Digital Evidence

Only available on StudyMode
  • Download(s) : 286
  • Published : February 26, 2012
Open Document
Text Preview
A cybercrime suspect can sometimes use creative means to commit his or her criminal offense. Some examples of sources a cybercrime suspect controls from which digital evidence may be obtained are listed below.

1)Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).

2)External drives, removable media, thumb drives, memory cards. These may contain information such as e-mail messages, internet browsing history, chat logs, pictures, image files, databases, financial records, and event logs which can be used as evidence in an investigation (National Institute of Justice, 2008).

3)Handheld devices, such as mobile phones, smart phones, pagers, GPS systems. These may also contain information such as e-mail messages, internet browsing history, chat logs, pictures, image files, databases, financial records, and event logs that can be used as evidence in an investigation (National Institute of Justice, 2008).

4)Peripheral devices, including VoIP devices, memory card readers, and USB and FireWire hubs. Information stored on these devices can be used as evidence, such as recently faxed or printed documents, sources for fingerprints, and other identifiers (National Institute of Justice, 2008).

5)Printers, which are network-attached hardware, should be ‘imaged’ as well as the computer and other equipment. These may contain event logs and recently printed documents that can be used as evidence in an investigation.
References:

Grant, G. (2009, August 25). The New Threat to Oil Supplies:...
tracking img