The development of a search warrant application during the investigation of a computer crime has to take into considerations several factors. Some of these considerations include the elaboration of how the computer is used to conduct crime; and the protection of some of the information gathered (McLean, 2005). The search warrant application requires the investigators to disclose information that will give them the permission to conduct a search on devices that are presumed to have been used in carrying out the computer crime. The offense must be measurable so as to disclose the extent of damage that the crime has caused. A good example is when a person uses a database contained within the computer to make record sales made by selling illicit drugs. The investigators must record this information in the search warrant application form so that they can be given the permission to conduct the search.
The investigators should take into consideration the amount of information they reveal in the search warrant application form. Some of the information should be protected so as to prevent jeopardizing the investigation process. A good example is the decision of not revealing the identity of the informant. A confidential informant may be very helpful in the process of conducting an investigation on the computer crime (McLean, 2005). Revealing their identity in the search warrant application may make the company to deny them access to the computer that contains the criminal data.
A single crime scene can affect cyber investigations if the evidence is not well secured. The crime scene should be handled properly and images of the crime scene should be captured in its original state (Holland, 2014). The investigations can be affected if the crime scene is not preserved. Preservation is done by putting limitations on the people who are allowed to access the crime scene. These steps are carried out so as to prevent the removal of evidence or compromising the evidence (Holland, 2014). Multiple crime scenes also present the same problems if they are not well secured. Multiple crime scenes present an additional problem because it will mean an investigator has to study all the crime scenes. He has to establish whether the crime scenes are related. Studying one scene takes time, and this calls for effective securing and preservation of the crime scenes.
References
McLean, J., (2005, Feb 4). Basic Considerations in Investigating Computer Crime, Executing Computer Search Warrants and Seizing High Technology Equipment. BILETA. Retrieved from: http://www.bileta.ac.uk/content/files/conference%20papers/1999/Basic%20Considerations%20in%20Investigating%20Computer%20Crime,%20Executing%20Computer%20Search%20Warrants%20and%20Seizing%20Equipment.pdf
Holland, J. F., (2014, Oct 9). 4 Crime Scene Mistakes that can Sink a Cyber-Forensic Investigation. GCN. Retrieved from: http://gcn.com/articles/2014/10/09/computer-forensics-mistakes.aspx