Computer Forensics Law Enforcement Case Study

PAGES
2
WORDS
690
Cite

¶ … computer forensics tools and processes used by investigators continually evolve and change over time. Although the material published in the 2008 version of the United States Attorneys' Bulletin includes some stalwart information regarding processes and procedures, the specific issues at stake will have changed drastically in the nearly 8 years since the issue was published. For example, the operating systems and encryption methods would have completely changed from 2008 until 2016. Carroll, Brannon & Song's (2008c) analysis of Vista and its file structure will be outmoded for many individuals or organizations under investigation. Therefore, great care should be taken when investing into computer forensics tools that may be outmoded. Using outmoded tools can seriously jeopardize an investigation and lead to serious loss of credibility on the part of the departments involved and their team leaders. At the same time, computer forensics experts do need to maximize knowledge of retrograde technologies because some evidence could be stored on older machines using older operating systems. Therefore, the most important tool in the computer forensics arsenal is training and education. Training and education must be ongoing and complete, erudite and state of the art. Computer forensics experts need...

...

If necessary, specialists can be called upon to offer additional expertise in the areas needed for an individual investigation. Great care must be taken when compiling the evidence in a report used in courts, given the sensitivity of the testimony and the sensitiveness of the evidence gathering procedures. Littlefield's (2008) advice regarding how to properly prepare and present forensic evidence is sound and solid, relying on case history in related areas.
Carroll, Brannon & Song (2008b) point out some of the salient procedures and tools used in computer forensics when examining large databases. Preliminary and ongoing concerns include the need to create data images because investigators should not be manipulating the original data file. Yet when creating images, quality loss and other issues may arise, leading to the need for the most advanced tools available. As of the time of writing, Carroll, Brannon & Song (2008b) state that creating exact copies is a time-consuming and difficult process but that systematic methods of creating images,…

Sources Used in Documents:

References

Carroll, O.L., Brannon, S.K. & Song, T. (2008a). Computer forensics. United States Attorneys' Bulletin 56(1): 1-8.

Carroll, O.L., Brannon, S.K. & Song, T. (2008b). Managing large amounts of electronic evidence. United States Attorneys' Bulletin 56(1): 46-59

Carroll, O.L., Brannon, S.K. & Song, T. (2008c). Vista and BitLocker and Forensics, Oh My! United States Attorneys' Bulletin 56(1): 9-28

Littlefield, M.J. (2008). Demystifying the computer forensic process for trial. United States Attorneys' Bulletin 56(1): 29-45


Cite this Document:

"Computer Forensics Law Enforcement" (2015, December 08) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/computer-forensics-law-enforcement-2160160

"Computer Forensics Law Enforcement" 08 December 2015. Web.25 April. 2024. <
https://www.paperdue.com/essay/computer-forensics-law-enforcement-2160160>

"Computer Forensics Law Enforcement", 08 December 2015, Accessed.25 April. 2024,
https://www.paperdue.com/essay/computer-forensics-law-enforcement-2160160

Related Documents

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

Computer Forensics The issue at hand involves the examination of a scene from an office space within Widget Corporation. We find that this is the assigned office for a Mr. Didit. The information we have at hand is digital -- a photograph taken from an approximate distance of 3 feet from the occupant's desk. Using the photograph, we find that there are a number of electronic and non-electronic devices and our

Forensics and Digital Evidence Forensics is a discipline which uses standardized techniques to pull apart an event, analyze what happened, and find a more accurate conclusion to the data analysis than just witness testimony. For centuries, lacking even rudimentary techniques like fingerprinting or blood type analysis, the legal system relied on confessions and witness testimony. We may turn to Ancient Greece for one of the first recorded examples of a type

Such information is collected using packet sniffers which are programs that can access all information passing through a computer, and not only information particularly sent to the computer. The packet sniffer can either pick all the information, or just selected what is needed, and at the specific time when the information passed through the computer. This is then copied into a given memory. However, for the packet sniffers to

Computer/Software and the Use of Computer Technology in Investigations The key advantage of computer forensics is that it can look for and assess loads of data in a swift and efficient manner. Computers are able to search for keywords from hard drives, in various languages. This proves valuable, as cybercriminals are easily able to cross national boundaries over the World Wide Web (Forensic Science, 2009). Computer forensics may be utilized