The CSI Case Management System is about to be released. The courses will be updated to match the update.
C |
|---|
Case IntakeThe initial process of receiving a complaint or referral and documenting key facts, involved parties, known devices/accounts, suspected offenses, and urgency. In digital investigations, intake should capture platform names, URLs, identifiers, time zones, and preservation needs. | |
Case NumberA unique identifier assigned to an investigation for tracking reports, evidence, warrants, and communications. Case numbers should appear consistently on evidence packaging, forensic images, reports, and disclosure material to prevent mix-ups and maintain traceability. | |
Cell Site Location Information (CSLI)Location-related records derived from a mobile device’s interaction with cellular towers. CSLI may be historical or near real-time depending on legal authority and provider capability, and it is frequently used to place a device within an approximate area at a specific time. | |
Certificate Authority (CA)A trusted organization that validates identities and signs digital certificates. Trust in PKI depends on CA security, proper issuance practices, and mechanisms for revoking compromised or misissued certificates. | |
Certificate Revocation List (CRL)A list published by a CA containing certificates that have been revoked before expiration. Systems can check CRLs to determine whether a certificate should still be trusted. | |
Certification of RecordsA statement (often signed) from a custodian of records attesting that produced records are authentic business records. Certifications can support admissibility by establishing that records were kept in the ordinary course of business. | |
ChaCha20-Poly1305ChaCha20-Poly1305 is an AEAD construction that combines the ChaCha20 stream cipher with the Poly1305 authenticator. It is widely used in TLS and is particularly performant on systems without AES hardware acceleration. | |
Chain of CustodyA chain of custody refers to the documentation and tracking of evidence in a criminal investigation or legal case. It is a record of the handling and movement of evidence from the time it is collected until it is presented in court. The chain of custody is important because it helps to establish the authenticity and integrity of the evidence. It ensures that the evidence has not been tampered with or contaminated and that it can be accurately linked to the crime or legal matter in question. Examples of evidence that may require a chain of custody include physical items like fingerprints, DNA samples, drugs, weapons, or documents. It is also necessary for digital evidence like emails, texts, or social media posts. To maintain a chain of custody, the following steps must be followed:
Throughout the process, the chain of custody is carefully documented and tracked, including information about who handled the evidence, where it was stored, and when it was moved. This helps to ensure that the evidence is reliable and can be used in court to support a criminal conviction or legal ruling. It is important to maintain a thorough and accurate chain of custody in order to establish the authenticity and reliability of the evidence. Any breaks in the chain of custody, such as evidence being left unsecured or handled by unauthorized personnel, can compromise the integrity of the evidence and potentially impact the outcome of a case. A chain of custody is a document that outlines the handling and control of physical or digital evidence in a forensic investigation. It is used to maintain the integrity of the evidence and to ensure that it is admissible in court. In the field of digital forensics and incident response (DFIR), a chain of custody is used to track the handling of digital evidence from the time it is collected until it is presented in court. The chain of custody should include information about who collected the evidence, when it was collected, how it was collected, and where it has been stored. For example, if a forensic analyst collects a suspect's computer as evidence, the chain of custody would include the following information:
It is important to maintain a thorough and accurate chain of custody in order to ensure the integrity of the evidence and to establish that it has not been tampered with or altered in any way. In addition to maintaining a chain of custody, forensic analysts should also follow standard operating procedures (SOPs) in order to ensure that the evidence is handled properly and that the results of the forensic analysis are reliable. SOPs outline the steps that should be taken to collect, preserve, and analyze digital evidence in a consistent and repeatable manner. Overall, a chain of custody and adherence to SOPs are important for ensuring the integrity and admissibility of digital evidence in a forensic investigation. | |
Change AddressA wallet-controlled address receiving ‘change’ from a transaction when inputs exceed the intended payment amount (common in UTXO systems). | |