Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet is essentially a guide on how to collect and process digital evidence in any situation. In this book, digital evidence is defined as “any data stored or transmitted using a computer that support or refute a theory of how an offense occurred or that address critical elements of the offense such as intent or alibi” (Casey, 7). Most crimes today have some kind of digital element to them, from the crime itself to the criminal’s use of computer systems to communicate, store incriminating data, or search for ways to commit a crime and this creates new challenges for those in law enforcement (Casey, 3).
To fully understand what digital evidence is and how it is to be collected, one must have knowledge of the different types of computer systems. The first and most obvious is called an open system. This consists of a hard drive, keyboard, and a monitor, such as a desktop computer or laptop (Casey, 7). The next type of system is a communication system. This system includes telephones, mobile phones, the Internet, and computer networks, anything that communicates with another device (Casey, 7). The final type of computer system is an embedded system, which includes anything that has a computer or a computer chip embedded in it such as a GPS system, mobile devices, and vehicles (Casey, 8).
These three different systems all provide different types of information that may be useful to digital investigators. For example, an open system stores data on the hard drive. The data stored can be anything from web searches to incriminating pictures. Communication systems can tell whom a suspect has been in contact with leading up to the crime. Embedded systems can show ...
... middle of paper ...
... everything happens on computers, with the aid of computers, or can be found online. If law enforcement officers don’t take advantage of this during their investigations, they could lose valuable evidence and time on a case. They also have to take care to handle all digital evidence as they would physical evidence so that it will be admissible in court. While digital evidence collection can still be considered to be in its early stages, I believe that it can provide some of the most valuable evidence in many different crimes and Casey’s book can help to advance the way digital evidence is collected simply by providing understandable information about it, even for those of us who are not technologically savvy.
Works Cited
Casey, Eoghan. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. 3rd Ed. Boston: Academic Press, 2011. Print.
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Gardner, T. J., & Anderson, T. M. (2013). Criminal evidence: Principles and cases (8th ed.).
The last type of evidence I will discuss are documents. Everyone has a different handwriting and different characteristics that make it unique. Computers are also unique in the way they type and print out things. Document examiners can look over these and establish the similarities in the handwriting and computer forensic specialists can extract logs and other data from most devices.
New types of technology have made it easier to track down and catch criminals. Then also made it easier for prosecutors to gather and present more credible information. Some new technology that has made it easier to track down criminals or help provide more reliable and supportive evidence is things such as DNA testing, computer technology, fingerprinting, and GPS tracking devices. “The main strengths of technology in the criminal justice system lie in the provision of databases which allow better and more efficient records to be stored and retrieved” (Bean 370). Prosecutors now in sense have “…an infallible test of truth, a foolproof method, of determining the accuracy and reliability of evidence and hence of convictions” (Pallaras 72). These 4 technological advancement...
Forensic science has now been recognized as an important part of the law enforcement team to help solve crimes and cold cases. The advances in technology are being used each day and we must continue to strive to develop better advances in this field. The recent discovery of using DNA in criminal cases has helped not only positively identify the suspect, but it has helped exonerate hundreds of innocent individuals. “With new advances in police technology and computer science, crime scene investigation and forensic science will only become more precise as we head into the future.” (Roufa, 2017) Forensic science and evidence helps law enforcement officials solve crimes through the collection, preservation and analysis of evidence. By having a mobile crime laboratory, the scene gets processed quicker and more efficiently. Forensic science will only grow in the future to be a benefit for the criminal justice
Then finally to record and log all the evidence that is being taken and follow procedures to make sure everything is done by the book. Following this, the chapter talks about if a laptop is involved these steps are pretty much identical to the previous steps. The chapter continues to state that if the computer is found
Live acquisition: The future of data acquisitions is shifting toward live acquisitions because of the use of disk encryption with newer operating systems (OSs). In addition to encryption concerns, collecting any data that’s active in a suspect’s computer RAM is becoming more important to digital investigations. The processes and data integrity requirements for static and live acquisitions are the same. The only shortcoming with live acquisitions is not being able to perform repeatable processes, which are critical for collecting digital evidence.
Physical evidence is any physical object that contains reliable information that supports a hypothesis about the incident. Digital evidence is physical or electronic information (such as a written or electronic documentation, computer log files, data, reports, physical hardware, software, disk images, objects and so on) are collected during the investigation conducted computer. Evidence includes, but is not limited to, computer files (such as log files or generated reports) and human-generated files (such as spreadsheets, documents, or eail
White-collar crime, specifically computer crime, is becoming more popular as computers become more readily available. Crimes using computers and crimes against computers are usually committed without fear of being caught, due to the detachment of the offender from the victim.
Gaensslen, R. E., Harris, H A., & Lee, H. (2008). Introduction to Forensic Science and Criminalistics. New York, NY: The McGraw-Hill Companies, Inc. .
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
Digital Evidence is electronic data, materials, objects, property, documents, or records that are presented in court to prove or disprove allegations made against an arrestee. It takes the form of electronic data or information stored in bits and bytes on magnetic media. The examples of devices that can contain digital evidence include; cellular phones or similar all in one devices, pagers, digital voice recorders.
Today, technology has affected our global surroundings in a number of ways. Technology has created a more advanced society and economy. We use technology in every aspect of life today. New innovations and technology helps create a safer atmosphere and reduces the rate of crime. Technology is the usage and knowledge of techniques or is systems of these things. Usage of technology in the criminal justice system is not new but more apparent today. Technology in criminal justice will continue to challenge us to think about how we turn information into knowledge. Due to new technology, criminal investigations are able to maintain and improve their processes. Forensic science, DNA, other and future technology has all had a tremendous impact on criminal investigation and its process.
There are many aspects and procedures in crime scene investigation that are very essential in each case that is presented. Evidence collection, preservation, documentation and the role Digital Image Capture and Processing are important keys in any investigation. There are protocols that must be followed to protect the integrity of the evidence that is collected. In many instances, cases are lost due to contamination and improperly collecting evidence. To ensure that these steps are taken when collecting evidence, photographs must be taken and documented.
Throughout the years, technology has been increasing in both good and bad ways. Technology is now being used to contact people through social media, link people together through group chats, and also spy on people. Although connecting with people instantly on social media is the upside to technology usage, people often tend to share private information that can be used in the wrong way which is the downside of technology. As both technology and crime increases, technology usage is now being increased to help solve crimes. Many years ago, without the usage of technology, many aspects of a crime was not questioned or the resources to uncover certain evidence were both time consuming and/or expensive. The Police Chief Magazine list many technological improvements that have been put in place to