Digital Forensics Sachin Durgaiah University of Texas at Dallas Abstract: This paper starts with the history of Digital Forensics since when it is being used. The paper then moves to the process of digital forensics and its limitation. We shall look into the legal methods of computer forensics and also how to overcome the disadvantages of computer forensics. Introduction: Digital forensics is mainly used in investigating the data found on electronic devices. Digital forensics has its core application in computer crime. Let look at the history of Digital forensics. It all started during the 1970s and early 1980s. The first crime involving computer came to light in the 1978 in Florida. This crime included unauthorized modification of important …show more content…
During the 1980s the investigators used few specialized tools. They often did live analysis on media using existing sysadmin tools which was to extract evidence. But this method had the risk of data modification. This problem was addressed in the 1900s. There soft wares that was developed called “SafeBack” which overcame this problem. More recently soft wares for mobile devices have been developed. Initially investigators used to access the data directly on the device, but soon this was overcome by the use of Radio Tactics Aceso …show more content…
This incident happened in Canada. Where a teen’s body was found. There were no evidence about how to put the suspects behind bars. The suspects were her class mates. While they had burned her body but the trails remained on the spot. So, they had to dump her body elsewhere. Which they did. The investigators faced problems in finding evidence. Then the investigators used the help of digital forensics field. The digital forensics field could secure their browser history, messages sent from the cellphones, a confession on World of Warcraft chat, GPS data associated with a message sent from the spot of murder, google map searches for places to dump a body. These evidences helped the investigators to put the two teen behind bars. Now let’s look at few tools that are used in the field of digital forensics [1] like disk and data capturing tools, Internet analysis tools, hidden file viewers, deleted email recovery and analysis tools and network traffic analysis tools. Now let’s look at few techniques that are used in digital forensics. 1. Digital forensic
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Now-a-days the technology advancements is are now mainly used for crimes. To investigate this occurring crimes digital forensic investigator is required.
This essay reviews the 18 year-old cold case of Krystal Lynn Beslanowitch, a 17 year-old prostitute who died from head wounds in 1995 along the Provo River, Utah. It evaluates the type of forensic science technology used - touch DNA and M-Vac wet vacuum – before going on to look at how this new technology was used in the case. This essay explores the role forensic science and DNA analysis played in solving the case, leading police to the killer Joseph Michael Simpson, a convicted felon who was on parole at the time of the murder.
There is a wide range of Linux forensic software available. There are single tools like file carvers, or there are comprehensive collections of tools. In the following, some of the most popular Linux forensic tools are described. The focus is put on The Sleuth Kit because it is organized according to the different filesystem layers. This provides an interesting insight on how forensics is done on filesystems.
The last type of evidence I will discuss are documents. Everyone has a different handwriting and different characteristics that make it unique. Computers are also unique in the way they type and print out things. Document examiners can look over these and establish the similarities in the handwriting and computer forensic specialists can extract logs and other data from most devices.
In today’s time, modern Crime Scene Investigation has increased rapidly. From throughout the late 1900’s and in the early 2000’s (Taylor 1). For all of the evidence that they find, a solid foundation has formed over the thousands of years of Crime Scene
“Advance in Forensics Provide Creative Tools for Solving Crimes.” www.ctcase.org. Np. n.d. Web. 17 March 2014.
Forensic Science, recognized as Forensics, is the solicitation of science to law to understand evidences for crime investigation. Forensic scientists are investigators that collect evidences at the crime scene and analyse it uses technology to reveal scientific evidence in a range of fields. Physical evidence are included things that can be seen, whether with the naked eye or through the use of magnification or other analytical tools. Some of this evidence is categorized as impression evidence2.In this report I’ll determine the areas of forensic science that are relevant to particular investigation and setting out in what method the forensic science procedures I have recognized that would be useful for the particular crime scene.
An imperative aspect of the collection of physical evidence is the legal considerations involved with obtaining evidence, the law sets out strict guidelines which describe when evidence can be collected, who it can be obtained fr...
As far back as 1832, James Marsh was the first to use forensics at trial to give evidence as a chemist in 1832. Since that time forensic science and evidence has come a long way in various ways and technology to help in determine if the suspect is guilt or not, through such things as DNA testing, blood, and fingerprints. The first forensic police crime lab was created in 1910. The contributions of Dr. Edmond Locard, a French scientist and criminologist, proposed that “everything leaves a trace”. This principle is still valid today as it was so many years ago. No matter how small, the specialized trained technicians and investigators can take these methods and go to a crime scene to get evidence. “Forensic science is the application of sciences such as physics, chemistry, biology, computer science and engineering to matters of law.” (Office of Justice, 2017) These different sciences can help achieve and assist in solving a case. Forensic science has also the ability to prove that a crime was committed, it can find the elements of the crime, it can help place the suspect at the scene and whether the suspect had any contact with the victim. However, in the last several years the techniques and with the use of technology the evidence that forensic science uncovers can also exonerate an innocent individual who has been falsely accused of the
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
Throughout this report, we will discuss what a digital forensics investigator should know in relation to Steganography in electronic communication. We will talk about the history of steganography and then discuss how steganography techniques works in comparison to cryptography and digital watermarking. We will then talk about two different types of image and audio steganography methods that can be used to conceal hidden information. These methods are Least Significant Bit Insertion (LSB) and Discrete Cosine Transform (DCT). We will then talk about a tool that can be used hide and extract hidden
Today, technology has affected our global surroundings in a number of ways. Technology has created a more advanced society and economy. We use technology in every aspect of life today. New innovations and technology helps create a safer atmosphere and reduces the rate of crime. Technology is the usage and knowledge of techniques or is systems of these things. Usage of technology in the criminal justice system is not new but more apparent today. Technology in criminal justice will continue to challenge us to think about how we turn information into knowledge. Due to new technology, criminal investigations are able to maintain and improve their processes. Forensic science, DNA, other and future technology has all had a tremendous impact on criminal investigation and its process.
Due to the advances in technology, criminal investigation has improved and citizens expect detectives to unearth findings in a timely and precise manner. However, criminal investigation requires a considerable amount of preparation and training time since it utilizes both science and art. For a computer forensic incident involving child pornography, the investigator must carry out the process in a in an orderly and systematic way analyzing and evaluating the relevant facts.