Basic Vocabulary
Private Sector
Criminal
Acronyms
Basic Concepts
100

common cause evidence is lost or corrupted. It involves the presence of police officers and other professionals who aren’t part of the crime scene–processing team

professional curiosity

100

corporate cases that require less effort than a major criminal case

low level investigations

100

someone who might be a suspect or someone with additional knowledge that can provide enough evidence of probable cause for a search warrant or arrest

person of interest

100

a computerized system for identifying fingerprints that’s connected to a central database; used to identify criminal suspects and review thousands of fingerprint samples at high speed

AFIS

100

when conducting a search and seizure, objects in plain view of a law enforcement officer, who has the right to be in position to have that view, are subject to seizure without a warrant and can be introduced as evidence

plain view doctrine

200

standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest

probable cause

200

a portable kit containing only the minimum tools needed to perform disk acquisitions and preliminary forensic analysis in the field

initial-response field kit

200

data that doesn’t contribute to evidence of a crime or violation

innocent information

200

a mathematical algorithm that determines whether a file’s contents have changed

CRC

200

data the system maintains, such as system log files and proxy server logs

computer-generated records

300

evidence consisting of information stored or transmitted in electronic form

digital evidence

300

observing people or places without being detected, often using electronic equipment, such as video cameras or keystroke/screen capture programs

covert surveillance

300

a response kit with all the tools you can afford to take to the field

extensive-response field kit

300

chemical, biological, or radiological substances that can cause harm to people

HAZMAT

300

electronic data that a person creates and saves on a computer or digital device, such as a spreadsheet or word processing document

computer stored records

400

detecting data transmissions to and from a suspect’s computer and a network server to determine the type of data being transmitted over a network

sniffing

400

True or False? ISPs can investigate computer abuse committed by their customers.

False

400

True or False? If you follow police instructions to gather additional evidence without a search warrant after you have reported the crime, you run the risk of becoming an agent of law enforcement.

True

400

one of the governing bodies responsible for setting standards for various U.S. industries

NIST

400

wording in a search warrant that limits the scope of a search for evidence. It allows the police to separate innocent information from evidence

limiting phrase

500

a unique hash number generated by a software tool and used to identify files

non-keyed hash set

500

True or False? Corporate investigators ALWAYS have the authority to seize ALL computer equipment during a corporate investigation.

False

500

True or False? The reason for the standard practice of securing an incident or crime scene is to expand the area of control beyond the scene’s immediate location.

True

500

a group that sets standards for recovering, preserving, and examining digital evidence

SWGDE

500

a forensic hashing algorithm created by NIST to determine whether data in a file or on storage media has been altered

SHA-1