Preview

Digital Evidence

Good Essays
Open Document
Open Document
342 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Evidence
Digital evidence refers to any piece of electronic information that can be found or retrieve from any electronic device which can be used to provide evidence for any use of violation. Basically, “Any information of probative value that is saved or stored in a binary form is digital evidence.” (SWGDE, 1998, p5).
Below are the lists of electronic devices that stores digital evidence and some of the possible ways that the information can be manipulated:
Information stored inside mobile phones such as phone numbers, calendar entries, text messages can be manipulated by employees or any personnel to commit crimes such as telemarketing fraud, pornography, stealing of company’s information or GPS location, etc. For example, a message was retrieved from a mobile phone which helped to acquit Patrick Lumumba in the murder of Meredith Kercher. (Trutv, n.d.).
Personal digital assistant (PDA) which is capable of acting as a planner and any information stored inside it can be used as evidence. However, if the batteries were to be flat, the data inside would then be lost.
Music players may contain images, music files, word or portable document format (pdf) documents that are classified or corporate information
Digital watches can be used to store or record information such as mobile numbers or notes. They were also often used as timing device for bombing attack such as the attack of 1993 World Trade Center.
As the usage of digital cameras and recorders increases, the photographs taken might be related to the crime. Cyber forensic tools can be used to retrieve or recover deleted photographs as a piece of evidence. Digital recordings were found inside Malvo and Muhammad’s car as an evidence for sniper killings. (FBI, n.d.).
Storage devices such as CD-Rom, hard drive, thumb drive, floppy disk, cassette, card readers and dongles are also capable of storing digital evidence. Police found metadata stored inside the contents of the floppy disk that Dennis Rader sent which

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Computers, and computer related storage media including hard drives, CD disks, DVD disks, flash drives, memory sticks, iPods, personal digital assistants (PDA), flash media, diskettes, and other magnetic, electronic, or optical media.…

    • 808 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The BTK Killer

    • 654 Words
    • 3 Pages

    “The floppy did me in.” Words from notorious serial killer Dennis Rader, also known as the BTK killer. Rader’s spree of violence lasted nearly 30 years and included 10 victims. Raider’s actions were strange, in the way that he communicated to the police. He truly enjoyed taunting the police and gloating about his crimes. His usual way of communicating with the police was through letters or 3x5 cards that he would send to the police directly or to the local television station. In one communication to the police department Raider stated “Would it be secure for the murderer to communicate with police via a floppy disk?” Knowing that having a different form of evidence to analyze the police told Dennis Raider that would…

    • 654 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A second reason to why the phone shouldn’t have to be cracked, is about the certainty that the data sought needed to investigate the terrorist attacks actually is on the phone? According to (Article title and author) there is no 100% guarantee that the information your organization wants is actually on the phone. This question was asked by David Auerbach, a software expert at the think tank New…

    • 642 Words
    • 3 Pages
    Good Essays
  • Better Essays

    2. Which item(s) generated by WinAudit would be of critical importance in a computer Forensic investigation?…

    • 664 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Sometimes there can be a sudden requirement to perform hard drive forensic examination. The goals of your forensic examination can be related to virtually any subject, since any type of case/action can take place. Sometimes many instances you may not always perform a full-scale investigation or “fishing expedition” when reviewing the contents of media; in other words, your forensic examination of media may include criteria that focuses and narrows your examination.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Manual systems such as paper based files (text, photos, x-ray, handwritten notes etc) will normally be stored out of general view in a locked room with a key or with number keypad. Sometimes they will be stored in a special vault.…

    • 246 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Scientific Working Groups

    • 984 Words
    • 4 Pages

    Scientific Working Group on Digital Evidence (SWGDE) “brings together organizations actively engaged in the field of digital and multimedia evidence to foster communication and cooperation as well as to ensure quality and consistency within the forensic community.” The SWGDE works to bring together associations that are actively focused on the field of digital and multimedia evidence to bring communication and collaboration as well as…

    • 984 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cell Phone Privacy

    • 655 Words
    • 3 Pages

    A. As most people carry their cell phone with them at all times, the ability is in place to track the exact movements of all individuals. Cell phone GPS could prove useful in saving lives during emergencies (Lawyers).…

    • 655 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    On May 28 2012 at :800am Officer M. Truman delivered USB flash drive sealed in an anti static bag with tamper resistant tape. Officer M. Truman initials and the date are written across the tape. The USB flash drive is 2 Gb in memory size and blue in color. Serial number 2394297456. Officer M. Truman asked me to create a forensic copy , verify the image and to report my results. In simple words, disk imaging can be defined as to make a secure forensically sound copy to media that can retain the data for extended period.…

    • 1916 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Manual system of recording information has to secure so they are usually kept in a locked cabinet and may be…

    • 981 Words
    • 4 Pages
    Good Essays