Key Factors In Digital Forensics

Superior Essays
Introduction Digital forensics is the investigation procedures for a legal purpose (Nelson, Phillips, Steuart, 2016). Digital forensics also prepares computer investigations There are four key factors before the computer investigation is complete. The key factors are developing and documenting procedures, following evidence handling procedures, documenting extraction, and presenting the findings. All of these combined lead to the preparing of a more complete computer investigation. As with everything there is a biblical integration, and the same can be said about digital forensics procedures and protocols. With the growing increase in cyber-crimes, or crimes involving technology, there is a dire need for conformity within digital forensics. …show more content…
A method should be easily repeatable, so it can be done quickly across various devices. There may be a case where an investigation has to cover five hundred computers; therefore, the method used should be quickly repeatable. Repeatability should also be easily explainable, because it may be called up during the presentation of findings.
Evidence Handling Protocols Another key factor in digital forensics is following evidence handling protocols. Bulbul (2013) says “Digital evidence must be handled carefully to preserve the integrity of the physical device as well as the data it contains.” If the data is handled poorly, it could result in the damage of the physical devices or loss of data within said devices. This could lead to errors within the investigation that could completely alter the case. There are many different ways devices, or data, could be damaged when they are being handled. These include, but are not limited to, electricity, magnets, radio transmitters, and other devices (Bulbul, 2013). When evidence is being handled it should always be treated with the best care possible. Doing so can protect the integrity of all the evidence that has been collected. Bulbul (2013) says “If any mistakes or errors occurs during an investigation they must not be covered up.” When errors are made and lied about, it can weaken the
…show more content…
(2016) makes a clear point that presentations need to be made for non-technical persons. A lack of understanding could cause discrepancies within the case. Presentations need to be clear, concise, and understandable to everyone, which is why all reports from the beginning until the end of the investigation need to be easy to read and easily

Related Documents

  • Improved Essays

    Holmes/Scarpetta Project- The Valley of Fear What discipline was involved? Digital Forensics (cryptology)- The process of encrypting messages and examining digital media forensically to find, analyze, and present facts and opinions. What was the equipment used? The ciphers represent the pages of previous editions of Whitaker's Almanack.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The NYC computer forensics investigative procedures contain eight stages with electronic tools that are used to support an investigation. The first step that is taken is obtaining a search warrant, & in order to do this there must be probable cause to present to a magistrate. How probable cause is identified is by an investigation, or information obtained in a legal standard& documented by the officer who is seeking the evidence, & he/she must prepare an affidavit that defines the area to be searched, & the evidence being sought (Volonino pp 56). The reason for obtaining a search warrant is so that a defendants Fourth Amendment is not violated.…

    • 652 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    X-Ways Forensics

    • 138 Words
    • 1 Pages

    As part of the validation process, often you need to document the steps you took to obtain data from a suspect drive. Many forensics tools, like FTK, ILook, and X-Ways Forensics, can generate a log report that records activities performed by the detective. Then a built-in report generator is used to create a report in a variety of formats. The following tools are some that offer report generators displaying bookmarked evidence:  EnCase  FTK  ILook  X-Ways Forensics  ProDiscover The log report can be added to your final report as additional documentation of the steps you took during the examination, which can be useful if repeating the examination is necessary.…

    • 138 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Evidence Interpretation

    • 1578 Words
    • 7 Pages

    Evidence Interpretation Over the years, there have been several cases that have been resolved with a false guilty plea or cases where a guilty party was not convicted of a crime. There are various elements that play a role in solving cases; evidence is a one of these key elements. Many factors can determine if the evidence submitted before a court of law is accurate such as how the evidence is collected, if proper protocell was followed before the laboratory’s handling of the evidence, and if the evidences was accurately processed by the crime scene laboratory by various forensic scientists. Furthermore, with the advances in technology in today’s society, various pieces of evidence such a DNA analysis have been considered a crucial element…

    • 1578 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    We then use EnCase and FTK Imager to search for evidence inside these drive images including deleted files and cloud storages. To the extend running examination on mobile phones, we can clone the SIM card right at the scene and save them in USB drives. The Cellebrite UFED Mobile Forensic tool (Field Series) can pull all contacts information, text messages, phone calls history, and email including those may have been erased. Generally, seizing and imaging evidence is a simple procedure, yet now and again, it can be a complicated task. Seizures have a tendency to be standard, yet confounding elements can emerge when you least…

    • 406 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Forensic evidence is depicted as a greatly reliable form of evidence. However, forensic evidence may be inaccurate due to numerous factors rising the number of innocent people being imprisoned. This could be due to errors or misconduct by analysts, the use of unproven methods and improper interpretation of this evidence. The series “Making a Murderer, has raised questions about the actions and motives of law enforcement.…

    • 487 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Pc Wrongdoing Analysis

    • 81 Words
    • 1 Pages

    PC legal sciences agents and PC wrongdoing examiners help people, organizations and lawyers by finding and investigating data. PC scientific agents have practical experience in recouping, breaking down and introducing information from PCs for use in examinations or as confirmation. They decide the subtle elements of interruptions into PC frameworks, recoup information from encoded or eradicated documents, and recuperate messages and erased passwords. PC wrongdoing specialists explore PC violations, for example, wholesale fraud, irritating messages, and unlawful downloading of copyrighted…

    • 81 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Illustrate the differences between digital forensics and network forensics. Digital forensic:  Digital forensic is a branch of forensic science and it talks about the recovery and investigation report found in the digital devices.  Digital forensics is about the "preservation, identification, extraction, documentation and interpretation of computer data"  In order to accomplish these goals, there are well-defined procedures, also derived from law enforcement, for acquiring and analyzing the evidence without damaging it and authenticating the evidence and providing a chain-of-custody that will hold up in court.  Digital forensic have variety of applications to supports a hypothesis before criminal and civil courts.…

    • 520 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Digital Forensics

    • 815 Words
    • 4 Pages

    All evidence must be handled according to established guidelines. a. PERSONNEL RESPONSIBILITIES Chain of custody and the protection of evidence are paramount to our operations. All personnel have the responsibility of protecting evidence stored in the laboratory. b. RECEIPT OF DIGITAL EVIDENCE When a law enforcement officer delivers digital evidence to the laboratory the following steps must be…

    • 815 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Criminal profiling is hands down one of the most beneficial forms of offender identification tools that law enforcement has at their disposal. Education on the different forms of criminal profiling is important for both the general public as well as law enforcement. Further, proper use of criminal profiling is a leading method by which law enforcement can reduce recidivism. Knowledge on how each type of profiling is conducted is important because misuse or a misguided procedure for different forms of profiling may lead to faulty results.…

    • 677 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In a perfect world the need for determining the activity conducted in a network or within a computer would not be necessary; however, this is not a perfect world and there are times when it is imperative that the activity of a computer be monitored. Forensic analysis has been a central part of criminal investigations. Computers and digital devices have become a common component. According, to Fortune Subscribe “The Florida Computer Crimes Act of 1978 included legislation against the unauthorized modification or deletion of computer data; the Comprehensive Crime Control Act of 1984 included some provisions for the inclusion of computer activity in modern crimes; the Computer Fraud and Abuse Act in 1986 expanded that considerably”. There are several cases where Computer Forensics played a major role during the investigation.…

    • 720 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Computers are prevalent in every aspect of life. Computers vary, and can be in the form of a smartphone and personal digital assistant (PDA) or the form we are typically more familiar with, the laptop and desktop computer. Computers are generally present at almost every crime scene, thus the importance of having a well-equipped forensic toolkit. The research conducted to write this paper will scrutinize various commercial forensic packages that would be used to collect digital evidence of child abuse and exploitation, domestic violence, and gambling, keeping in mind digital evidence can be extracted from more than just computer hard drives and mobile phones. Digital evidence can also be extracted from a PDA, a compact disc or a secure digital…

    • 168 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Digital Evidence

    • 640 Words
    • 3 Pages

    A big concern around the collection and analysis of digital evidence is when an executed search warrant becomes a general warrant. Digital evidence is scattered within a computer surround by data that is considered to be protected documents. Because of this fact digital evidence collection and analysis can turn a warrant into a general warrant. This is a major problem for law enforcement because it means that whole cases could be thrown out, or criminals could end up back on the street. Many people have tried to determine what the best course of action is to try and avoid general warrants with computers.…

    • 640 Words
    • 3 Pages
    Improved Essays