2.0 LITERATURE REVIEW This chapter presents a review of literature that is related to computer and digital forensics. It begins by taking a look at the meaning of computer forensics and the different areas within this field. It also explores the forensic science process and the challenges facing practitioners. The chapter then discusses social networking and its relationship with cybercrime and the role of forensics in keeping user information private and secure. It concludes by reviewing the meaning and significance of metadata information in resolving digital or cybercrime activities. 2.1 Definition of Computer Forensics Computer forensics is the general term used to describe the acquisition, preservation, analysis and presentation of digital evidence(s). Computer Forensics is “the science that is concerned with the relation and application of computers and legal issues” (Kuchta 2000). This definition attempts to show the link between forensic science and law or legality. Computer forensics is also commonly referred as “cyber-forensics or digital forensics” by various individuals, authors of books and also information security professionals. The goal of …show more content…
As far back as 2001 when the first “Digital Forensics Workshop” was held and a case for standards was made, considerable progress has been made in ensuring the growth and expansion of the practice of computer forensics. Mason (2003) suggested the need for standards by which digital forensic practitioners ensure that evidences for prosecuting cases in the law courts are valid as more judgments from a growing number of cases were reliant on the use of electronic and digital evidences in proving the cases. XXXX (2005 & 2007) emphasized the dynamic nature of technology and its impact on the digital forensics field. Hence, the need for having early standards in regulating the
4.7.5 Data Preservation and Isolation from the Network. The main purpose of a digital forensic report is to keep the data integrity, avoiding any type of data alteration, in order to present valid evidences, for instance in a court. The use of not valid software to check the stored information in a mobile phone can alter these information. The action of receive new data can alter the information stored, for instance an automatic firmware update, or remote device control with the risks involved. Therefore, it is extremelly important have the device completely isolated from the network.
dishonourable false testimonies in 1987, at the trial for a case of double rape that put Dale Woodall, a 29-year-old from Charleston, West Virginia, in prison for life. A brief background of the case entails a man wearing a brown and yellow ski mask had taken hold of two women outside a Huntington, West Virginia, shopping mall and raped them in the car of one of the victims. The women, not able to offer thorough account of the rapist, were ‘forensically hypnotized’ to improve their memories. Dale Woodall was put on trial, and Fred Zain distinguished one of his pubic hairs as being in the victim’s car and a semen stain as matching his blood type. ‘He testified that 1 in 10,000 people had Wooddall 's grouped and subgrouped blood type, a statistic
CASE REPORT Introduction: Me and my team of forensic anthropologists were called in by the police department to examine skeletal remains and figure out it’s gender, ethnicity, age, and height by using it’s bone measurements. Summary of Findings: Determining the sex: To determine the sex, we took measurements of the pelvis, skull, femur, and humerus. The results for the pelvis were both equally male and female.
The “CSI Effect” or known as “CSI syndrome” is a term used to describe on how the overstated portrayal of forensic science and technology shown on the crime investigation drama series, such as CSI: Crime Scene Investigation, Law & Order etc. generate a psychological impact to the judicial system and general public, in which there is a raise of expectations of forensic science and technology by case victims and trial jurors. In this review, I will explore on the possible effects between the forensic fiction and the expectation of the crime victims in regard to the real-life investigation procedure, where various aspects of the research proposal and relevant ethical issues concerning the proposed method, design and data collection will be discussed,
Today, modern standards require the burden of proof be brought forth by the plaintiff, or prosecution in criminal cases. This means that the accused no longer has to prove they did not commit the crime, but the prosecution has to prove that all the evidence proves the accused did in fact commit the crime in question. Circumstantial evidence is not enough, but physical evidence, or forensic evidence is now required in modern courts for a conviction. Additionally, the modern standard when considering evidence, and for conviction is “beyond a reasonable doubt.”
Within all three Operation Snapshot sting operations a myriad of obstacles and barriers stand in the way of investigating units, from identifying the individuals who are committing these horrendous acts. Communications system are an ever changing, and ever complex devices that increase in privacy and security every day. The individuals that are committing acts related to child exploitation are, taking measure to make their systems more covert, by hiding their IP address through Virtual Private Networks (VPN) (cite I video). Moreover, making it increasingly difficult to locate the individual that is responsible. Furthermore, wireless internet presents its own obstacle for officers (cite track).
Anything that can be used in a court of law is referred to as forensics. Forensics can be any scientific test that can prove a connection to a crime. The information obtained in any test must be admissible in a court of law. There are many branches of forensic sciences; one branch that is not well known is forensic radiography, or forensic imaging. “Conducting examinations that use ionizing radiation to gather and analyze forensic evidence constitutes forensic radiography” (ASRT. (2010).).
Computer forensics processes must adhere to standards set by the courtroom that often complicates what could have been a simple data analysis. In court, knowing who connected to the system based on logs is not enough. There must be facts that will support those connection
Forensic Science is the application of science or rather the method of gathering and examining information pertaining to a particular situation. It is a science which is used for the purpose of the law( example checking the relevance of facts etc), and therefore it is supposed to provide an impartial and also an unbiased scientific view, which can later be used and also enforced as relevant evidence in a court of law Although forensic science can be used for both, civil and criminal cases, it is the criminal cases where usually forensics come into play for example, DNA evidence is used in various criminal cases to identify as to who all were present at scene of crime. Forensic science which encompasses of DNA, hair analysis, saliva, semen,
“Traditional crimes, such as fraud, counterfeiting, embezzlement, telecommunications theft, prostitution, gambling, money laundering, child pornography, fencing operations, narcotics sales, and even stalking, all could be computer related. ”(Goodman Marc, Pg 10) Many modern crimes are committed on the web because it provides access to data that could destroy someone’s life if used the wrong way so it’s a police detective’s job to handle cyber crime. “When compared to murder, rape, or violent assaults, computer crime may seem trivial. But, a person who asks an executive who loses his life savings due to the theft of intellectual property from his computer hard drive will get a different answer.
What are forensic science databases? This essay will provide an explanation of what forensic science databases are and how they are used in various situations. Forensic databases can aid in law to help provide vital information to prove a crime using scientific evidence. Integrated Ballistic Identification system: IBIS Items that have been retrieved from the crime scene or taken from a suspect’s possession that relate to ballistics go through the IBIS database, for example, bullets and cartridge casings.
Digital forensics are the methods of identifying, analyzing and presenting the evidence found on digital media devices. Due to the heavy use of digital media devices nowadays, the law enforcement and legislations have to make changes, clarifications in order to adapt to the rapid development of the technology. The paper will discuss the various levels of government laws, legislation and court decisions, Federal and Provincial where evidence has been successfully admitted into Canadian criminal trial proceedings. Legal Authorities for Seizing and Searching of Evidence in Canadian Court The Supreme Court of Canada defined seizure as “the taking of a thing from a person by a public authority without that person’s content.”
According to Google, forensics would be defined as scientific tests or techniques used in connection with the detection of crime. My perception of forensic science is a field of work that professionals go into and use scientific skills and tests to help solve crimes. Though I have not really researched forensic science, what I’ve seen is very interesting. Without forensics, many crimes would probably go unsolved.
Crime scene photography, sometimes referred to as forensic photography or forensic imaging, is the art of producing an accurate representation of an accident or crime scene. Crime scene photography is an important asset in the collection of evidence at the crime scene, documents the appearance and location of victims, shell casings, footprints, bloodstain patterns, and other physical evidence. In order for photographs to be admissible in a court of law, the standard for photographs of crime scenes and evidence must be of sufficient quality. Photography has a vital role in the decision made in court because the pictures are to represent the scene as it was exactly. Digital SLR single reflex camera is the most often used camera in crime scene investigations.
CYBER CRIME Cybercrime is one of the fastest growing type of crime in our society today and have also been a serious problem since it causes a lot of damages and also affect us in different ways. But before I go further let me start by telling you the meaning of cybercrime, Cybercrime is different and more heinous than normal crime that we know. This crime is committed in an electronic medium and here means read is not a requirement and is done in secret Feldman(2013). Cyber war takes place largely in secret, unknown to the general public of crimes include pornography, cyber fraud, defamation, cyber stalking, harassment, IPR theft, data hostage, money laundering, phishing, e-mail bombing, cyber war, illegal monitoring. Secondly let me talk about the effect of cybercrime in our society today.