Verified Document

Forensic Tools Computer-Based Forensics Tools Thesis

It is thus that technologies which work to yield that crucial data from the memory store of any such device have become so valuable to law enforcement in the age of terrorism. According to the Computer Forensics Tool Testing Program (CFTT), "a cellular forensic tool shall have the ability to logically acquire all application supported data elements present in internal memory without modification" (Ayers, 15) This is to indicate that such technology should be able to hack into mobile communication devices without detection by the subject, making it a valuable tool in investigating crimes and preventing suspected crimes. The evaluate of its requirements is produced by the CFTT, which is an organization that "provides a measure of assurance that the tools used in the investigations of computer-related crimes produce valid results." (Ayers, 6)

A major drawback of such technologies, and one that invokes a yet far more complex discussion concerning the philosophy of law...

In this case, the danger that the privacy of ordinary citizens could be compromised is considerable. The ability of such technology to gather information without detection denotes that without careful instruction and oversight, our law enforcement agencies may be seen as being in the possession of too great a forensics capability. As such technology becomes more readily available, so too must the regulatory oversight of its use become more normalized and effectively maintained by law enforcement culture.
Works Cited:

Ayers, R. (2008). Mobile Device Forensics-Tool Testing. National Institute of Standards and Technology.

Bourque, L. (2008). Five Essential Computer Forensics Tools. Enterprise it Planet.

Online at http://www.enterpriseitplanet.com/security/features/article.php/3786046

Sources used in this document:
Works Cited:

Ayers, R. (2008). Mobile Device Forensics-Tool Testing. National Institute of Standards and Technology.

Bourque, L. (2008). Five Essential Computer Forensics Tools. Enterprise it Planet.

Online at http://www.enterpriseitplanet.com/security/features/article.php/3786046
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensic Tools: The Use of Computers
Words: 1019 Length: 3 Document Type: Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Forensic Tools for Computers
Words: 1027 Length: 3 Document Type: Term Paper

Zilla Data Nuker Test: Zilla Data Nuker Software Title Files created or downloaded leave a trace even when deleted. These traces allow skilled computer forensic professionals to retrieve the data. Zillasoft, LLC, a New England-based software developing entity provides Zilla Data Nuker that "Shreds sensitive files so they cannot be recovered or undeleted" according to the promotional material for the software. (Zilla Data Nuker 2.0) Zilla Data Nuker is freely downloadable from the

Forensic Lab Forensic Crime Labs Are Important
Words: 975 Length: 4 Document Type: Essay

Forensic Lab Forensic crime labs are important institutions within the criminal justice system and each lab must be up to standard in order for this system to operate at a high and fair level. A good crime lab begins with a good design based on solid fundamentals and thorough planning. The purpose of this essay is to design a digital forensic crime lab that can be used in a university setting.

Computer Forensics: Donning Your Detective
Words: 403 Length: 1 Document Type: Term Paper

Specialized forensic tools will be necessary to retrieve and analyze deleted, renamed and encrypted data that search tools will overlook. Further, forensic tools will help with complex information correlation. For example, to construct a timeline of events it may be necessary to tie network log stamps and data together with database access and usage logs. Reporting is the final phase of forensic investigation. Here, the article is weak, only recommending

Computer Forensics Case Study
Words: 2206 Length: 8 Document Type: Research Paper

Computer Forensics The issue at hand involves the examination of a scene from an office space within Widget Corporation. We find that this is the assigned office for a Mr. Didit. The information we have at hand is digital -- a photograph taken from an approximate distance of 3 feet from the occupant's desk. Using the photograph, we find that there are a number of electronic and non-electronic devices and our

Computer Forensics Digital Evidence
Words: 1511 Length: 4 Document Type: Research Paper

Forensics and Digital Evidence Forensics is a discipline which uses standardized techniques to pull apart an event, analyze what happened, and find a more accurate conclusion to the data analysis than just witness testimony. For centuries, lacking even rudimentary techniques like fingerprinting or blood type analysis, the legal system relied on confessions and witness testimony. We may turn to Ancient Greece for one of the first recorded examples of a type

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now