Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
How Technology & Science Have Impacted Forensics In Criminal Investigations
Criminal digital forensics case
Basics of digital forensics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009). Digital forensics can be broken down into three phases; acquisition, analysis, and presentation. The acquisition phase is where the data is saved in a way that it can be analyzed latter. Because it is not known at the time what data is or is not valuable to the case, all data is saved. In the analysis phase, the data is examined and placed into three major categories; inculpatory, exculpatory, or signs of evidence tampering (Carrier, 2002). Tools are used in this phase that are able to analyze for the list directory contents, deleted files, and recover the deleted files. In the presentation phase, the data has been documented in a way that it can undergo a peer review. When deleted files are recovered, the analyst must show how they were found because they were ... ... middle of paper ... ... include smart phones, cellphones, IPod, and MP3 devices. They get this distinction because they are small enough to be handheld (Bennett, 2011). The IPad does not fall into this category because it is considered more of a computer and less of a hand held device. These devices are very popular and many contain storage devices that are similar to a laptop. They are easily portable and can run many applications that a regular computer can run (Bennett, 2011). The reason these are so vital to digital forensics is that they typically contain large amounts of personal and organizational information. They are also used because they are essentially portable data carriers (Bennett, 2011). Because of their ease of use and types of data they contain, they have great potential for incriminating data and can be utilized as evidence in criminal cases (Bennett, 2011).
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Maras, M. (2012). Computer Forensics: Cybercriminals, Laws, and Evidence. Sudbury. Jones and Bartlett Learning LLC.
There is a wide range of Linux forensic software available. There are single tools like file carvers, or there are comprehensive collections of tools. In the following, some of the most popular Linux forensic tools are described. The focus is put on The Sleuth Kit because it is organized according to the different filesystem layers. This provides an interesting insight on how forensics is done on filesystems.
The last type of evidence I will discuss are documents. Everyone has a different handwriting and different characteristics that make it unique. Computers are also unique in the way they type and print out things. Document examiners can look over these and establish the similarities in the handwriting and computer forensic specialists can extract logs and other data from most devices.
A structured standardized approach to any evidence collection is going to be the best course of action. Any well-training computer forensic technicians should not jump into a search without some kind approved policy procedure which will include a checklist or standard operating procedure that will methodically guide them throughout the examination procedure. The cyber forensics should not be taken lightly and it starts with its collection methods.
The information gathered in this report will show the methodology and tools used to forensically examine any files or images stored in relation to the investigation claim of Bobby Joe. While the examination is being conducted I will show how the chain of custody of evidence is kept, what evidence was discovered in the file image, and identify and examine the devices used. It will also show what steps Bobby Joe took to store information on the claim against him. The results of this investigation will then be used to determine if any offences he may have committed according to the State laws. The report will also provide a summary of the information for a jury to examine and understand. USB flash drive without any security function causes
Britz, Marjie. 2009. Computer forensics and cybercrime: an introduction. Upper Saddle River, N.J.: Pearson Prentice Hall.
New types of technology have made it easier to track down and catch criminals. Then also made it easier for prosecutors to gather and present more credible information. Some new technology that has made it easier to track down criminals or help provide more reliable and supportive evidence is things such as DNA testing, computer technology, fingerprinting, and GPS tracking devices. “The main strengths of technology in the criminal justice system lie in the provision of databases which allow better and more efficient records to be stored and retrieved” (Bean 370). Prosecutors now in sense have “…an infallible test of truth, a foolproof method, of determining the accuracy and reliability of evidence and hence of convictions” (Pallaras 72). These 4 technological advancement...
The purpose of preserving the data is to ensure that it can be utilized in court. If the evidence is not properly handled and protected, it might be hard for it to be admitted in the legal actions against the criminals. It is at the heart of computer forensics to collect, document, preserve and interpret the computer data. The aim of performing computer forensics is to determine who was responsible for an activity in a digital environment through a procedural investigation. In preserving the digital data, the investigators use different technologies to get access to and analyze the data in the computer systems. Preservation of data also relates to how the official data is, by analysis using various techniques and aspects. This practice needs an advanced expertise that is not conversant with the regular system users and the system support
Keywords: digital forensics, information visualisation, computer security Introduction Digital forensics
the Abstraction layers that translate Raw Data into a form so that the investigator can find the errors. The Potential for error in data representation is unique to digital crime scene and requires extra precaution by the investigators such as compairing the results of multiple tools and inspecting the data at lower levels to double check the veracity of information that has been displayed through the forensic tools . digital investigator while searching a digital crime scene may encounter information which may have personal data and even evidences relating to other crimes he
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
A forensic interview is a structured conversation with a child or minor with the intention of eliciting detailed information about a possible event (s) that the child many have experienced or witnessed. Concurrently, for Van Heerden (1977: 8) forensics refer to the computerized activities or scientific knowledge employed by law enforcement agents to serve justice. In the study, forensic investigation is used to refer to any computer-related activities or methods used by police, investigators, prosecutors and all other law enforcement agents to gather facts, track down criminals, arrest or detain them, gather information, preserve information and finally present it in the court of law.
To control the effects of such crimes digital forensics has gained popularity in recent years. In today’s world, the dependency on computers is growing widely. Government agencies and private companies are attempting to protect themselves from cyber attacks with digital defence techniques like encryption, firewalls and heuristic or signature scanning, etc. Meanwhile, the number of attacks that include sensitive military data canters, targeting power grids and stealing trade secrets from both private and public organizations continues to increase. the detection, response and reporting of these kinds of intrusions as well as other incidents involving computer systems, are critical for cyber security professionals Just like that, if the data taken from the organizations encrypted across the network, to determine which sensitive files were stolen and that won’t be recognized by traditional packet capture techniques. However, passwords and encrypted keys can often be recovered by memory forensics, or even the file’s plain-text contents before they were encrypted, providing information to understand the scope of an
With the rapid development of image processing technology, it is getting easier to tamper with digital images without leaving any obvious visual trace. Today, seeing does no longer believe [1]. Image forgery, like any other illegal and pernicious activity, could cause serious harm to society.