Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Digital evidence essays
Digital evidence essays
The role of digital evidence
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Digital evidence essays
Digital evidence is electronic data, materials, objects, property, documents, or records that are presented in court to prove or disprove allegations made against an arrestee. Digital evidence takes the form of electronic data or information stored in bits and bytes on magnetic media. This type of evidence could be photos, videos, text documents, internet activity logs, phone numbers, or any other data that are stored electronically that have relevance to a criminal case. Some items that are examples of digital evidence are cell phones, personal computers, digital cameras, portable video players, digital voice recorders, pagers, portable storage media such as a thumb drive and computer media disks and CDS/DVDs.
The most important step in preservation of digital media is to make sure all data on the hard disk drive or other computer media is unharmed and is the exact way it was found. Another important key to digital media is the proper handling of CDs, DVDs, thumb drives and floppy disks. These items can easily be wiped clean if they come in contact with any kind of magnetic ...
Technological advances have definitely been made the past decades. Some have been extremely helpful; however, they’ve also been detrimental. There have actually been research that show’s that our technology is in fact making our brain retain less memory. According to the independent “A recent study (you've probably forgotten it by now) suggests 90 per cent of us are suffering from digital amnesia. More than 70 per cent of people don't know their children's phone numbers by heart, and 49 per cent have not memorized their partner's number. While those of us who grew up in a landline-only world may also remember friends' home numbers from that era, we are unlikely to know their current mobiles, as our phones do the job. The Kaspersky Lab concludes
The first and most important step in the entire process for collecting evidence is to document the scene. It is extremely critical that an investigator capture as accurate a depiction of a crime scene as possible (Solomon, Rudolph, Tittel, Broom, & Barrett, 2011). This can be accomplished in a number of ways. These include taking a photograph of the scene to preserve the original image of the scene for a judge and jury. Investigators can also take images of a computer system. It is necessary to take hash images of volatile data first as volatile data relies on a constant flow of electricity to keep in system memory. Things that are considered volatile are registers, the system casche, routing tables, kernel statistics, memory, temporary file systems, disks and archived media (Soloman, Rudolph, Tittel, Broom, & Barrett, 2011). The first thing an investigator s...
One of the most important aspects of studying a history of a place is why that place came into existence in the first place. The FBI's Regional Computer Forensics Laboratories are perhaps not a terribly well-known entity within the general public, yet they play an essential part in both our justice system, and our everyday lives. So this begs the question, why would a laboratory centered strictly around computers, even more specifically the forensics around computers, come to be in an age where certainly all major government establishments have, and are familiar with, computers and the technology associated within them. These are a few of the questions that will be answered throughout this research paper, along with an analysis of where they are today, and where it appears the future of these labs will take them.
In order to understand how to compile evidence for criminal cases, we must understand the most effective types of evidence. This topic is interesting because there are ample amounts of cases where defendants have gotten off because of the lack of forensic evidence. If we believe forensic evidence is so important and it affects our decisions, then maybe we need to be educated on the reality of forensic evidence. If we can be educated, then we may have a more successful justice system. If we have a more successful justice system than the public could gain more confidence that justice will be served. In order to do this, we must find what type of evidence is most effective, this can be done by examining different types of evidence.
Forensic evidence can provide just outcomes in criminal matters. However, it is not yet an exact science as it can be flawed. It can be misrepresented through the reliability of the evidence, through nonstandard guidelines, and through public perception. Forensic science can be dangerously faulty without focus on the ‘science’ aspect. It can at times be just matching patterns based on an individual’s interpretations. This can lead to a miscarriage of justice and forever alter a person’s life due to a perceived “grey area” (Merritt C, 2010) resulting in a loss of confidence in the reliability of forensic evidence.
New types of technology have made it easier to track down and catch criminals. Then also made it easier for prosecutors to gather and present more credible information. Some new technology that has made it easier to track down criminals or help provide more reliable and supportive evidence is things such as DNA testing, computer technology, fingerprinting, and GPS tracking devices. “The main strengths of technology in the criminal justice system lie in the provision of databases which allow better and more efficient records to be stored and retrieved” (Bean 370). Prosecutors now in sense have “…an infallible test of truth, a foolproof method, of determining the accuracy and reliability of evidence and hence of convictions” (Pallaras 72). These 4 technological advancement...
Forensic evidence is “evidence obtained by scientific methods …. and used in court.” Most evidence collected can be classified as either transient evidence or tangible evidence. Common types of transient evidence includes hair, fibers and glass, fingerprints, shoe prints, bare foot impressions and tire impressions, bodily fluids and skin cells, as well as gunshot residue. Some forms of tangible evidence would be firearms, fired and unfired bullets and cartridges, tool marks, drugs and drug paraphernalia, physical documents such as checks and receipts, and computers, cell phones and other devices.
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
In the case of Bradley Cooper, a Google map discovered on his computer was the sole piece of evidence used to convict the ex-Cisco Engineer of murdering his wife (Bort, 2014). In this particular case, digital evidence played a very large role in the initial conviction and eventual appeal and retrial. Originally, Cooper was convicted for two reasons. First, a Google map was found on his computer zoomed in to the exact spot the body was discovered (Bort, 2014). The map search was timestamped on the day before the murder, suggesting that Cooper was scouting a dump location (Bort, 2014). Additionally, prosecutors argued that Cooper stole a router from Cisco systems, and used that device to fake a phone call from his already slain
The 90's internet boom gave rise to new ways of writing in through access to cyberspace. What used to be printed or handwritten on physical surfaces such as paper, cardboard, or bulletin boards has changed to 0's and 1's, bits and bytes of digitized information that can be displayed thru the projections of computer screens. Moreover, the internet has made the process of publishing one's works, writing letters, or chatting with one another much easier and convenient for everyone around the globe. The internet became a universal tool, giving much freedom and flexibility to the users; it gave them opportunity to deliver their thoughts with little or no restrictions. Since it's impossible to regulate all cyber-activities, internet users are often unrestricted by the normal laws or authorities that would set boundaries around the various online transactions. More importantly, the fact that a net user can take on different identities in cyberspace brings about several ethical and social issues. These anonymous and unrestrictive characteristics of cyberspace often permite abusive users to easily involve themselves in serious cybercrimes such as cyberstalking, cyber-rape, and cyber-harassment through chatting services, emails, cyber communities, and other online communication.
Imagine someone born in the early 1900’s entering a modern-day classroom. They would likely be confused as to what televisions, computers, cell phones, and other electronic devices are. It is also likely that they would be overwhelmed by the instant access to information that the internet provides. Digital media has become a large part of people’s everyday lives especially with the rise of digital media in classrooms. Digital media is growing so rapidly that people who are not adapting to this shift in culture are falling behind and becoming victims of the “digital divide”, this is leaving people misinformed. Digital media has a large effect on the way that people communicate, this is especially evident in the way that students interact with
Information privacy, or data privacy is the relationship between distribution of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.
... all ages do not know how to write in cursive anymore. Some students may not know how to sign their name in cursive since it wont be taught anymore. One thing that many people worry about with digital learning is that students will spend too much time in front of a screen and keyboard. It is believed that these kids will have less of a social life and will be less likely to communicate through talking, but choosing to communicate through online messaging and texting. Though students have a variety of information at their finger tips, this can cause temptation for students to plagiarize. Devices such as iPads and laptops are useful learning tools, but at the same time they can be a huge source of distractions. While students should be taking notes, they could be browsing the web, updating social media sites, watching videos, playing games or other distracting things.
Cybercrime refers to all forms of crime conducted through a computer or a mobile device using computer networks. It is thus the use of a computer with the aim of intercepting and manipulating content, disrupting communication, stealing or generally destroying others’ information or hardware through a network. Although cybercrime is a worldwide problem and affects both small and big companies, small companies are affected more from the dangers of cybercrime. The rapid advancement in technology is causing tremendous problems to businesses in terms of more sophisticated cyber-attacks. This project is interesting and beneficial because it enlightens one on the dangers of cybercrime, thus preparing individuals to know how to prevent attacks while online, how to reduce the effects of a cyber-attack and how to prevent future
As the internet has evolved it is now a part of many people’s daily lives and with that, many could not function or conduct their daily business or lives without it. It is impressive that we can now communicate and even see someone all the way across the country with just a few clicks of a mouse. But as technology changes and progresses seemingly for the good, many will always find ways to exploit technology and use it with the intent of committing crime, turning a positive tool into a negative one. As such the negative side of the World Wide Web, cybercrime has evolved as just one of the major disadvantages of the internet. Cybercrime itself is a broad term and can and does include any crime that is committed via the internet or computer network including seemingly minor acts as downloading music, to denial of service attacks, to even acts of cyber-terrorism. With the newly formed threat of cybercrime has also come new ways for law enforcement to attack and prevent it as well but with limited resources not much can be changed but to continue to prevent new methods from approaching the cybercrime world. This is not only just in our own neighborhoods but is at an international scale. This paper generates the insight about the overall rise of cybercrime among our societies. The main focus of this paper is to describe the types of computer crimes and its effects on individuals and businesses.