When processing a physical crime scene, investigators must first secure the area to ensure that everyone is safe by arresting suspects and isolating the location. Thereafter, witnesses should be separated, to prevent collaboration on a common story. The third step involves scanning the scene to identify the primary part and the secondary one. Investigators should capture photographs of the overall area, close-ups, and items identified during the scan (Girard, 2017). During this stage, evidence markers and rulers are used for reference. Thereafter, a sketch of the scene is made to ensure it can be recreated elsewhere. The search for evidence that may have been overlooked during the initial scan is conducted to ensure the investigation is thorough. Lastly, the physical evidence is secured and collected through techniques that prevent damage. The evidence is logged onto an evidence log and marked with an evidence label. The label has a chain of custody where any person who accesses the evidence indicated to ensure it is admissible in a court of law.
The processing of an electronic crime scene should involve the identification of the information about the devices at the scene. This includes the people involved, sequence of events, timing, and location. It should occur before the electronic devices found are even touched. The investigators must maintain the power status of the device, whether a mobile phone or computer (Girard, 2017). The collection of the physical media where the digital evidence is located should be done, with minimal alteration to the condition of the device. Professionals can thereafter acquire the data inside the electronic devices and preserve the device and data in a secure storage. The analysis of the data acquired from the electronic devices follows to generate evidence for legal proceedings. The data enables the reconstruction of the incident under investigation.
Reference
Girard, J. E. (2017). Criminalistics: Forensic science, crime, and terrorism (4th ed.). Jones & Bartlett Learning.