Preview

Digital Evidence

Satisfactory Essays
Open Document
Open Document
353 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Evidence
A cybercrime suspect can sometimes use creative means to commit his or her criminal offense. Some examples of sources a cybercrime suspect controls from which digital evidence may be obtained are listed below.

1) Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).

2) External drives, removable media, thumb drives, memory cards. These may contain information such as e-mail messages, internet browsing history, chat logs, pictures, image files, databases, financial records, and event logs which can be used as evidence in an investigation (National Institute of Justice, 2008).

3) Handheld devices, such as mobile phones, smart phones, pagers, GPS systems. These may also contain information such as e-mail messages, internet browsing history, chat logs, pictures, image files, databases, financial records, and event logs that can be used as evidence in an investigation (National Institute of Justice, 2008).

4) Peripheral devices, including VoIP devices, memory card readers, and USB and FireWire hubs. Information stored on these devices can be used as evidence, such as recently faxed or printed documents, sources for fingerprints, and other identifiers (National Institute of Justice, 2008).

5) Printers, which are network-attached hardware, should be ‘imaged’ as well as the computer and other equipment. These may contain event logs and recently printed documents that can be used as evidence in an investigation.

References:

Grant, G. (2009, August 25). The New Threat to Oil Supplies:



References: Grant, G. (2009, August 25). The New Threat to Oil Supplies: Hackers. Retrieved January 26, 2012, from www.foreignpolicy.com: http://www.foreignpolicy.com/articles/2009/08/25/the_new_threat_to_oil_supplies_hackers National Institute of Justice. (2008, April 14). Electronic Crime Scene Investigation: A Guide for First Responders. Retrieved January 26, 2012, from www.nij.gov: http://www.nij.gov/nij/publications/ecrime-guide-219941/ch1-electronic-devices/welcome.htm

You May Also Find These Documents Helpful

  • Good Essays

    Computers, and computer related storage media including hard drives, CD disks, DVD disks, flash drives, memory sticks, iPods, personal digital assistants (PDA), flash media, diskettes, and other magnetic, electronic, or optical media.…

    • 808 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    I will say that some of the most important items in a computer for a forensic investigation are: Drivers, running programs, installed programs, operating system, computer name, security setting and configurations, and firewall configurations.…

    • 664 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    5. Which item or items within DevManView’s list would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Csi Essay Example

    • 3977 Words
    • 16 Pages

    Technology is rapidly changing every aspect of the criminal justice system as computers make possible the streamlining of many procedures, shortening their time span and increasing their accuracy. Techniques used in the collection, processing and storage of evidence benefit from these recent developments.…

    • 3977 Words
    • 16 Pages
    Good Essays
  • Better Essays

    Evidence can be as diverse as people; however, when looking to collect any type of evidence, it will typically be separated into one of two categories: real evidence or testimonial. Real evidence is considered to be tangible, such as, it will be anything that the five senses can perceive (Worral, Hemmens, & Nored, 2012, p. 71). Articles of clothing, weapons, contracts or legal documentation, and photographs are all examples of tangible / real evidence. Additionally, within this same category of real evidence, “demonstrative” evidence will also be included. This type of evidence would be anything that can actually demonstrate the crime and/or scene. For example, a technician…

    • 1194 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Dna Evidence

    • 397 Words
    • 2 Pages

    References: Cops.usdoj.gov.2003. Evidence Identification, Collection & Preservation for Law Enforcement. Retrieved February 26, 2009. Available Online:…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The disk BTK used to communicate with police was analyzed and the results eventually lead back to Rader. Rader believed that the police would not trace the evidence, however that was not the case. The Detective in charge of computer analysis quickly learned that the computer belonged to a Lutheran church. Once police arrived at the Church they realized that Dennis Rader was the last person to use the computer. Although Digital Forensics was strategic in the BTK case, many other police agencies were not knowledgeable in computer forensics. Digital evidence normally seized at crime scenes includes computers, cellphones, cameras, flash drives, etc. (Garrett, 2009). "Technology is becoming an increasingly important part of criminal activity, and agencies need resources and training to deal with it (Garrett, 2009)" Approximately, $200,000 would have to be allocated in order to effectively train officers on digital evidence (Garrett, 2009). Departments tend to “invest around $3,000 in training and equipment and expect $20,000 worth of performance” (Garrett, 2009). Furthermore, the digital evidence was a profitable resource that aided police in identifying a…

    • 1315 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Lmmmh

    • 847 Words
    • 4 Pages

    Physical evidence is any anything that can establish a crime has happened and anything that links the crime and the criminal. Physical evidence might include objects like weapons, fibers, and hair. In fact, virtually any object could be physical evidence under the right circumstances.…

    • 847 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The glass that was broken from the security screen some samples should be taken as the suspects are likely to have stepped on it which is likely to still be on the shoes they wore which would connect the potential suspect…

    • 1423 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Forensic evidence is scientific evidence provided by expert witnesses, obtained by scientific methods such as ballistics, blood testing, and DNA testing. There are two major types of forensic evidence, there is fragile or ‘transient’ evidence such as, hairs, fibers, glass, fractured objects, fire accelerants, skin cells; found on items touched or worn, barefoot impressions; latent and in blood, shoe and tire impressions, toolmarks; focus on point of entry, body fluids; blood, semen, and saliva, gunshot residue or patterns, and latent fingerprints, and there is solid or ‘tangible’ evidence such as, firearms, unfired cartridges, fired cartridge cases, fired bullets, other weapons; knives, metal bars, bats etc.., computers and devices, documents; checks, notes and receipts, drugs, and paraphernalia (MSP,…

    • 1556 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Photographs, videotaping, and sketching each are important to the documentation process, as well as establishing corpus delicti. Photographing the crime scene(s) should begin before any objects are touched or moved, based on Gross’s theory that once something is moved it can never be returned to the exact location it originated (Buckles, 2007.) These steps are all important for reference of the scene (e.g. blood splatter, weapon location, and position of evidence to everything else.) The collection of the media is an indispensable tool for the investigators. Especially, a reference to the scene is needed later, or if the materials are needed during the trial for visual reference. Media documentation is a keen step in referencing the way the evidence is…

    • 886 Words
    • 4 Pages
    Good Essays