Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
modern data storage devices
the importance of data protection
digital evidence and its importance
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: modern data storage devices
Potential Digital Evidence
As you can see in the photograph provided, Mr. Didit’s workspace contained numerous digital evidence items. There were two (2) computer towers on the floor that contained emails between Mr. Didit and Kazuki Corporation discussing the smartphone design along with image files of classified coding for the smartphone operating system. These towers were sealed within large anti-static evidence bags, establishing the chain-of-custody, and transported to the off-site facility for investigation. On Mr. Didit’s desk there was a USB storage device and two (2) unlabeled Compact Discs. All of these storage devices contain images and programming code related to the smartphone being released by both companies.
There were two (2) more USB storage devices in the drawer beneath Mr. Didit’s desk that were confiscated, but did not contain any evidence applicable to this investigation. The USB devices and CDs were tagged to establish chain-of-custody and sealed in anti-static evidence bags for transportation to the investigation facility. One (1) encrypted Western Digital hard disk drive was found on the desk of Mr. Didit which contained several prototype images as well as untested code for the smartphone design. The drive was added to the list of evidence establishing the chain-of-custody and then sealed in an approved anti-static evidence bag for transport.
The suspects Voice over Internet Protocol (VoIP) phone was also removed from the scene. The phone was believed to contain vital phone records which would prove that there was indeed communication between Mr. Didit and Kazuki Corporation. The phone was recorded on the evidence collection document and then transported to the investigation facility in an anti-static ev...
... middle of paper ...
... file systems as well as mobile devices including Apple’s iOS and Android platforms. The latest version of FTK, 5, comes with Explicit Image Detection (EID). EID “not only recognizes flesh tones, but shapes and image orientations that could be pornographic in nature” (AccessData, 2014). This feature makes FTK the tool most chosen when searching for images contained on digital devices. FTK was used on the two (2) computer towers and two (2) of the USB storage devices that revealed the images of the new smartphone design.
Works Cited
AccessData. (2014). Forensic Toolkit 5. Retrieved Feb 19, 2014, from AccessData.com: http://www.accessdata.com/products/digital-forensics/ftk Guidance Software. (2014). EnCase Forensic v7. Retrieved Feb 20, 2014, from Guidance
Software: http://www.guidancesoftware.com/products/Pages/encase-forensic/overview.aspx
Other evidence located within the grave consisted of a generic watch, two cigarette butts, a button, a washer and a shell casing. All of these could be analysed for finger prints and DNA. The cigarette butts would also show a serial number indicating the brand (shown in Figure 3), which can be useful if it is found a victim or offender smokes a particular type of cigarette.
Perhaps the action the Unit deserves most credit for was the cataloging of the seized evidence. Between the four men were over 10,000 photographs, 110 videos, and 18 audio tapes (Cheston, 2002). All this material depicted
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Forensic science has now been recognized as an important part of the law enforcement team to help solve crimes and cold cases. The advances in technology are being used each day and we must continue to strive to develop better advances in this field. The recent discovery of using DNA in criminal cases has helped not only positively identify the suspect, but it has helped exonerate hundreds of innocent individuals. “With new advances in police technology and computer science, crime scene investigation and forensic science will only become more precise as we head into the future.” (Roufa, 2017) Forensic science and evidence helps law enforcement officials solve crimes through the collection, preservation and analysis of evidence. By having a mobile crime laboratory, the scene gets processed quicker and more efficiently. Forensic science will only grow in the future to be a benefit for the criminal justice
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
Fourteen people were killed in this horror attack. Even after two months, investigators don’t have ideas about the terrorists’ information. However, investigators found a new clue, a new iPhone in the car that belongs to terrorists. IPhone is an important point, in this case, it might relate to other planning that terrorists have, and others terrorists. Court order Apple to unlock the iPhone in order to help law enforcement agents. And the phone owner also agrees to examine it. But Apple rejects to comply it. Apple indicates their operating systems only allow the user to get access to the device. Even Apple itself don’t have ways to do it. Apple also indicates, if they do what court order them to do in this case, Apple think, their brand reputation will be damaged. The author believes that Apple is better to comply, to assist law enforcement agents. Author think Apple should consider lawfully issued court order at first, then its business
“Advance in Forensics Provide Creative Tools for Solving Crimes.” www.ctcase.org. Np. n.d. Web. 17 March 2014.
The collection, custody and preservation of forensic evidence is a vital aspect of evidence integrity, without proper adherence to these procedures, crucial evidence that could potentially have great impact on a court case could be rendered useless. In the case of criminal proceedings, a skilled defence lawyer will look to scrutinise every step taken by forensic practitioners’ involved within the case in regards to the continuity of the evidence, in doing this they attempt to undermine the practitioner’s ability to properly carry out strict evidence collection, protection and preservation procedures and also look to find fault in the techniques they used to carry out these procedures.
...he defendant’s computer from the witnesses’ computers. Despite Ravi’s attempt to tamper with evidence, the expert used computer forensic tools and processes to collect and record evidence.
New types of technology have made it easier to track down and catch criminals. Then also made it easier for prosecutors to gather and present more credible information. Some new technology that has made it easier to track down criminals or help provide more reliable and supportive evidence is things such as DNA testing, computer technology, fingerprinting, and GPS tracking devices. “The main strengths of technology in the criminal justice system lie in the provision of databases which allow better and more efficient records to be stored and retrieved” (Bean 370). Prosecutors now in sense have “…an infallible test of truth, a foolproof method, of determining the accuracy and reliability of evidence and hence of convictions” (Pallaras 72). These 4 technological advancement...
Live acquisition: The future of data acquisitions is shifting toward live acquisitions because of the use of disk encryption with newer operating systems (OSs). In addition to encryption concerns, collecting any data that’s active in a suspect’s computer RAM is becoming more important to digital investigations. The processes and data integrity requirements for static and live acquisitions are the same. The only shortcoming with live acquisitions is not being able to perform repeatable processes, which are critical for collecting digital evidence.
The biggest challenge investigators face and who is involved with high tech crime is the fast-paced constant evolving nature of technology. When companies come out with new devices or new versions of old devices which is almost all the time, and those who gather digital evidence must remain current to be able to locate and preserve all potential evidence. As technology evolves the capacities of these devices will rapidly increase while their form factor grows continually smaller. Investigators must preserve digital evidence to make sure it is suitable for presentation in court as well. Investigators must first never change a crime scene or alter evidence. It is their goal to document and preserve the scene exactly as it was when the crime occurred. Extreme caution and care is needed because the mere act of documenting or cataloging a crime scene means that investigators are interacting with the scene. The second concern is the physical fragility of the evidence. Care must be taken to keep items from getting wet, stepped on etc, this can also be applied to digital evidence. Investigators have been able to examine hard disk drives that have been through fires because the drives are usually air and water tight and impervious to temperatures into the thousands of degrees. The third issue is that digital evidence can be lo...
Song, Sora. (2002, October). Body of evidence: all the high-tech gadgets and tests won't matter a bit if evidence isn't meticulously gathered at the scene of a crime. Time, 160(17), 28-29. Retrieved January 21, 2011, from ABI/INFORM Global. (Document ID: 633215341).
Today, technology has affected our global surroundings in a number of ways. Technology has created a more advanced society and economy. We use technology in every aspect of life today. New innovations and technology helps create a safer atmosphere and reduces the rate of crime. Technology is the usage and knowledge of techniques or is systems of these things. Usage of technology in the criminal justice system is not new but more apparent today. Technology in criminal justice will continue to challenge us to think about how we turn information into knowledge. Due to new technology, criminal investigations are able to maintain and improve their processes. Forensic science, DNA, other and future technology has all had a tremendous impact on criminal investigation and its process.
Digital Forensic is described as “ a forensic science encompassing the recovery and investigation of materials found in digital devices “ (“Introduction to Digital Forensics,” 2011). The objective of digital forensics is to implement a well-structured investigation while preserving a documented chain of custody and evidence custody form to know what really occurred on digital devices and who was accountable for it.