Computer forensics is essentially the process of applying computer analysis and investigation to determine possible evidence for legal purposes (Robbins, 2010). All the two guides give necessary standards whenever using electronic systems in circumstances that require the use of computer forensic to determine some elements that cannot be discerned by normal human-oriented approaches. Both the Electronic Crime Scene Investigation & Good Practice Guide for Electronic Based Evidence bear the principle fact that computers have evolved into devices that have entirely revolutionalized the way things can be handled; and that they can be used to do both good and bad things. This is a major similarity between the two guides that comes out clearly from the onset. They both allude that computer-based or rather electronic material can provide very useful information that can then be used to give leads in cases involving crime, both at the scene of the crime and even the post-crime events. These devices can track down evidence even out of the scene of the crime, thus providing much-needed deep insight into more details of a committed crime, especially when electronics are involved.
One major similarity is that both guides give a detailed step-by-step procedure of what to do at the crime scene once the responsible experts arrive. Though presented in different ways in terms of structure and layout, the two guides display a similar picture of the crime scene, the very first thing to do like looking around to identify which type of electronic equipment is available. According to the guides, some of the devices that can be found at the scene of the crime can vary depending on the nature of the organization. Examples of such devices are desktop computers, laptops and cameras. (Association of Chief Police Officers, n.d). These devices could be on or off and there are different ways to approach these different scenarios. The good Practice guide for computer-based Electronic Evidence for example suggests that for a computer that has been switched off; the area containing the equipment should be secured, any printers in progress allowed to finish and people moved away from any power supplies and computers. The Electronic Based Evidence guide indicates similar principles. It goes ahead to guide that the experts involved should go an extra mile to take notes of everything they do, observing changes seen in any device at the scene. Similarly, it also gives a step-by-step procedure regarding the conditions of equipment found like standalone computers and cameras (National Institute of Justice, 2001).
Perhaps the main difference that comes out between the two guides is the depth of the details given and the overall arrangement of the content. While the Electronic Crime Scene Investigation guide gives very fine details that can be understood by a layman, the Good Practice Guide for Electronic Based Evidence assumes that the reader of the material is already conversant with the topic and can follow on any complex computer terms. A good example is on page 32 of the Electronic Crime Scene Investigation guide, where clear pictures of the removable storage devices and media described are presented. Some of the devices in pictures include scanners and different types of printers.
In conclusion, both guides are on target at giving a perfect guide for computer forensics where a gathering of evidence at a crime scene is involved. Despite the obvious differences that exist, there are enormous similarities that come out, which agree with the general principle of computer forensics. Overall, they are great guides for professionals seeking rich guidance on computer forensic tasks.
References
Anonymous (n.d).Good Practice Guide for Electronic Based Evidence. Association of Chief Police Officers, National High-tech Crime Unit.
Anonymous (2001). Electronic Crime Scene Investigation: A guide for First Responders. Washington: U.S. Department of Justice, National Institute of Justice, 200.
Robbins, J. (2010). An Explanation of Computer Forensics. Web.