Verified Document

Computer Forensic Evidence Case Study

¶ … 2005, one file sent by the BTK killer to a Wichita television station led police to investigate Dennis Rader, a church president, and ended the 30-year murder spree of this serial killer. What evidence was pivotal in this case? Computer evidence has become increasingly pivotal in demonstrating the guilt or innocence of a suspect. This has recently been seen in the so-called BTK case. The case is testimony to the value of using computer evidence in modern forensic science. The BTK (Bind, Torture, Kill) killer was linked to eight murders in the 1970s and '80s and then resurfaced in 1991 and later in the 21st century. But when the killer Dennis Rader "came to his pastor in January with a floppy disk, saying he had the agenda of a church council meeting and needed to run off copies on a printer," the electronic imprint in the disk linked Rader to a message sent by the BTK to a Wichita TV station (Computer Trail Led To BTK Suspect, 2009, CBS). The BTK killer was known for the cruel and taunting message he sent to various media sources and this propensity of his was used to 'crack the case.'

Later, other evidence would link Radar to the crime, such as souvenirs he kept of his victims as well as other DNA evidence. But the critical link in the chain was the disk, which gave law enforcement (who had been following Radar) the ability...

Police had been communicating with Radar under the guise of media personalities. Radar left a disk with a message regarding his crimes. "Additional investigation showed the disk was opened in computers at the Christ Lutheran Church and Park City Community Public Library. The file document had been created on February 10, modified on the February 14, and printed that same day. It has been revised four times and was last saved by user 'Dennis.' Most of the information from the disk was found in its properties domain. Such information is automatically written by the software and is based on software registration information and the identity of the user logged on at the time of the activity on the document" (Williams & Landwehr 2006). Investigators were able to easily trace the disk to the church and spoke to the pastor. The pastor helped identify Dennis after investigators confiscated the church computer as evidence.
A dossier on Iraq's security and intelligence organizations was released to the public by Prime Minster Tony Blair as a Word document on the 10 Downing Street Website

(www.number-10.gov.uk) in February 2003. An analysis of the document by Dr. Glen

Rangwala, a Newnham College, Cambridge University lecturer in modern politics,

found that much of the material…

Sources used in this document:
References

Computer trail led To BTK suspect. (2009). CBS. Retrieved August 27, 2011 at http://www.cbsnews.com/stories/2005/03/04/national/main678013.shtml

Lewis, Mike. (2003). Government 'intelligence' report on Iraq revealed as plagiarism.

fas.org. Retrieved August 27, 2011 at http://www.fas.org/irp/news/2003/02/uk020603.html

A piece of plagiarism. (2003). BBC. Retrieved August 27, 2011 at http://news.bbc.co.uk/2/hi/uk_news/politics/2736149.stm
2011 at http://meria.idc.ac.il/british-govt-plagiarizes-meria.html
The Police Chief, 73 (12). Retrieved August 27, 2011 at http://policechiefmagazine.org/magazine/index.cfm?fuseaction=display&article_id=1065&issue_id=122006
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensic Tools: The Use of Computers
Words: 1019 Length: 3 Document Type: Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Forensic Evidence in Criminal Investigations
Words: 1843 Length: 5 Document Type: Research Paper

But if there five or ten, along with other forensic evidence, it is enough to say that an individual committed a crime "beyond a reasonable doubt." The glove that didn't fit O.J. Simpson at his trial for the murder of his wife and another man is an example of forensic evidence that cleared someone who was falsely accused. Whether that was the correct verdict, we will never know for certain.

Computer Forensic Investigation Making an
Words: 3228 Length: 12 Document Type: Research Paper

Typically, a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations." (Microsoft, 2010 P. 2). Meanwhile, our company will need to implement the full back up safeguard all our data. Under the full recovery model, the first step is to back up the transaction log. Combination of full back-up with

Efficacy of Handwriting Analyses As Forensic Evidence
Words: 5603 Length: 17 Document Type: Essay

Efficacy of Handwriting Analyses as Forensic Evidence Humankind has been writing for millennia, but it has only been in the last 100 years or so that individual handwriting samples could be distinguished by forensic document examiners to the extent that their testimony was deemed admissible as evidence in a court of law. In recent years, this analysis has been augmented by sophisticated handwriting analytical devices that are being used by national

Computer Forensics: Generally, Forensics Can Be Described
Words: 917 Length: 3 Document Type: Essay

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

Forensic Accounting Is a Special Subsection of
Words: 2063 Length: 7 Document Type: Essay

Forensic accounting is a special subsection of accounting that goes beyond the typical job description of an accountant. Forensic accountants use their work in courtroom and other legal settings to help. Their primary roles are litigation support and investigative accounting (Zysman, 2012). To do this, forensic accountants combine accounting, auditing, and investigative skills. However, conducting investigations is only one component of a forensic accountant's job description; they also have to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now