Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet is essentially a guide on how to collect and process digital evidence in any situation. In this book, digital evidence is defined as “any data stored or transmitted using a computer that support or refute a theory of how an offense occurred or that address critical elements of the offense such as intent or alibi” (Casey, 7). Most crimes today have some kind of digital element to them, from the crime itself to the criminal’s use of computer systems to communicate, store incriminating data, or search for ways to commit a crime and this creates new challenges for those in law enforcement (Casey, 3). To fully understand what digital evidence is and how it is to be collected, one must have knowledge of the different types of computer systems. The first and most obvious is called an open system.
Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense. Programs for Recovering Deleted Files: There are various programs that can be used for recovering deleted files such as UndeletePlus, Disk Digger, and EnCase Forensics, which are associated with different success rates and particular functions. UndeletePlus is a program that is available for $29.95 and is very easy to use since it involves selecting a drive and clicking the Scan button. The program will then list any or all deleted files it finds or discover in the recovery process (Easttom & Taylor, 2011, p.287).
Cummings’ research also shows that, “live-box analysis preserves and harvests the evidence from a computer’s physical memory, known as random-access memory (RAM) or volatile memory (2008)”. This support the facts that computer forensic investigation techniques can be useful for solving cybercrimes such as computer hacking or child pornography. Furthermore, computer forensic investigation techniques are useful for other crimes like murder, terrorism, organized crime, tax evasion, drug smuggling, extortion, and robbery cases. Additionally, computers can store diverse information such as e-mail messages, pictures, financials, research, videos, Internet history, and phone numbers. all of that information can provide insight into people’s habits and interests.
Introduction Cyber forensics, also called digital forensics or computer forensics, is a quickly growing field as the world goes digital. This field involves gathering evidence and analysing this evidence from computers, servers and networks in a manner that is suitable to present in a court of law. As the internet grows in popularity, so does criminal activity over the internet. When the law catches a criminal that used a computer to commit a crime, they confiscate the computer and all related storage devices for cyber forensics experts to examine the device to find fraudulent activity. Investigators usually follow a set of predefined procedures when given a case to work on.
With criminals adapting to the new technologies preventing fraud, the chances of having your private information stolen is quite high. In this paper, we will be taking a critical look at Phishing, Cyber Stalking, Computer Intrusion, and Identity theft. This paper will also give an explanation of each type of fraud, some examples of how to avoid fraud, and some real world examples of what criminals have done. In the computer world, fraud and crime is a widespread issue that is facing all computer users. People being affected by this range from the average computer user to the big corporate companies that employs thousands of people.
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement.
INTRODUCTION: With the increase use of computers to commit crimes and growing demand for computer-based data in civil proceedings, crimes developed rapidly for forensics experts to extract useful information from computer evidence. The field of digital forensics has evolved to allow security professionals to examine evidence from the increasing plethora of digital devices to help determine what individuals might have done in the past. Some of the digital crimes are cyber stalking, Internet fraud, Nigerian scam letter, Phishing, Identity Theft etc. Forensic works are more technical. From corporate server farms to police raids on criminals' houses to the modern battlefield a wide variety of evidence is collected.
We do have known what forensics is. Forensics that we know is an application of various sciences to answer questions that are important to legal system in which it may be related to a crime. Forensics generallu covering something or methods of a scientific nature and also the rules established from the facts of the event, to do an introduction to physical evidence. This is just a usual forensics. Nowadays, forensics is not just like that, digital devices are everywhere today, helping people to communicate with other people globally, not just between town.
Through reading this book, I can validly say that Moore’s thorough work, perspectives, and examples helped me better understand high-technology computer crime and investigative strategies as well. Throughout our class this semester we have learned about different types of ways that cyber criminals can invade someone’s privacy such as, hacking, phishing, and spamming. In addition we have also briefly discussed some major cyber-attacks. Moore’s work looks more closely at these features. Some of the important cybercrime topics that Moore covers are digital child pornography and the abuse of children in cyber space, online harassment and cyber stalking, and identity theft.
The concept was then incorporated into the law system. Fingerprints are, in fact, most often used in prosecutions. They are to help the prosecutors identify a suspect and to place them at the scene of a crime (“Fingerprints” 410-411). Fingerprints can be left on almost any surface, including smooth ones. The combination of the friction ridges, or the raised grooves on the fingertips, and sweat that gathers there is what causes the fingerprint to leave a trace (Bergman and Berman-Barrett).