Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
How has technology changed criminal investigation
Technology use in criminal investigation
How has technology changed criminal investigation
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: How has technology changed criminal investigation
Due to the volatile nature of the computer memory, information might be lost or overwritten over time. The chip in the random access memory helps the computer to run its programs more efficiently by pulling the data from the RAM. However, every time a machine is switched on, some data stored in the RAM is lost. Whereas the data stored on the hard drive is known as persistent data, the RAM is known as volatile memory. The RAM is constantly swapping the rarely used data that is the hard drive to create space for new information. Therefore, the longer the investigators wait, the more likely they will lose the incriminating data since the computer is not indefinitely persistent. It is fortunate that the investigators have found ways to preserve the evidence without necessarily switching on the computer. The contents are used in courts as the lawyers can use them as evidence for criminal activity. …show more content…
As technology advances, the issues of evidence preservation are also changing.
The purpose of preserving the data is to ensure that it can be utilized in court. If the evidence is not properly handled and protected, it might be hard for it to be admitted in the legal actions against the criminals. It is at the heart of computer forensics to collect, document, preserve and interpret the computer data. The aim of performing computer forensics is to determine who was responsible for an activity in a digital environment through a procedural investigation. In preserving the digital data, the investigators use different technologies to get access to and analyze the data in the computer systems. Preservation of data also relates to how the official data is, by analysis using various techniques and aspects. This practice needs an advanced expertise that is not conversant with the regular system users and the system support
staff. Digital evidence is stored in the form of text files, videos, images, or any other readable format in a computer. The digital evidence is important as it serves as an additional evidence against the culprit and to help in the investigation process. During investigations, examiners follow a standard procedure to ensure that there is no contamination of the evidence collected. The digital copy of the evidence is carefully conducted to ensure that the data remains in its pristine condition. The process of extracting the criminal proof is very delicate as the investigators must make sure that the integrity of data is maintained and that they cannot be questioned for contaminating the evidence. Digital information is very fragile as it can be changed, damaged, or destroyed if it is not properly handled during the assessment process. The electronic evidence needs to preserve its integrity, and the contents should not change, as the investigators should ensure that it is the same as it appeared in the gathering phase. To accomplish this, investigators must isolate the computer and other digital devices from the suspect’s premises to make sure that they are free from access by anyone unauthorized. Next, the investigators duplicate the entire machine to create a digital copy and isolate the original hard drive and have it stored in a safe place that is only accessible to higher authority with allowed authorization, to ensure the pristine condition and integrity is of high degree. The investigator should ensure that the suspect’s computer is switched off when the duplication process is ongoing, and the best way to handle it is by using write blocker that minimizes the risk of contamination. The volatile information in the random access memory (RAM) must also be handled carefully during retrieval while ensuring that it is not contaminated, therefore is an obligation that all investigations be performed on the digital copy created. Finally, the chain of custody is very crucial part of the preservation process that is not breakable at any point in time until the process of investigation is done.
Other evidence located within the grave consisted of a generic watch, two cigarette butts, a button, a washer and a shell casing. All of these could be analysed for finger prints and DNA. The cigarette butts would also show a serial number indicating the brand (shown in Figure 3), which can be useful if it is found a victim or offender smokes a particular type of cigarette.
From a trial strategy point of view, you always start with the piece(s) of evidence you believe are most damaging to the client's case and work backwards looking for an exploitable flaw in the search and seizure procedure that would make that or those item(s) inadmissible. The further back in the series of events you can argue a fatal flaw, the more likely that the evidence and any additional materials which flowed from that particular item of evidence will be excluded. This is the practical analysis of all the times we see or hear of law enforcement arguing that there was some technical item which drew their attention and suspicion and justifies their hunch that criminal activity is afoot.
Arguments can be made out of just about anything. An argument has two sides, and conveying an opinion is one of those two sides. Arguments sort out the views of others and the support of those arguments represented by those people from past events. These events let others show their argument about what will happen in the future, and of how the future carries on today. Newspaper articles can be arguments, and laws being passed in Congress have a form of argument associated with them. There are many types of arguments that are presented in many ways. In Everything’s an Argument by Andrea A. Lunsford and John J. Ruszkiewicz, information is given about three specific types of argument: forensic, deliberative, and ceremonial. Forensic arguments deal with the past, deliberative talks about the future, and ceremonial is all about the present. I have identified each of these arguments in the form of newspaper articles.
It is the computer forensics job to look through all of the computer files, even the deleted ones, to see if there are any incriminating files that would prove them guilty. Even reporting them to the jury is one of the jobs that a computer forensic person might have. Not only does this community work closely with eh police force, they can also work within the FBI or a company that uses computers in their business like Apple. Th...
This memory is assists in allowing the computer to simultaneously read and write data at the same time. Simply put, RAM is the most common form of memory that is utilized by computers as well as other devices. There are specific types of RAM that include dynamic random access memory and static random access memory, or DRAM and SRAM respectively. These two RAM are very different in terms of how they allow data to be read and written. Dynamic random access memory is often considered the most frequent type found in computers. Static random access memory is also found in computer, and is usually referred to as the faster of the two types due to the fact that refreshing of this form of memory is not needed whereas with dynamic random access memory it is. The term RAM is often used to describe what the computer uses to function. It is the main memory or primary memory whereby all processes and software run. Since it is random access memory, it is only available at the time a certain process is needed and is not stored anywhere on the computer specifically (2007). This is what makes random access memory often confusing to understand particular since computers also have what is known as read only
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Technologies are advancing in today's world where more information is being generated, stored and distributed through digital gadgets. This requires investigators and forensic expert to increase the use of digital evidence gathering as a tool to fight against cyber-crime (International competition network, n.d.).
The criminal justice system has changed a lot since the good old days of the Wild West when pretty much anything was legal. Criminals were dealt with in any fashion the law enforcement saw fit. The science of catching criminals has evolved since these days. We are better at catching criminals than ever and we owe this advancement to forensic science. The development of forensic science has given us the important techniques of fingerprinting and DNA analysis. We can use these techniques to catch criminals, prove people's innocence, and keep track of inmates after they have been paroled. There are many different ways of solving crimes using forensic evidence. One of these ways is using blood spatter analysis; this is where the distribution and pattern of bloodstains is studied to find the nature of the event that caused the blood spatter. Many things go into the determination of the cause including: the effects of various types of physical forces on blood, the interaction between blood and the surfaces on which it falls, the location of the person shedding the blood, the location and actions of the assailant, and the movement of them both during the incident. Another common type of forensic evidence is trace evidence. This is commonly recovered from any number of items at a crime scene. These items can include carpet fibers, clothing fibers, or hair found in or around the crime scene. Hairs recovered from crime scenes can be used as an important source of DNA. Examination of material recovered from a victim's or suspect's clothing can allow association to be made between the victim and other people, places, or things involved in the investigation. DNA analysis is the most important part of forensic science. DNA evidence can come in many forms at the crime scene. Some of these forms include hair; bodily fluids recovered at the crime scene or on the victim's body, skin under the victim's fingernails, blood, and many others. This DNA can be the basis of someone's guilt or innocence; it has decided many cases in the twentieth century. As the times continue to change and the criminals get smarter we will always need to find new ways to catch them. Forensic science is the most advanced method yet, but is only the beginning. As the field of science grows so will the abilities of the
Evidence is the key element in determining the guilt or innocence of those accused of crimes against society in a criminal court of law. Evidence can come in the form of weapons, documents, pictures, tape recordings and DNA. According to the American Heritage College dictionary, evidence is the documentary or oral statements and the material objects admissible as testimony in a court of law (476). It is shown in court as an item of proof, to impeach or rehabilitate a witness, and to determine a sentence. This paper will examine two murder cases, O.J. Simpson and Daniel Taylor.
Defendants have the right to all exculpatory and mitigating evidence in the state's possession during the discovery process, which has been the procedure for the last half century. During the discovery phase of the Morton case, the only files that were turned over to Morton’s lawyers were crime scene photos and an autopsy report. Anderson kept everything else back, including the notes from the lead investigator Sergeant Don Wood, and Morton’s oral statements that were taken by Woods and Sheriff Boutwell. According to Morton’s lawyers (Texas Monthly, 2012), they had never encountered this kind of hardball. However, in the state of Texas statute requires law enforcement officers to turn over all their reports and notes once they took the stand,
Collecting evidence from a crime scene is a crucial aspect of solving crimes. Before evidence can be seized, there must first be a court order approving the search of the crime scene and the seizure of the evidence found at the scene. Standard protocol for officers is for them to always use latex gloves, avoid plastic bags, double wrap small objects, package each object separately, and to collect as much evidence as possible. It is better to have too much evidence than to not have enough. There are countless amounts of evidence that can be found at a crime scene.
...captures important data on live computer evidence at any computer crime investigations, without the need of particular forensic expertise. The tool is activated after being installed on a USB flash drive then plugged into a USB port. The features the tool includes are password decryption, data extraction and Internet history recovery. The most outstanding feature that COFFEE offers is the recovery of data stored in volatile memory that could be lost if the computer was turned off.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
Physical evidence is additionally important in every criminal investigation because too often witness accounts are sometimes biased or unreliable. Physical evidence such as trace evidence, DNA, and fingerprints may objectively attach one or more persons to a victim or suspect to a crime. Favorably, physical evidence can also demonstrate inestimable for exonerating an innocent suspect. Laboratory members and criminal investigators should perform together to resolve the biggest portion of evidence to institute the right suspect for a strong prosecution. Willingly, investigation officers should aggressively contact laboratory personnel when questions arise about the cases because DNA evidence is sensitive.
Forensic Science is a application of a natural science which draws upon the principle and methods of all traditional science such as physics, chemistry , biology and mathematics in legal system. Forensic science include forensic medicine, odontology, anthropology, psychiatry, forensic toxicology, forensic radiology, forensic engineering.