First Responder Handbook
First Responder Handbook
First Responder Handbook
Table of Contents
Background..................................................................................................................................................................................... 2
Intended Audience for This Guide ......................................................................................................................................... 3
Handling Digital Evidence at the Scene ................................................................................................................................. 4
Chapter 1 ......................................................................................................................................................................................... 5
Electronic Devices: Types, Description, and Potential Evidence ........................................................................................ 5
1.1 Computer Systems ..................................................................................................................................................... 5
1.2 Storage Devices ........................................................................................................................................................... 7
1.3 Handheld Devices ...................................................................................................................................................... 9
1.4 Other Potential Sources of Digital Evidence ......................................................................................................... 10
1.5 Computer Networks ................................................................................................................................................ 11
Chapter 2 ....................................................................................................................................................................................... 12
2.1 Investigative Tools and Equipment ....................................................................................................................... 12
2.2 Tools and Materials for Collecting Digital Evidence ........................................................................................... 12
Chapter 3: Securing and Evaluating the Scene ........................................................................................................................ 13
3.1 Preliminary Interviews ............................................................................................................................................ 14
Chapter 4: Documenting the Scene............................................................................................................................................ 16
Chapter 5: Evidence Collection .................................................................................................................................................. 17
5.1 Computers, Components, and Devices ................................................................................................................. 17
5.1.1 If the Computer Is OFF................................................................................................................................... 19
5.1.2 If the Computer Is ON.................................................................................................................................... 20
5.2 Other Forms of Evidence ......................................................................................................................................... 21
5.3 Other Electronic and Peripheral Devices of Potential Evidential Value ........................................................... 21
5.4 Computers in a Business Environment ................................................................................................................. 22
Server Computers............................................................................................................................................................... 23
Chapter 6: Packaging, Transportation, and Storage of Digital Evidence ............................................................................. 23
6.1 Packaging Procedures .............................................................................................................................................. 23
6.2 Transportation Procedures ...................................................................................................................................... 24
6.3 Storage Procedures ................................................................................................................................................... 25
Chapter 7: Electronic Crime and Digital Evidence Considerations by Crime Category .................................................... 27
7.1 Computer Intrusion.................................................................................................................................................. 27
7.2 Counterfeiting ........................................................................................................................................................... 28
7.3 E-mail Threats, Harassment, and Stalking ............................................................................................................ 29
7.4 Online or Economic Fraud ...................................................................................................................................... 29
7.5 Telecommunication Fraud ...................................................................................................................................... 30
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
Background
This guide is intended to assist the URA staff and authorized personnel who may be responsible
for preserving an electronic crime scene and for identifying, collecting, and safeguarding digital
evidence. This guide is not and should not be treated as a policy or legal document. It is not all
inclusive but addresses the most common situations encountered with electronic crime scenes
All crime scenes are unique, and the judgment of the first responder, organizational policy, and
prevailing technology should all be considered when implementing the information in this guide.
First responders to electronic crime scenes should adjust their practices as circumstances
including level of experience, conditions, and available equipment may influence how incidents
are handled. The circumstances of individual crime scenes and the applicable local laws may
dictate actions or a particular course of actions other than those described in this guide. First
responders should be familiar with all the information in this guide and perform their duties and
When dealing with digital evidence, general forensic and procedural principles should be
applied:
▪ The process of collecting, securing, and transporting digital evidence should not change
the evidence.
▪ Digital evidence should be examined only by those trained specifically for that purpose.
▪ Everything done during the seizure, transportation, and storage of digital evidence
First responders must use caution when they seize electronic devices. Improperly accessing data
stored on electronic devices may violate existing laws. Guidance on authorisation to seize
electronic evidence is available in Section 41 of the Tax Procedures Code Act (TPCA), 2014 and
28 of the Computer Misuse Act (CMA), 2011. First responders may need to obtain additional legal
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
authority before they proceed with an enforcement action and consultation with Legal
department should be to ensure that they have proper legal authority to seize the digital evidence.
In addition to the legal ramifications of improperly accessing data that is stored on a computer,
first responders must understand that computer data and other digital evidence are fragile. In
situations where a first responder is not sure what course of action to take, expertise of a digital
forensic investigator should be sought before any action which might jeopardize the digital
evidence.
• Anyone who may encounter a crime scene that might involve digital evidence.
Digital evidence is information and data of value to an investigation that is stored on, received,
or transmitted by an electronic device. This evidence is acquired when data or electronic devices
are seized and secured for examination.
Digital evidence—
NOTE: First responders should remember that digital evidence may also contain physical evidence such as DNA,
fingerprints, or serology. Physical evidence should be preserved for appropriate examination.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
evidence. First responders may follow the steps listed below to guide their handling of digital
▪ Recognize, identify, seize, and secure all digital evidence at the scene.
▪ Document the entire scene and the specific location of the evidence found.
Before collecting evidence at a crime scene, first responders should ensure that:
First responders without the proper training and skills should not attempt to
electronic device other than to record what is visible on the display screen. Do not
Chapter 1
Electronic Devices: Types, Description, and Potential Evidence
Internally attached computer hard drives, external drives, and other electronic devices at a crime
scene may contain information that can be useful as evidence in a criminal investigation or
prosecution. The devices themselves and the information they contain may be used as digital
evidence. In this chapter, such devices will be identified, along with general information about
their evidential value.
Some devices require internal or external power to maintain stored information. For these
devices, the power must be maintained to preserve the information stored. For additional
information about maintaining power to these devices, please refer to chapter 3 of this handbook,
the device manufacturer’s website, or other reliable sources of information.
▪ A case that contains circuit boards, microprocessors, hard drive, memory, and interface
connections.
▪ A keyboard.
▪ A mouse.
Computer systems can take many forms, such as laptops, desktops, tower computers, rack-
mounted systems, minicomputers, and mainframe computers. Additional components and
peripheral devices include modems, routers, printers, scanners, and docking stations. Many of
these are discussed further in this chapter.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
Desktop Computer
Laptop Computer
Server Computers
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
Potential evidence: A computer system and its components can be valuable evidence in an
investigation. The hardware, software, documents, photos, image files, e-mail and attachments,
databases, financial information, Internet browsing history, chat logs, friend lists, event logs, data
stored on external devices, and identifying information associated with the computer system and
components are all potential evidence.
▪ Hard drives. Hard drives are data storage devices that consist of an external circuit board;
external data and power connections; and internal magnetically charged glass, ceramic,
or metal platters that store data. First responders may also find hard drives at the scene
that are not connected to or installed on a computer. These loose hard drives may still
contain valuable evidence.
▪ External hard drives. Hard drives can also be installed in an external drive case. External
hard drives increase the computer’s data storage capacity and provide the user with
portable data. Generally, external hard drives require a power supply and a universal
serial bus (USB), FireWire, Ethernet, or wireless connection to a computer system.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
▪ Thumb drives. Thumb drives are small, lightweight, removable data storage devices with
USB connections. These devices, also referred to as flash drives, are easy to conceal and
transport. They can be found as part of, or disguised as, a wristwatch, a pocket-size multi
tool such as a Swiss Army knife, a keychain fob, or any number of common and unique
devices.
▪ Memory cards. Memory cards are small data storage devices commonly used with digital
cameras, computers, mobile phones, digital music players, personal digital assistants
(PDAs), video game consoles, and handheld and other electronic devices.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
Potential evidence: Storage devices such as hard drives, external hard drives, removable media,
thumb drives, and memory cards may contain information such as e-mail messages, Internet
browsing history, Internet chat logs and buddy lists, photographs, image files, databases,
financial records, and event logs that can be valuable evidence in an investigation or prosecution.
Potential evidence: Handheld devices such as mobile phones, smart phones, PDAs, digital
multimedia (audio and video) devices, pagers, digital cameras, and global positioning system
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
(GPS) receivers may contain software applications, data, and information such as documents, e-
mail messages, Internet browsing history, Internet chat logs and buddy lists, photographs, image
files, databases, and financial records that are valuable evidence in an investigation or
prosecution.
ii. Data or digital evidence on some devices such as mobile or smart phones can
be overwritten or deleted while the device remains activated.
iii. Software is available for mobile and smart phones that can be activated
remotely to render the device unusable and make the data it contains
inaccessible if the phone is lost or stolen. This software can produce similar
results if activated on a device seized. First responders should take
precautions to prevent the loss of data on devices they seize as evidence.
1.4 Other Potential Sources of Digital Evidence
Description: First responders should be aware of and consider as potential evidence other
elements of the crime scene that are related to digital information, such as electronic devices,
equipment, software, hardware, or other technology that can function independently, in
conjunction with, or attached to computer systems. These items may be used to enhance the user’s
access of and expand the functionality of the computer system, the device itself, or other
equipment.
Potential evidence: The device or item itself, its intended or actual use, its functions or
capabilities, and any settings or other information it may contain is potential evidence.
Potential evidence: The networked computers and connected devices themselves may be
evidence that is useful to an investigation or prosecution. The data they contain may also be
valuable evidence and may include software, documents, photos, image files, e-mail messages
and attachments, databases, financial information, Internet browsing history, log files, event and
chat logs, buddy lists, and data stored on external devices. The device functions, capabilities, and
any identifying information associated with the computer system; components and connections,
including Internet protocol (IP) and local area network (LAN) addresses associated with the
computers and devices; broadcast settings; and media access card (MAC) or network interface
card (NIC) addresses may all be useful as evidence.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
Chapter 2
2.1 Investigative Tools and Equipment
In most cases, items or devices containing digital evidence can be collected using standard seizure
tools and materials. First responders must use caution when collecting, packaging, or storing
digital devices to avoid altering, damaging, or destroying the digital evidence. Avoid using any
tools or materials that may produce or emit static electricity or a magnetic field as these may
damage or destroy the evidence.
Should the complexity of an electronic crime scene exceed the expertise of a first responder, the
first responder should request assistance from personnel with advanced equipment and training
in digital evidence collection.
Collection Tools
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
at the crime scene. All actions and activities carried out at the scene should be in compliance
with departmental policy as well as the prevailing national and international laws.
After securing the scene and all persons at the scene, the first responder should visually identify
all potential evidence and ensure that the integrity of both the digital and traditional evidence is
preserved. Digital evidence on computers and other electronic devices can be easily altered,
deleted, or destroyed. First responders should document, photograph, and secure digital
When securing and evaluating the scene, the first responder should:
▪ Ensure that no unauthorized person has access to any electronic devices at the
crime scene.
▪ Remove all persons from the crime scene or the immediate area from which
evidence is to be collected.
Leave a computer or electronic device off if it is already turned off (do not
Components such as keyboard, mouse, removable storage media, and other items
may hold latent evidence such as fingerprints, DNA, or other physical evidence that
should take the appropriate steps to ensure that physical evidence is not
▪ Look and listen for indications that the computer is powered on. Listen for the
sound of fans running, drives spinning, or check to see if light emitting diodes
(LEDs) are on.
▪ Check the display screen for signs that digital evidence is being destroyed. Words
to look out for include “delete,” format,” “remove,” “copy,” “move,” “cut,” or
“wipe.”
▪ Look for indications that the computer is being accessed from a remote computer
or device.
▪ Take note of all cameras or Web cameras (Web cams) and determine if they are
active.
and record their location at the time of entry onto the scene.
Within the parameters of the lab policies and applicable laws, first responders
should obtain as much information from these individuals as possible, including:
▪ All passwords
information
▪ A computer or another electronic device may need to be moved to find the serial
numbers or other identifiers. Caution should be taken as moving the device on may
damage it or the digital evidence it contains. Additional documentation of the system
and devices may be performed during the collection phase discussed in chapter 5.
▪ The initial documentation of the scene should include a detailed record using video or
photography, and notes and sketches to help recreate or convey the details of the scene
later. All activity and processes on display screens should be fully documented.
▪ Documentation of the scene should include the entire location, including the type,
location, and position of computers, their components and peripheral equipment, and
other electronic devices. The scene may expand to multiple locations; first responders
should document all physical connections to and from the computers and other devices.
▪ Record any network and wireless access points that may be present and capable of
linking computers and other devices to each other and the internet. The existence of
network and wireless access points may indicate that additional evidence exists beyond
the initial scene.
▪ Some circumstances may not permit first responders to collect all electronic devices or
components at a scene or location. Applicable laws, IG policies, or other factors may
prohibit collecting some computer systems and other electronic devices and the
information they contain; however, these devices should be included in the first
responder’s documentation of the scene.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
Digital evidence must be handled carefully to preserve the integrity of the physical device as well
as the data it contains. Some digital evidence requires special collection, packaging, and
transportation techniques. Data can be damaged or altered by electromagnetic fields such as those
generated by static electricity, magnets, radio transmitters, and other devices. Communication
devices such as mobile phones, smart phones, PDAs, and pagers should be secured and
prevented from receiving or transmitting data once they are identified and collected as evidence.
NOTE: If data encryption is in use on a computer, data storage device, or other electronic device
and it is improperly powered off during digital evidence collection, the data it contains may
become inaccessible.
▪ Confirm the power state of the computer. Check for flashing lights, running fans, and
other sounds that indicate the computer or electronic device is powered on. If the power
state cannot be determined from these indicators, observe the monitor to determine if it is
on, off, or in sleep mode.
Situation 1: The monitor is on. It displays a program, application, work product, picture, e-
mail, or Internet site on the screen.
1. Move the mouse slightly without pressing any buttons or rotating the wheel. Note any
onscreen activity that causes the display to change to a login screen, work product, or other
visible display.
2. Photograph the screen and record the information displayed.
3. Proceed to section 5.1.2 “If the Computer Is ON”.
Situation 3: The monitor is on; however, the display is blank as if the monitor is off.
1. Move the mouse slightly without pressing any buttons or rotating the wheel. The display will
change from a blank screen to a login screen, work product, or other visible display. Note the
change in the display.
3. If the monitor’s power switch is in the off position, turn the monitor on. The display changes
from a blank screen to a login screen, work product, or other visible display. Note the change
in the display.
1. If the monitor’s power switch is in the off position, turn the monitor on. The display does not
change; it remains blank. Note that no change in the display occurs.
1. Move the mouse slightly without pressing any buttons or rotating the wheel; wait for a
response.
2. If the display does not change and the screen remains blank, confirm that power is being
supplied to the monitor. If the display remains blank, check the computer case for active
lights, listen for fans spinning or other indications that the computer is on.
3. If the screen remains blank and the computer case gives no indication that the system is
powered on, proceed to section 5.1.1 “If the Computer Is OFF”.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
1. Document, photograph, and sketch all wires, cables, and other devices connected to the
computer.
2. Uniquely label the power supply cord and all cables, wires, or USB drives attached to the
computer as well as the corresponding connection each cord, cable, wire, or USB drive
occupies on the computer.
3. Photograph the uniquely labeled cords, cables, wires, and USB drives and the corresponding
labeled connections.
4. Remove and secure the power supply cord from the back of the computer and from the wall
outlet, power strip, or battery backup device.
5. Disconnect and secure all cables, wires, and USB drives from the computer and document the
device or equipment connected at the opposite end.
7. Make sure that the CD or DVD drive trays are retracted into place; note whether these drive
trays are empty, contain disks, or are unchecked; and tape the drive slot closed to prevent it
from opening.
9. Record the make, model, serial numbers, and any user-applied markings or identifiers.
10. Record or log the computer and all its cords, cables, wires, devices, and components according
to the SOPs.
11. Package all evidence collected following the lab SOPs to prevent damage or alteration during
transportation and storage.
1. Document, photograph, and sketch all wires, cables, and devices connected to the laptop
computer.
2. Uniquely label all wires, cables, and devices connected to the laptop computer as well as the
connection they occupied.
3. Photograph the uniquely labeled cords, cables, wires, and devices connected to the laptop
computer and the corresponding labeled connections they occupied.
4. Remove and secure the power supply and all batteries from the laptop computer.
5. Disconnect and secure all cables, wires, and USB drives from the computer and document
the equipment or device connected at the opposite end.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
7. Make sure that the CD or DVD drive trays are retracted into place, if present; note whether
these drive trays are empty, contain disks, or are unchecked; and tape the drive slot closed
to prevent it from opening.
9. Record the make, model, serial numbers, and any user-applied markings or identifiers.
10. Record or log the computer and all its cords, cables, wires, devices, and components
according to SOPs.
11. Package all evidence collected following the SOPs to prevent damage or alteration during
transportation and storage.
Be alert to the crime scene environment. Look out for pieces of paper with possible passwords,
handwritten notes, blank pads of paper with impressions from prior writings, hardware and
software manuals, calendars, literature, and text or graphic material printed from the computer
that may reveal information relevant to the investigation. These forms of evidence also should be
documented and preserved in compliance with departmental policies.
Electronic devices such as those listed below may contain information of evidentiary value to an
investigation. Except in emergency situations, such devices should not be operated and the
information they might contain should not be accessed directly. If a situation warrants accessing
these devices and the information they contain immediately, all actions taken should be
thoroughly documented. Data may be lost if a device is not properly handled or its data properly
accessed.
The following are examples of electronic devices, components, and peripherals that first
responders may need to collect as digital evidence:
▪ Audio recorders
▪ GPS accessories
▪ Copy machines
▪ Mobile Phones
▪ Smart Printers
Special handling may be required to preserve the integrity and evidentiary value
of these electronic devices. First responders should secure the devices and request
assistance from personnel who have advanced training in collecting digital
evidence.
NOTE: When collecting electronic devices, components, and peripherals such as those
listed above, remember to collect the power supplies, cables, and adapters for those devices
as well.
The first responder may find a similar environment in residential locations, particularly when a
business is operated from the home.
In some instances, the first responder may encounter unfamiliar operating systems or unique
hardware and software configurations that require specific shutdown procedures. Such
circumstances are beyond the scope of this guide.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
Server Computers
All actions related to the identification, collection, packaging, transportation, and storage
of digital evidence should be thoroughly documented. When packing digital evidence
for transportation, the first responder should:
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
▪ Ensure that all digital evidence collected is properly documented, labeled, marked,
photographed, video recorded or sketched, and inventoried before it is packaged.
All connections and connected devices should be labeled for easy reconfiguration
of the system later.
▪ Only paper bags and envelopes, cardboard boxes, and antistatic containers should
be used for packaging digital evidence. Plastic materials should not be used when
collecting digital evidence because plastic can produce or convey static electricity
and allow humidity and condensation to develop, which may damage or destroy
the evidence.
▪ Ensure that all digital evidence is packaged in a manner that will prevent it from
being bent, scratched, or otherwise deformed.
▪ Label all containers used to package and store digital evidence clearly and
properly.
▪ Leave cellular, mobile, or smart phone(s) in the power state (on or off) in which
they were found.
▪ Collect all power supplies and adapters for all electronic devices seized.
▪ Avoid keeping digital evidence in a vehicle for prolonged periods of time. Heat,
cold, and humidity can damage or destroy digital evidence.
▪ Ensure that computers and electronic devices are packaged and secured during
transportation to prevent damage from shock and vibration.
▪ Document the transportation of the digital evidence and maintain the chain of
custody on all evidence transported.
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
Keep digital evidence away from magnetic fields such as those produced by
radio transmitters, speaker magnets, and magnetic mount emergency lights.
Other potential hazards that the first responder should be aware of include
seats heaters and any device or material that can produce static electricity.
▪ Ensure that the digital evidence is inventoried in accordance with the laboratory
policies.
▪ Ensure that the digital evidence is not exposed to magnetic fields, moisture, dust,
If more than one computer is seized as evidence, all computers, cables, and devices
example, the computer is designated as computer A. All connections and cables are
NOTE: Potentially valuable digital evidence including dates, times, and system configuration settings
may be lost due to prolonged storage if the batteries or power source that preserve this information fails.
Where applicable, inform the evidence custodian and the forensic examiner that electronic devices are
battery powered and require prompt attention to preserve the data stored in them.
Example: Computer A
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
In some circumstances, trace, latent, or biological evidence such as fingerprints or DNA that may
be important to the investigation may be present on computers and their components or on other
electronic devices. First responders should follow standard operating procedures for collecting
such evidence. Any destructive processes associated with recovering or analyzing trace, latent,
biological, or other evidence should be postponed until after the digital evidence has been
recovered for examination and analysis.
To assist in the forensic examination, the first responder should document the following
information when possible:
▪ Keyword lists.
▪ Computers
▪ Antennas
▪ Removable media
▪ Web camera(s)
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
▪ Executable programs
7.2 Counterfeiting
Potential digital evidence in counterfeiting investigations includes:
▪ Computers
▪ Calendar(s)
▪ Reproductions of signatures
▪ False identification
▪ Printouts of databases
TAX INVESTIGATIONS DEPARTMENT FIRST RESPONDER HANDBOOK
▪ Computers
▪ Telephone records
▪ Legal documents
▪ Printed maps
▪ Removable media
▪ Databases
▪ Calendars or journals
▪ Removable media
▪ Stolen telephones