Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to …show more content…
& Eloff, M. and other devices to include Mobile phones became common usage, so did their use as evidence against the criminal and their crimes. Crimes have also evolved in a way that can transpire on the digital realm of the internet. Training of the first responders has become critical in evidence collection because they can help reduce the digital evidence backlog that has been created by so many devices being called into question (Office of Justice Programs, 2010). The National Institute of Justice (NIJ) has supported the development and education of law enforcement officers to be able to conduct basic analysis of digital evidence (Office of Justice Programs, 2010). By having this basic knowledge, they are able to speed up the time that it takes to analyze the data and can help solve the case faster because it lightens the immense work load of the digital forensic analyst (Office of Justice Programs, 2010). Evidence collected needs to done so with a technique that can be tested; whether it has been subjected to publication or peer review (Jones & Valli, 2009). The existence of standards needs to be done with a methodology that has become widespread in acceptance within the relevant scientific community (Jones & Valli, 2009). Digital forensics is part art and part science in its technologies and in its usage. Because it is considered a newer science, its acceptance into the court system is growing. The judge and
Digital forensics (sometimes Digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.[1][2] The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover all devices capable of storing digital data and is now used to describe the entire field.[1] The discipline evolved in a haphazard manner during the 1990s and it was not until the early 2000s that national policies were created.
Evidence plays a vital role throughout criminal investigations. Typically, we think of evidence as things such as fingerprints, DNA, and fibers. However, evidence as evolved as the world of technology has expanded. Digital evidence also now plays just as much of an important role as traditional evidence. When beginning an investigation that involves digital evidence, it is important for the investigator to know what evidence to look for. Identification of evidence, collection including transportation of evidence and examination of evidence are the three main aspects of the process.
For this reason, it is imperative that the information gathered is reliable and accurate to ensure the evidence collected can be utilized by the digital forensic investigator for the current case (Ingalls & Rodriguez, 2011). Additionally, cyber incidents require digital forensic investigators to interview various individuals regarding the information needed for the case. According to the National Institute of Justice (2004), interviewing the system administrator, users, and employees of an organization regarding a cyber incident would provide investigators with valuable information; for example, user accounts, email accounts, network configuration, logs, and passwords. Furthermore, for digital forensic investigators to conduct an effective interview, they must have the proper tools and training to employ the interview process. For instance, formal procedures or instructions should be developed and implemented to ensure that the investigator follows a standard during all investigations. Additionally, training should be provided to ensure that digital forensic investigators comprehend by what means to prepare, conduct, and evaluate an interview. Furthermore, resources should be made available for digital forensic investigators to accomplish their tasks; for example, recording devices and references. Also, definitions should be provided to the digital forensic investigators for
Data is crucial to the success of any company and they are now increasing their efforts in soliciting and retrieving customer data to learn more about their client's preferences, likes, and dislikes. This, among other factors has attributed to a growing field of data science where data scientists learn to collect crucial data. While there are many types of data, this paper will primarily focus on digital data and how digital scientists can retrieve these data to support provide information for the crown or for the defense. This area has received more attention because criminals such as terrorists have realized the effectiveness of using digital devices to aid in their criminal endeavors (Reith, Carr & Gunsch, 2002, p.2). To combat this, law enforcement agencies are now relying on digital scientists to preserve, collect, analysis and interpret "digital evidence derived from digital sources" (Vincze, 2016, p.184) to help prevent cybercrime and prosecute (or exonerate) suspects. The purpose of this paper is then to illustrate why digital forensic is crucial to addressing the new dangers presented in our society by analyzing the strengths and demonstrating why the weaknesses of the field
From data acquisition, the investigator should move to the process of extracting data. He or she should use special computer forensics software tools to extract important data from various computer devices and networks. The process of extracting data requires the investigator to be knowledgeable about where to search data in the system and the kind of questions to ask (Rogers, 2003). After extracting data, the investigator proceeds to the process of data analysis. By this time, the investigator will probably be having thousands of files. He or she should use computer forensic tools and techniques to analyze the files in order to generate data which is more relevant and concise (Rogers, 2003). The last step of the process of computer forensics involves reporting the analyzed data. The investigators should ensure that the data, which is supposed to be reported, is complete, understandable, and defendable. This will ensure that the final data presented is credible (Rogers, 2003).
Moving onto the weaknesses, the following test will examine the acquisition of information, discovery of information, education, procedure and significance of the evidence. One of the main concerns in this field is still acquiring the information in a way that does not jeopardize the integrity of the information despite having the appropriate tools. This is because digital forensic scientists created the tools for security and other computer related purposes and not for forensic purposes (Casey, 2004, p.29). This poses specific issues when the investigators are trying to collect information in a manner that is acceptable by law, and while it is true that it is possible to create tools specifically for forensic purposes
It is indisputable that the progression of forensics technology and knowledge has greatly improved the capability to catch criminals. Forensics of the past did not include the tools or knowledge that we now have. Forensics is not a perfect science nor has it ever been; however, we are closer to perfecting it than ever. Every criminal leaves behind some traces of evidence; it is up to the professionals to find and analyze it to solve cases. Looking at the timeline of forensic technology of the past to the present it is evident that it has evolved dramatically and will continue to do so.
Forensic Science is a vital and fascinating part of the criminal justice system. Forensic science it plays an important role in almost. every part of the criminal justice system. For many Americans, the word forensics evokes a cascade of vibrant imagery that entails crime and intrigue. It is a buzzword for DNA, bite marks, bullet wounds, fingerprints, autopsy, gore, death investigations, semen stains, and rape kits. Forensic science is defined as the application of science to the law, which is a very broad definition This can mean almost anything— accountants who perform analysis to assist the courts are forensic accountants; computer enthusiasts who hack into the hard drives of sexual predators are forensic computer technicians, the list goes on and on. The field of forensic science is growing, and the list becomes even longer as more divisions of labor and specialization occur. With this large influx of experts in fields that expand with technology and multitudes of new techniques, it is amazing that the courts can even keep up.
Supportive investigation procedures and protocols should be in place in order to show that the incriminating evidence was on the electronic media. Crime has changed since the dawning of the computer age and the need for digital forensics is growing rapidly. Digital forensics has various areas based on different standards and media types, each with experts. There have been major breakthroughs in digital forensics
Digital forensics has been responsible for putting away thousands and thousands of criminals. Ranging from simple crime computer crimes to child pornography. To get quality evidence that can be admissible in court there are steps that are needed in preparing a computer investigation. There are also requirements for data recovery, as well as procedures for corporate investigations. “Digital forensics has become prevalent because law enforcement recognizes that modern day life includes a variety of digital devices that can be exploited for criminal activity, not just computer systems. While computer forensics tends to focus on specific methods for extracting evidence from a particular platform, digital forensics must be modeled such that it can encompass all types of digital devices, including future digital technologies” (Reith, Carr, and Gunsch, 2002).
Dedicated system forensics specialists have trained intensively in investigating digital incidents to determine magnitude of the situation. Since digital crimes are committed on devices over multiple computing platforms, it is essential for forensic specialist to have a broad knowledge on which tools and techniques yield best results. The information collected from devices may serve as useful evidence in a legal matter; you never want the gathering of data to be an issue during the trial proceedings. Dedicated system forensic specialists understand the advantage in preparing a chain of custody report; it documents who oversaw data recovery or imaging, when & where collection took place and how & who stored data, which all add evidentiary value to findings. Individuals not skilled in the digital investigative process may inadvertently contaminate, overlook or destroy evidences, or simply forget to document the collection process. The smallest omission & fallacy in evidence collection or documentation can cause finds to
In a world where technology is increasingly becoming the way of life, it was only a matter of time before crime was no longer just in the streets but happening online as well. Criminals now get a new approach to carry out their crimes with the use of computers. Since technology is more like a murder mystery than catching the bad guy in the act, a new discipline of forensics needed to be put into place. This is known as computer forensics. Forensic science is any science used for the purpose of law. In the case of computer forensics it is “the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law” (U.S. Cert, 2008). Meaning if you do something illegal on the Internet it can be found.
Currently, technology has proven to helpful tool in criminal investigation. This report analyses and discuss recent research on how ICT(Technology) helps in homicide investigation. A case study will portray how the use of evolving technology has helped in homicide investigation. The discussion focuses on influence of some of the main technology and tools used and its setbacks in modern day homicide investigations; Tools like Fingerprinting, Digital evidence (e.g. surveillance), DNA analysis, 3D reconstructions are examined and outlined in the report while portraying their effectiveness and legal setbacks.
With advances in digital technology, the scope of digital crimes has also increased multi-fold. Digital forensics is a science, which involves collection, preservation and documentation of the digital evidence from various digital storage media. This entire process must be undertaken in fashion that is appropriate forensically, and results in collection of data, which can be made admissible in a court of law during the investigation of a crime. Since most of the transactions today happen across digital media, it is imperative that organizations world over understand the fundamentals of forensics, and also take steps in training their employees. If such procedures are not put in place, then it may result in the data of an organization to
Currently, technology has proven to helpful tool in criminal investigation. This report analyses and discuss recent research on how ICT(Technology) helps in homicide investigation. A case study will portray how the use of evolving technology has helped in homicide investigation. The discussion focuses on influence of some of the main technology used and its setbacks in modern day investigations; Tools like Fingerprinting, Digital evidence, DNA analysis, 3D reconstructions are examined and outlined in the report on their effectiveness and setbacks.