Verified Document

Computer Forensics Solving Crimes Using Term Paper

Such information is collected using packet sniffers which are programs that can access all information passing through a computer, and not only information particularly sent to the computer. The packet sniffer can either pick all the information, or just selected what is needed, and at the specific time when the information passed through the computer. This is then copied into a given memory. However, for the packet sniffers to be used, the investigators must have proper authorization depending on what they are investigation. This is to help protect the privacy of computer users. Computer forensics also works by disk imaging. This is a process where all information on a disk is copied in the form of an image and looked into. Disk imaging copies all files, both active and inactive, unlike when creating a backup where one only copies active files. One advantage of disk imaging is that it provides an extra source of information in the chance that the original disk is deleted...

This is because when analyzing the original data, anything is bound to happen.
Wiretapping is also used in not so complicated cases. Wiretapping can simply be done by hooking a recorder to telephone lines. In a much advanced situation, bugs are hooked to telephone lines. Bugs are devices that receive audio information and send it to a set destination via radio waves. The bug is hooked to the circuit of the telephone and therefore turns itself on and off depending on how the phone is being used.

The information collected in any of the above ways is then used to carry out investigations, and even presented in courts as evidence. It is however unfortunate that Computer forensics is rarely used when investigating crimes. Investigators and law enforcement agencies should embark more into this mechanism since in the present day; many activities are being carried out using computers and via the internet.

Cite this Document:
Copy Bibliography Citation

Related Documents

Digital Forensics Technology: Why Open
Words: 2402 Length: 8 Document Type: Thesis

The rapid development of predictive routing algorithms that seek to anticipate security breaches are also becoming more commonplace (Erickson, 2009). Evidence acquisition through digital forensics seeks to also define preservation of all patterns of potential crime, regardless of the origination point (Irons, 2006). The collaboration that occurs in the open source forensic software industry acts as a catalyst of creativity specifically on this point. There are online communities that

Cyber Crime Forensics
Words: 2623 Length: 9 Document Type: Term Paper

Cybercrime has become a serious problem in the world we live in. The abundance of personal computers that are readily available at relatively low prices has spawned the growth in Cybercrime all over the globe. As a result, law enforcement agencies have developed cybercrime forensics which is designed to track down those that are responsible for cyber crimes. The purpose of this discussion is to analyze this subject and discuss

Different Interpretations of ISO-9660 File Systems
Words: 2779 Length: 10 Document Type: Research Paper

Systems COMPUTER SCIENCE Computer forensic is a scientific method of analyzing the digital information which is used as evidence for the criminal, administrative and civil cases. In the contemporary legal environment, computer forensic has become a vital part in solving the complex crimes. Since computer forensic experts use data to solve high level cases, effective data storage and retrieval is critical aspect of forensic investigation and effective data storage is very

Advances in Technology. The Internet Has Brought
Words: 831 Length: 2 Document Type: Essay

advances in technology. The Internet has brought the idea of instantaneous global communication to a reality; smaller and smarter chips are now included in inexpensive Smart Phones, and our ability to understand and manipulate data has vastly increased. New technologies can certainly offer law enforcement a number of new tools that aid in their job. Essentially, these can be divided into different segments, all of which are useful during

Inadequacy of Forensic Hair Analysis
Words: 6513 Length: 19 Document Type: Term Paper

Hair is also in contact with chemicals in shampoos, and any dyes, gels, sprays or other cosmetics that may be placed on the hair (11). Since there is no standardized method for cleaning these external contaminants off of the hair prior to analysis, the potential for inaccurate results from external contamination is widespread. There is no way to tell in the laboratory if a chemical is contained within the hair,

Combined DNA Index System Codis
Words: 2066 Length: 8 Document Type: Term Paper

Change them often; (2) Use disposable instruments or clean them thoroughly before and after handling each sample; (3) Avoid touching the area where you believe DNA may exist; (4) avoid talking, sneezing, and coughing over evidence; (5) Avoid touching your face, nose, and mouth when collecting and packaging evidence; (6) Air-dry evidence thoroughly before packaging; and (7) Put evidence into new paper bags or envelopes, not into plastic bags.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now