Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Digital evidence important to an investigation
Digital evidence
Digital evidence
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Digital evidence important to an investigation
I will explain and define what digital evidence is and I will provide a list of devices that could contain or store digital evidence. I will discuss the issue of properly preserving digital evidence. I will discuss how to properly preserve and document a computer crime scene prior to seizing the computer. I will discuss how to properly shut down computers after the crime scene has been properly documented and photographed. I will also discuss transporting and evidence transmittal issues. Digital evidence is also referred to as electronic evidence. Digital evidence is any probative information stored or transmitted digitally (Digital, 2001) and takes the form of electronic data, or information that is stored in bits and bytes on …show more content…
Investigators will take photographs of the computer and especially the computer screen from different angles and up close to document and preserve any applications, images, running programs, documents, open windows, and data files that were opened by the user (Knetzger, 2008). It is in the best interest of the officer and the case that no one touches or moves the mouse, clicks on anything, use the keyboard, or any input device connected to the suspect’s computer. There are two reasons for this. The first is to prevent any possibility of activating a delete or wipe command preinstalled by the suspect. The second reason is that by not touching anything it ensures no data will be written to any part of the suspect’s computer system giving their defense opportunity to say the evidence was altered, changed, or planted (Knetzger, …show more content…
This way if there are two or more computers connected on a network they can’t transfer and store evidence where the police aren’t searching. Before touching anything start by photographing the scene from a wide view and work to get closer so you have the clearest and most detailed photos (Knetzger, 2008). Then document exactly how the computer is set up including pictures of front/back of tower, the screen, mouse if there is one, keyboard, and any other peripheral devices like router or modem. As soon as the scene is documented and preserved color code the cables and correlating ports with one color for each cable, and make sure to document empty ports as well. It is essential that you disconnect the network cable as soon as everything is documented and preserved this prevents remote access to the computer to destroy evidence (Knetzger,
There is constant concern about different kinds of devices and tools because of their vulnerability: laptops; personal computers in the home; libraries and public workstations; USB Flash Drives and email, to name a few. These items are easily accessible for those attempting to breach security.... ... middle of paper ... ...
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
Computers are also unique in the way they type and print out things. Document examiners can look over these and establish the similarities in the handwriting, and computer forensic specialists can extract logs and other data from most devices. As you can see
New types of technology have made it easier to track down and catch criminals. Then also made it easier for prosecutors to gather and present more credible information. Some new technology that has made it easier to track down criminals or help provide more reliable and supportive evidence is things such as DNA testing, computer technology, fingerprinting, and GPS tracking devices. “The main strengths of technology in the criminal justice system lie in the provision of databases which allow better and more efficient records to be stored and retrieved” (Bean 370). Prosecutors now in sense have “…an infallible test of truth, a foolproof method, of determining the accuracy and reliability of evidence and hence of convictions” (Pallaras 72). These 4 technological advancement...
In order to wipe out computer crimes, an agency specialized in computer crimes should be at task to take care of such crimes and special devices provided to them in their lab. The devices they have available is what they will use in curbing the crimes hence the need to provide them with sophisticated devices.
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
Live acquisition: The future of data acquisitions is shifting toward live acquisitions because of the use of disk encryption with newer operating systems (OSs). In addition to encryption concerns, collecting any data that’s active in a suspect’s computer RAM is becoming more important to digital investigations. The processes and data integrity requirements for static and live acquisitions are the same. The only shortcoming with live acquisitions is not being able to perform repeatable processes, which are critical for collecting digital evidence.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
Digital Evidence is electronic data, materials, objects, property, documents, or records that are presented in court to prove or disprove allegations made against an arrestee. It takes the form of electronic data or information stored in bits and bytes on magnetic media. The examples of devices that can contain digital evidence include; cellular phones or similar all in one devices, pagers, digital voice recorders.
There are various aspects of evidence collection preservation and documentation and the role digital image capture ad processing plays in it. Contamination is the introduction of something to a scene that was not previously there. This means trace materials are added to a crime scene after the crime is committed. This can happen before, during and after authorities take samples of the evidence from a scene. Many people can contaminate the evidence at a crime scene, including witnesses, suspects, victims, emergency response personnel, fire fighters, police officers and crime scene investigators.
Has your home become overrun with wires and cables despite having wireless internet access on your home computer? Is your technology reliant business just cables running rampant behind computer desks? If so, you are not alone. People everywhere are having to deal with the same issues in their own homes or businesses. However, now people have discovered a better way to handle the tangled up disaster area around their computer.
Computers; they are a part of or in millions of homes; they are an intricate part of just about every if not all successful businesses, the government, and the military. Computers have become common place in today’s society and the lives of the people who live in it. They have crossed every national, racial, cultural, educational, and financial barrier, which consequently ushered in the information age. A computer is a programmable electronic device that can store, retrieve and process data, and they come in all shapes, and sizes. They can be used for and in just about anything. As stated before, they are used in just about every aspect of modern society. They are so fundamental to modern society that it would be disastrous to society without them. As stated before, there are many areas in modern society that are run by computers. They play an intricate part of millions of homes in the world. Office workers in business, government and the military may use them to write letters, keep rosters, create budgets, find information, manage projects, communicate with workers, and so on. They are used in education, medicine, music, law enforcement, and unfortunately crime. Because computers have become such a part of the world and how it operates, there is a tremendous responsibility for those who are in control of these computers and the vital information that they carry, to manage and protect them properly. This is management and protection is vital because any loss or damage could be disastrous for the affected entity. For example, a mistake or intentional alteration of a personal credit file could affect ones ability to buy a car or home, or can lead to legal actions against the affected person until the mistake or intentional alteration has been corrected. Therefore, with the advent of computers in the information age, and all of the intentional and unintentional violations against them, comes the need to safeguard them and the information they carry with strong systems and policies of computer security.
Computers have managed to infiltrate most of the modern lifestyle, but by removing them we can solve many additional problems they create aside from hack...