Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
How Technology & Science Have Impacted Forensics In Criminal Investigations
The importance of digital evidence
The importance of digital evidence
Don’t take our word for it - see why 10 million students trust us with their essay needs.
This document provides information regarding the collection and examination of information from four sources of data that can be found on various devices. Furthermore, the sources of data have been written in the order to best reflect its usefulness in regards to network intrusion, malware installation, and insider file deletion. As a result, digital forensic investigators will acquire an enhanced understanding of data sources, the collection and examination process, and challenges that can occur during an investigation. Data Sources Used In Digital Forensic Investigations The advancement in technology has always been a double edged sword in human history. On one side, it provides a positive quality of life and advancement for humanity and …show more content…
Data has become the pinnacle of digital forensics and its ability to collect, examine, analyze, and report on compiled information. Kent et al. (2006) explains that the digital forensics process (Figure 1) will aid digital investigators in developing a better comprehension of an incident by effectively processing the data of a case. Furthermore, Whitcomb (2002) expounds that the “acquisition of digital information” must follow the legal and/or corporate procedures for the collection of digital evidence in accordance with the rules and regulations of the …show more content…
This knowledge would help the digital investigator prepare their forensic toolkit for acquisition of the digital evidence in an effective manner. Furthermore, this is significant because technology has become so prevalent and abundant that there can be various diverse media and interfaces found at a crime scene. According to Kent et al. (2006), some of the most frequent media discovered at crime scenes are “desktop computers, servers, network storage devices, and laptops”. Subsequently, digital forensics investigators must ensure that they have the proper equipment necessary for data collection of any of these media. Digital forensics investigators must be aware that this is very important because the collection of digital evidence is challenging because the information is a “product of the data stored, the application used to create and store it, and the computer system that directed these activities” (Noblett, Pollitt, & Presley,
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Evidence essentially comes in two forms: verbal or physical. For instance, verbal evidence could be spoken evidence acquired from a wiretap. Physical evidence could include DNA, blood, or bodily samples. Another reliable origin evidence is digital documentation. “As technology has become more portable and powerful, greater amounts of information are created, stored, and accessed” (GEDJ). Over the past few decades, technology has advanced to extreme levels! The most common technology used to find digital evidence are cell phones, computers, tablets, external storage devices, GPS locators, and various other devices (GEDJ). Text messages, social media posts, pictures, etc. are becoming more common data in investigations of the modern era. “Digital evidence can come from both suspects and victims, as all involved parties may have their own personal devices that are relevant to the investigation” (GEDJ). If they are available, computers, phones, social media and much more are very useful sources of gathering data for a criminal case. For instance, both the suspect and the victim may have text messages on their cell phones that could add to the search. “In some criminal cases, digital evidence can be useful if the suspect had associated with it. In some cases it can lead in the wrong direction or to the wrong people. Or it could simply be useless if the suspect didn 't use anything digital”
Abstract This paper discusses several implementations of modern technology in criminal investigations, and the ethical issues that accompany these techniques, focusing on the tradeoff between security and privacy. Specific topics include centralization of information, telecommunications, and general technology. Cases are cited for each topic, as well as a discussion of the ethical issues involved.
Rape, murder, theft, and other crimes almost always leave a devastating mark on the victim. More often than not, it would be impossible to identify the perpetrator a crime without forensic science and the technology it uses. Forensic science allows investigators to unmask the secrets of the crime scene. Evidence gathered at the crime scene helps to identify the guilty party, murder weapon, and even the identity of the victim (Harkawy, 1991: 276). The new technologies enables the forensic experts to have better and faster access to accumulated information, to be more accurate in the identification of victims or delinquents, and minimizes the possibility of wrongful accusations. New technology has improved the methods and techniques that forensic scientists and law enforcement investigators use, in order to provide a safer environment for other people. Information technology is one of the most important aspects in forensic science. It is very important for the forensic experts to receive the undisturbed evidence, such as fingerprints left at the crime scene, as quickly as possible, for more accurate readings. Thus using space technology, such as satellite communication, enables the forensic experts to "gather and digitize evidence at the crime scene, enter it into an on-site computer, and beam the data to a crime lab for swift analysis" (Paula, 1998: 12). Therefore, due to the use of this technology, forensic experts in laboratories can examine the evidence in short time, and the possibility of damage or unlawful manipulation of the evidence before the trial is minimal (Paula, 1998: 12). More often than not, "criminals" wear gloves at the time of the crime, thus to obtain a fingerprint...
taking away job from humans, increasing health issues and taking your personal life to the
The serial position effect has been studied extensively for many years. Researchers have designed a variety of different studies in order to analyze and explain both, the primacy and the recency effect. The primacy effect is the tendency for the first items presented in a series of words to be recalled more easily, or to be more influential than those presented at the end of the list. On the other end, there is also the recency effect. The recency effect is the tendency to recall the items located at the end of the list. Many studies have been designed to analyze how the primacy effect works and its accuracy. For instance, research compared the primacy and the recency effect (Jahnke, 1965). Forty-eight college students read lists of 6, 10, and 15 English words in a counterbalanced order. Twenty-four of the students were given instructions for the immediate serial recall of the list; while the other half of students were not aware that they would need to recall words from a list. Both groups received a total of 12 different lists. The words were read at a rate of one word per sec without any emphasis on specific word. In addition to that, the participants’ responses were recorded in an interval of 30 seconds. Results showed that the recency effect is stronger for free serial recall and for a longer interval than primacy effect (Jahnke, 1965). When instructions were given for a serial recall, primacy effects were stronger and recency effect weaker than when instructions were given for free recall. As the length of lists increased, the recency effect became stronger and more accurate.
Evaluation of the forensic tools identified UFED Physical Analyzer as the ideal choice. A cost-benefit analysis between the two tools and UFED had favorable results by mitigating the cost of training. Furthermore, extensive testing by the author and software tests performed by the U.S. Department of Homeland Security’s (DHS) Computer Forensics Tool Testing (CFTT) program determined UFED supports more mobile devices without reporting errors. In addition, the most important feature a mobile forensics tool has is the ability to retain integrity. This is especially true if a criminal case used the mobile device as evidence. UFED has been found to do this extremely well, where OFS falls short due to installing a program on the original device.
The transitional growth in the forensic science sector has not been without challenges. Though the world has experienced increased capabilities and scientific knowledge, which has led to faster investigations and results, many forensic experts have argued that forensic laboratory testing, in the light of 21st century technological advancements, is yet to meet the expected rate in quick available testing and analysis (Mennell & Shaw, 2006). This is with respect to the growing rate of crime and the high demand of quick crime scene testing and analysis. In the science of crime scene, analysis and interpretation of evidence is majorly dependent on forensic science, highlighting the change in the role of forensic sciences (Tjin-A-Tsoi, 2013). In the business of forensic science, time is beginning to play important role in the evidence testing and analysis which is becoming crucial in reducing ...
New types of technology have made it easier to track down and catch criminals. Then also made it easier for prosecutors to gather and present more credible information. Some new technology that has made it easier to track down criminals or help provide more reliable and supportive evidence is things such as DNA testing, computer technology, fingerprinting, and GPS tracking devices. “The main strengths of technology in the criminal justice system lie in the provision of databases which allow better and more efficient records to be stored and retrieved” (Bean 370). Prosecutors now in sense have “…an infallible test of truth, a foolproof method, of determining the accuracy and reliability of evidence and hence of convictions” (Pallaras 72). These 4 technological advancement...
Forensic science has now been recognized as an important part of the law enforcement team to help solve crimes and cold cases. The advances in technology are being used each day and we must continue to strive to develop better advances in this field. The recent discovery of using DNA in criminal cases has helped not only positively identify the suspect, but it has helped exonerate hundreds of innocent individuals. “With new advances in police technology and computer science, crime scene investigation and forensic science will only become more precise as we head into the future.” (Roufa, 2017) Forensic science and evidence helps law enforcement officials solve crimes through the collection, preservation and analysis of evidence. By having a mobile crime laboratory, the scene gets processed quicker and more efficiently. Forensic science will only grow in the future to be a benefit for the criminal justice
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
In our modern society, computers and other digital devices are becoming ubiquitous. In the late 1970’s the number of crimes that involved digital devices and computers has been increasing rapidly. As a result of that, computer experts specified the need for permanently improving digital forensic tools and practices.
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
A forensic interview is a structured conversation with a child or minor with the intention of eliciting detailed information about a possible event (s) that the child many have experienced or witnessed. Concurrently, for Van Heerden (1977: 8) forensics refer to the computerized activities or scientific knowledge employed by law enforcement agents to serve justice. In the study, forensic investigation is used to refer to any computer-related activities or methods used by police, investigators, prosecutors and all other law enforcement agents to gather facts, track down criminals, arrest or detain them, gather information, preserve information and finally present it in the court of law.
With the rapid development of image processing technology, it is getting easier to tamper with digital images without leaving any obvious visual trace. Today, seeing does no longer believe [1]. Image forgery, like any other illegal and pernicious activity, could cause serious harm to society.