what measures will need to be taken to ensure an immediate and successful recovery.

Business Continuity Plans The business continuity plan involves different stages the bank will need to go through in the event of a security breach or intrusion to the information systems. This begins with the business impact analysis that will inform the bank on what kind of damage the breach or attack has created to the banks operational systems and the impact to the customer. The continuity plan will consist of a list of recovery strategies that can be employed to limit the impact of the intrusion, loss, or attack and allow the bank to select the one that bests fits the current security crisis. Next is the plan development where the recovery strategy is determined and the team is assembled. Once the plan is implemented it will be tested and changes will be made.

Conclusion The systems security plan is essential to any organization but especially the financial institution. When a bank does not have an adequate security system the result will be security breaches that will result in financial loss for the bank and its customers. The systems security plan ensures the bank can be adequately prepared in the event of a cyber attack as well as is adequately prepared to provide an effective response in the event of a security breach or a security attack. Retrieved Kadel, L. (2004). Designing and Implementing an Effective Information Security Program.

Retrieved January 19, 2013 from Patel, M. (2006). Data Disaster Recovery Plan. Retrieved January 20, 2013 from Strohm, C. & Engelman, E. (2012). Cyber Attacks on U.S. Banks Expose Vulnerabilities.

Bloomberg News . Retrieved January 19, 2013 from Smith, M. (2010).Sample Written Information Security Plan. Retrieved January 19, 2013 from

Paper For Above instruction

Evidence collection and proper handling are fundamental components of criminal investigation that ensure the integrity and admissibility of physical evidence in court. The process begins at the crime scene, where officers are responsible for securing and documenting the scene thoroughly. This initial phase involves a walk-through to identify potential evidence, assess the scene, and develop a plan for systematic collection, all while preserving the scene's integrity (Schiro, 2006). Proper documentation through photographs, sketches, and detailed notes is crucial to establish the context and condition of evidence before collection. These steps not only facilitate accurate analysis but also underpin the chain of custody, a vital process ensuring continuous, unbroken control of evidence from collection through to courtroom presentation (Byrd, 2009).

In the context of a sexual assault case, DNA evidence plays a pivotal role. Physical evidence such as semen stains on bedding and biological material like tissue can provide conclusive links to the suspect, especially when victim and suspect testimonies are ambiguous or conflicting. The collection process for such trace evidence requires meticulous attention to prevent contamination and degradation. For example, semen on a comforter must be carefully collected using sterile tools, marked to preserve orientation, and allowed to air dry before sealing in appropriate containers, typically paper-based to prevent mold or deterioration (Riley, 2005). The tissue, which may contain epithelial cells, is similarly collected with sterile gloves or tweezers, sealed, and properly labeled.

Uniform standards for evidence collection include labeling evidence with detailed information: collector’s name, date, time, and unique case number. These protocols serve two primary purposes: maintaining the integrity of evidence and establishing a clear chain of custody. The chain of custody documents all individuals who handle the evidence, along with details of each transfer, ensuring that the evidence remains unaltered and admissible in court (Byrd, 2009). Proper documentation during transportation entails recording the date, time, and personnel involved, and securing the evidence containers to prevent tampering or contamination.

Once the evidence arrives at the forensic laboratory, further documentation continues through each stage of analysis. The chain of custody is re-verified and maintained as evidence is processed. For DNA analysis, strict contamination controls such as negative controls and background checks are essential throughout the laboratory procedures, including extraction, amplification, and profiling. Trace evidence like tissue or fibers, although present in small quantities, can yield vital information, and meticulous handling ensures the preservation of DNA or other biological markers (Riley, 2005). Advanced techniques like ultraviolet light or chemical presumptive tests can help