To fully understand what digital evidence is and how it is to be collected, one must have knowledge of the different types of computer systems. The first and most obvious is called an open system. This consists of a hard drive, keyboard, and a monitor, such as a desktop computer or laptop (Casey, 7). The next type of system is a communication system. This system includes telephones, mobile phones, the Internet, and computer networks, anything that communicates with another device (Casey, 7). The final type of computer system is an embedded system, which includes anything that has a computer or a computer chip embedded in it such as a GPS system, mobile devices, and vehicles (Casey, 8).
These three different systems all provide different types of information that may be useful to digital investigators. For example, an open system stores data on the hard drive. The data stored can be anything from web searches to incriminating pictures. Communication systems can tell whom a suspect has been in contact with leading up to the crime. Embedded systems can show ...
... middle of paper ...
... everything happens on computers, with the aid of computers, or can be found online. If law enforcement officers don’t take advantage of this during their investigations, they could lose valuable evidence and time on a case. They also have to take care to handle all digital evidence as they would physical evidence so that it will be admissible in court. While digital evidence collection can still be considered to be in its early stages, I believe that it can provide some of the most valuable evidence in many different crimes and Casey’s book can help to advance the way digital evidence is collected simply by providing understandable information about it, even for those of us who are not technologically savvy.
Casey, Eoghan. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. 3rd Ed. Boston: Academic Press, 2011. Print.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- In simple terms, computer or digital forensic evidence analysis is the scientific collection of data that is either retrieved or held by a computer storage device that can be used against a criminal in a court of law. For the information to be used in court it should be collected before it is presentation; therefore, there are a number of recommendations proposed to make sure that information collected meets the intended integrity. Information collected digitally from computers or media storage applications has protocols that need be followed during the process.... [tags: Digital Forensic Evidence Analysis]
737 words (2.1 pages)
- Technology is constantly changing, and as the capabilities change, so do the issues in Forensic information technology (FIT). FIT is defined as the scientific use or application of information technology (IT) that is used to generate and present digital evidence to be used in courts, legal or other formal proceedings (Volonio). While the use of technology helps get things done faster, it also can present many issues if the proper procedures and tools are not used and followed. An existing issue in FIT is computer forensics, in regards to preserving digital evidence and effectively conducting a computer forensics investigation.... [tags: digital media, digital evidence]
1592 words (4.5 pages)
- INTRODUCTION: With the increase use of computers to commit crimes and growing demand for computer-based data in civil proceedings, crimes developed rapidly for forensics experts to extract useful information from computer evidence. The field of digital forensics has evolved to allow security professionals to examine evidence from the increasing plethora of digital devices to help determine what individuals might have done in the past. Some of the digital crimes are cyber stalking, Internet fraud, Nigerian scam letter, Phishing, Identity Theft etc.... [tags: computer-based-data]
751 words (2.1 pages)
- Explain the existing challenges that result from the independent nature of these agencies, as well as the other factors that are common to each of them. In the United States, local, state, and federal law enforcement agencies, including FBI, Department of Homeland Security, among others, have taken on roles to fight computer crimes and terrorism. The roles and responses of these law enforcement agencies concerning digital crime have created challenges that limit enforcement efforts against digital crime.... [tags: Crime ]
841 words (2.4 pages)
- 1. Describe at least 5 steps in a process to collect digital evidence to the time you testify that you consider important. Please explain why they are important. For this particular example we will assume that the warrant for search and seizure was requested and executed lawfully and did not violate any part of the Fourth Amendment. 1. First and Foremost… Having the right person to do the job. Computer forensic investigators have the tough job of finding a “binary” smoking gun. In order to do this, the investigator must be trained, qualified and have an “eye” for things that others may not see.... [tags: forensics, search, equipment]
761 words (2.2 pages)
- 1. Introduction The aim of this report is to theoretical cover data preservation, examination of digital evidence, tools and techniques for data capture, preservation and examination with a list of recommendations. In our modern society, computers and other digital devices are becoming ubiquitous. In the late 1970’s the number of crimes that involved digital devices and computers has been increasing rapidly. As a result of that, computer experts specified the need for permanently improving digital forensic tools and practices.... [tags: materials found in digital devices]
2655 words (7.6 pages)
- Field Report Investigators must ensure the integrity of all evidence collected, analyzed, processed and presented to a courtroom and jury. The reason that this is important is because the improper collection and analysis of evidence can lead to compromised data and potential damage to a prosecution. The seizure and analysis of digital evidence can be particularly challenging but is just as critical to a case as physical evidence. There are specific procedures that must be met to ensure the successful collection and analysis of digital media and guidelines or best practices for collection of all evidence, both physical and digital that must be followed.... [tags: investigation, judge, forensic science]
1287 words (3.7 pages)
- ... The judge and jury that hear a case have become familiar with some of the terminology that is being used because many of them own the type of devices that are being used to commit the crimes. In early days of digital recovery, law enforcement would seize the equipment and take it back to be analyzed. They soon realized that once the device is shut down, some of the data can be lost. This new process emphasis on capturing as much as they can while still at the crime scene and the device is still running (Office of Justice Programs, 2010).... [tags: technology, criminal, evidence]
1899 words (5.4 pages)
- M7A1 Essay: Psychological Aspects of Digital Forensics This paper will briefly identify and explain the psychological aspects of digital forensics. It will further examine the role of psychological profiling in digital forensic investigations. Lastly, it will examine the various stresses that digital crime investigations places on the digital forensics investigator. Digital forensics is almost like observing someone’s complete psyche, you see that person’s likes and dislikes. You are viewing their hates and loves; you are finding things they don’t want to share with anyone else in the entire world.... [tags: Forensic science, Computer forensics]
957 words (2.7 pages)
- Overview If cyberspace is a type of community, a giant neighborhood made up of networked computer users around the world, then it seems natural that many elements of a traditional society can be found taking shape as bits and bytes. With electronic commerce comes electronic merchants, plugged-in educators provide networked education, and doctors meet with patients in offices on-line. It should come as no surprise that there are also cybercriminals committing cybercrimes. As an unregulated hodgepodge of corporations, individuals, governments, educational institutions, and other organizations that have agreed in principle to use a standard set of communication protocols, the Internet is wide o... [tags: Internet Crime Essays]
2099 words (6 pages)