“Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter. “ (Steen, Hassell 2004)
Computer forensics has become a very important factor of criminal investigations. Since computers have become mainstream the need for a science that will deal with the technology has become an issue for the judicial and legal system. Some of the areas computer forensics may be utilized are:
§ Copyright infringement
§ Industrial espionage
§ Money laundering
§ Piracy
§ Sexual harassment
§ Theft of intellectual property
§ Unauthorized access to confidential information
§ Blackmail
§ Corruption
§ Decryption
When the investigator finds a computer that may hold evidence, they first create an exact image of the drive. This prevents any inadvertent damage to the system. The clone image is important because more than 160 alterations are made to files when a computer is turned on which can change or delete important evidence.
Several events take place on a computer when a file is changed. A file status maker is set meaning their space is now available. But even though you have deleted the file, it stays in the same spot and is called free or unallocated space and is available until the whole space is written over by another file. The computer forensic specialist may retrieve the data until it is written over by the new file. Another place for information to hide is called slack space, meaning, sometimes information being stored in an area will not use all of the available space in the designated spot and the unused portion becomes the slack space.
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
Mexico City in the Age of Diaz is a literary illustration of one country’s struggle to define itself as a modern, cultured nation. Written mainly in the upper class point of view, the poor masses are defamed as lesser, indigenous beings. This anxiety of the Westside population and “President” Diaz lead not to reform but to exploitation and ignorance of social dilemmas. Europe and the United States served as a model for these citizens who craved status and acceptance due to the inherent inferiority complex gained by a historically conquered people.
It is the computer forensics job to look through all of the computer files, even the deleted ones, to see if there are any incriminating files that would prove them guilty. Even reporting them to the jury is one of the jobs that a computer forensic person might have. Not only does this community work closely with eh police force, they can also work within the FBI or a company that uses computers in their business like Apple. Th...
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
A royal, majestic, loyal eagle in the middle of canals and a greenish cactus, and a solitary snake in its mouth it’s almost a creation of a world we don’t often see. This image is exactly what was finding in the national flag. Today there are “estimated 22 million inhabitants it's the most populous city in the western hemisphere” (NewYorktime2006). This quote published by the New York Times explains that Mexico’s geography is getting much more expanded. Mexico City is known to be “One of the three largest cities they settled on what was then an island in shallow Lake Texcoco and connected it to lakeshore satellite towns by a network of calzadas (canals)”(New York Times 2006). Many presume that Mexico City is under sea levels, and its alarming many of their location.
Investigators must ensure the integrity of all evidence collected, analyzed, processed and presented to a courtroom and jury. The reason that this is important is because the improper collection and analysis of evidence can lead to compromised data and potential damage to a prosecution. The seizure and analysis of digital evidence can be particularly challenging but is just as critical to a case as physical evidence. There are specific procedures that must be met to ensure the successful collection and analysis of digital media and guidelines or best practices for collection of all evidence, both physical and digital that must be followed. Conducting the proper steps in an investigation regarding the collection and processing of evidence and the proper chain of custody requirements can ensure a successful outcome in solving a case and a successful prosecution.
Computer Forensics is defined as “the application of computer investigation and analysis techniques in the interest of determining potential legal evidence” [Nelson, Bill, Phillips, Amelia, Enfinger, Frand, and Stewart, Chris (2004)] and has been prevalent in the law enforcement fields and government agencies since the mid-1980s. [Daphyne Saunders Thomas, Karen A. Forcht(2004)] Yet still, the existence does not justify the cause for the creation, development, and the integration of computer forensics into daily life. An online article from Penn State University goes into the history in more detail. The first actual legislation involving computer crime took place in the Counterfeit Access Device and Computer Fraud and Abuse Act in 1984. Among other things, this enforcement made it officially a misdemeanor to obtain financial or credit information through a computer. Because of this laws nature (being a federal legislati...
Nowadays, most of the web, email, database and fileservers are Linux servers. Linux is a UNIX system which implies that it has solid compatibility, stability and security features. Linux is used for the mentioned environments because these services require high security. Further, an increase of attacks on these servers can be observed. Additionally, the methods to prevent intrusions on Linux machines are insufficient. Further, the analysis of incidents on Linux systems are not considered appropriately (Choi, Savoldi, Gubian, Lee, & Lee, 2008). It can also be observed that a lot of investigators do not have experience with Linux forensics (Altheide, 2004).
Mexico is bordered by the United States on the north, the Pacific Ocean on the west, the Gulf of Mexico and the Caribbean Sea on the east, and Guatemala and Belize on the south. It is characterized by an extraordinary diversity in topography and climate and is crossed by two major mountain chains, the Sierra Madre Occidental and the Sierra Madre Oriental. The high central plateau between these two mountain ranges historically funneled most of the human population toward the center of this region. Mexico features volcanic peaks, snow-capped mountains, tropical rain forests, and internationally famous beaches. Mexico City is an enormous metropolitan area and dominates the rest of the country's culture, economy, and politics. Nearly one-fifth of the nation's population lives in the immediate vicinity of the capital. Mexico City is also a central hub for Mexico's transportation network—including railroads, highways, and airlines.
Mexico’s has a rich history, culture, economy, and government. Prior to the Spanish arrival, Mexico was habited by Indian groups with varying economic and political systems. The communities that lived in the north comprised of gatherers and hunters. However, agriculturalists populated the rest of the country. They were a dense population and were characterized by varying cultures (Miller, 2015). The county has developed tremendously since the Spanish conquest. The government has also changed continuously over the years.
Mexico remains to be a vibrant destination for many people around the world and is the peak of the majority of American tourism and is currently ranked 10th globally in international visitor arrivals. Mexico’s economy is the 13th largest in the world, and the 11th in purchasing power. The country has an evaluated Gross Domestic Product (GDP) of around $1.567 trillion and has a land area of 1.964375 square kilometers, with 12.66 percent of it being arable land. Mexico has a population of 108.627 million people, with a labor force of 46.99 million people.
Tenochtitlan was the capital city of the Mexican civilization established around 1325. The Aztecs, who inhabited Tenochtitlan, picked the site based on an ancient prophecy that said the wandering tribes of the Aztecs would find the destined site for a great city by spotting an eagle eating a snake while perched on a cactus. The Aztecs saw this sight on what was then a small swampy island in Lake Texcoco. This eagle can be seen on Mexico's coat of arms and on the Mexican flag today. They built their city using chinampas , or floating gardens, used for agriculture and to dry and expand the island. These chinampas were linked with wooden bridges, connecting both platforms used for residential purposes as well as platforms for the maize and other crops they grew to the inner island as well as to the outer terrain. Tenochtitlan covered an estimated 8 to 13.5 km2 (3.1 to 5.2 sq mi), situated on the western side of the shallow Lake Texcoco.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
The transitional growth in the forensic science sector has not been without challenges. Though the world has experienced increased capabilities and scientific knowledge, which has led to faster investigations and results, many forensic experts have argued that forensic laboratory testing, in the light of 21st century technological advancements, is yet to meet the expected rate in quick available testing and analysis (Mennell & Shaw, 2006). This is with respect to the growing rate of crime and the high demand of quick crime scene testing and analysis. In the science of crime scene, analysis and interpretation of evidence is majorly dependent on forensic science, highlighting the change in the role of forensic sciences (Tjin-A-Tsoi, 2013). In the business of forensic science, time is beginning to play important role in the evidence testing and analysis which is becoming crucial in reducing ...
Forensic science has now been recognized as an important part of the law enforcement team to help solve crimes and cold cases. The advances in technology are being used each day and we must continue to strive to develop better advances in this field. The recent discovery of using DNA in criminal cases has helped not only positively identify the suspect, but it has helped exonerate hundreds of innocent individuals. “With new advances in police technology and computer science, crime scene investigation and forensic science will only become more precise as we head into the future.” (Roufa, 2017) Forensic science and evidence helps law enforcement officials solve crimes through the collection, preservation and analysis of evidence. By having a mobile crime laboratory, the scene gets processed quicker and more efficiently. Forensic science will only grow in the future to be a benefit for the criminal justice