Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Technology and criminal investigations
Technology in the criminal justice field
Technology in the criminal justice field
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Technology and criminal investigations
The use of digital devices in everyday life is increasing as people integrate technology into their lives. It is estimated that as of 2010, the number of mobile phone subscribers has increased from 5 billion people around the world. In addition, new consumer devices, including tablet PCs and devices, will continue to be introduced Wi-Fi playback and media playback devices, as well as cars and devices capable of connecting to the Internet.
The proliferation of electronic devices in the community has led to the increasing presence of evidence collected from digital devices in criminal cases. Recent research reveals that it is possible to find cell phones and the possible evidence associated with them. In more than 50% of all violent crimes,
…show more content…
Digital evidence Digital data stored in computers or digital systems or transmitted by them can be Use in proving or denying a crime may be digital or non-digital. The main aim of digital criminal analysis is to address digital crimes, which are committed using computer hardware or those located on digital systems or networks. Digital criminal analysis is the use of technology techniques in the criminal investigation of illegal cases, including the examination of the device or the target system, analysis of operations and retrieval of data and files in order to obtain a digital evidence used in legal …show more content…
• External storage media (USB).
• Router logs.
• Email messages.
• Records of conversations.
• Telephone devices.
• SIM card slot.
• Security Device Logs (Firewall or IDS intrusion detection devices).
• Database records.
Digital evidence varies according to information crime. For example, in cases of extortion via the Internet, e-mails and chat logs can be adopted as digital directories.
Dealing with digital evidence:
The first task a digital investigator should do is to create a mirror image of the hard disk bit image and then perform digital criminal investigations on the image taken rather than on the original device.
A matching image of the target system can be created using tools such as Forensic Toolkit or Encase. This process can also be done using free tools running on the Kali Linux operating system.
The DD tool ( disk to disk):
Is a command-line tool that is automatically found in the Linux kernel and is used to transfer and copy files between disks and can create a mirror image of the hard disk in the target device using the following instruction:
dd if = (-- removed HTML --) of = (-- removed HTML --) bs = (-- removed HTML --)
Example:
dd if = / dev / sda2 of = / dev / sdb2 bs =
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
Forensic science has paved the way to a new world of technological advancements in solving crime, through DNA analysis, new technology such as M-Vac, improving systems such as CODIS and other investigative methods. As forensic science technology advances, the chance of an individual being able to commit a crime and walk away free without leaving any trace of evidence will lessen. While forensic science has its limitations, it can be the only way to provide an accurate account of what actually occurred at some crime scenes.
In the case of Bradley Cooper, a Google map discovered on his computer was the sole piece of evidence used to convict the ex-Cisco Engineer of murdering his wife (Bort, 2014). In this particular case, digital evidence played a very large role in the initial conviction and eventual appeal and retrial. Originally, Cooper was convicted for two reasons. First, a Google map was found on his computer zoomed in to the exact spot the body was discovered (Bort, 2014). The map search was timestamped on the day before the murder, suggesting that Cooper was scouting a dump location (Bort, 2014). Additionally, prosecutors argued that Cooper stole a router from Cisco systems, and used that device to fake a phone call from his already slain
Crime scenes are known to have many clues left behind. The obvious would be a the body or bodies, clothing, and sometimes even the murder weapon. While these are great way to solve a case there's another kind of evidence; trace evidence. Trace evidence are small pieces of evidence that are laying around a crime scene. There are many types of trace evidence some of them include metal filings, plastic fragments, gunshot residue, glass fragments, feathers, food stains, building materials, lubricants, fingernail scrapings, pollens and spores, cosmetics, chemicals, paper fibers and sawdust, human and animal hairs, plant and vegetable fibers, blood and other body fluids, asphalt or tar, vegetable fats and oils, dusts and other airborne particles, insulation, textile fibers, soot, soils and mineral grains, and explosive residues. Although these are the most common found elements, they are not the only ones. The Trace Evidence Unit is known to examine the largest variety of evidence types and used the biggest range of analytical methods of any unit. materials are compared with standards or knowns samples to determine whether or not they share any common characteristics. In this paper I will discuss the different kinds of trace evidence and how crime scene investigaros use it to solve cases and convict criminal.
The first and most important step in the entire process for collecting evidence is to document the scene. It is extremely critical that an investigator capture as accurate a depiction of a crime scene as possible (Solomon, Rudolph, Tittel, Broom, & Barrett, 2011). This can be accomplished in a number of ways. These include taking a photograph of the scene to preserve the original image of the scene for a judge and jury. Investigators can also take images of a computer system. It is necessary to take hash images of volatile data first as volatile data relies on a constant flow of electricity to keep in system memory. Things that are considered volatile are registers, the system casche, routing tables, kernel statistics, memory, temporary file systems, disks and archived media (Soloman, Rudolph, Tittel, Broom, & Barrett, 2011). The first thing an investigator s...
Computer Forensics is defined as “the application of computer investigation and analysis techniques in the interest of determining potential legal evidence” [Nelson, Bill, Phillips, Amelia, Enfinger, Frand, and Stewart, Chris (2004)] and has been prevalent in the law enforcement fields and government agencies since the mid-1980s. [Daphyne Saunders Thomas, Karen A. Forcht(2004)] Yet still, the existence does not justify the cause for the creation, development, and the integration of computer forensics into daily life. An online article from Penn State University goes into the history in more detail. The first actual legislation involving computer crime took place in the Counterfeit Access Device and Computer Fraud and Abuse Act in 1984. Among other things, this enforcement made it officially a misdemeanor to obtain financial or credit information through a computer. Because of this laws nature (being a federal legislati...
New types of technology have made it easier to track down and catch criminals. Then also made it easier for prosecutors to gather and present more credible information. Some new technology that has made it easier to track down criminals or help provide more reliable and supportive evidence is things such as DNA testing, computer technology, fingerprinting, and GPS tracking devices. “The main strengths of technology in the criminal justice system lie in the provision of databases which allow better and more efficient records to be stored and retrieved” (Bean 370). Prosecutors now in sense have “…an infallible test of truth, a foolproof method, of determining the accuracy and reliability of evidence and hence of convictions” (Pallaras 72). These 4 technological advancement...
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
Physical evidence is any physical object that contains reliable information that supports a hypothesis about the incident. Digital evidence is physical or electronic information (such as a written or electronic documentation, computer log files, data, reports, physical hardware, software, disk images, objects and so on) are collected during the investigation conducted computer. Evidence includes, but is not limited to, computer files (such as log files or generated reports) and human-generated files (such as spreadsheets, documents, or eail
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
Today, technology has affected our global surroundings in a number of ways. Technology has created a more advanced society and economy. We use technology in every aspect of life today. New innovations and technology helps create a safer atmosphere and reduces the rate of crime. Technology is the usage and knowledge of techniques or is systems of these things. Usage of technology in the criminal justice system is not new but more apparent today. Technology in criminal justice will continue to challenge us to think about how we turn information into knowledge. Due to new technology, criminal investigations are able to maintain and improve their processes. Forensic science, DNA, other and future technology has all had a tremendous impact on criminal investigation and its process.
Within a few years, there will be well over a billion mobile phone users worldwide and the majority of mobile phones will be connected to the Internet.
Digital evidence is information obtained from electronic sources used in a court of law to prove or disprove charges against an individual (programs, n.d.). Digital evidence can be provided by either the prosecution as a means to prove their case or by the defense to disprove the charges placed against the defendant. Digital evidence can come from various sources. Some of the sources are personal computers whether desktop or laptop, which in the files within the hard drive could hold incriminating evidence against the defendant (Knetzger, 2008). Cellular phones is another source in which digital evidence can be discovered, not only by calls made or received but many phones are smart phones and are used as hand held computers. Another digital evidence source are portable storage media such as floppy disks, thumb drives and USB memory sticks to name a few.
Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible. It can be used in the uncovering and stoppage of crime and in any disagreement where evidence is stored in numerical form. Computer forensics surveys a parallel process to other forensic corrections, and faces similar matters.