Computer Forensic Investigation

Great Essays
In computer forensic investigation, the first pro-active step is that of acquisition. However, the method used for data acquisition by a forensics investigator plays a major role in influencing the admissibility of electronic evidence to be used in a court or law, or the reliability of any other relevant information required when dealing with computer forensic cases at the organizational level (Dykstra & Sherman, 2012). Different data acquisition techniques allow for the recovery of electronic data from devices like hard drives, databases, web server, internet sites, e-mail servers, zip drives, back-up storage media, and personal digital devices like digital cameras and phones (Chu, Deng & Chao, 2011). The purpose of this paper is to analyze …show more content…
This can be attributed to the fact that it allows for faster acquisition of data, as well as it eliminates common errors of transcription by ensuring correctness and meaningfulness of the acquisition method to be used. It’s also necessary to validate data acquisition since this guarantees accuracy and consistency of the data to be acquired as described by Chu et al. (2011).
Failure to validate data acquisition not only makes data acquisition slow, but also increases the chances of data modification. Therefore, it makes it somewhat hard for the data to be verified or be admissible in a court of law, for instance. Essentially, there are several validation techniques in data acquisition, such as MD5, CRC-32, SHA-1, and SHA-512, which can be used in operating systems without built-in hashing algorithm tools designed for computer forensics (Chu et al.,
…show more content…
For example, when live acquisition technique is used, procedures that comprise of documenting all steps recommended for the technique applied, followed by imaging of the target evidence using a selected tool as long as the tool has full access to the system (Dykstra & Sherman, 2012). If the imaging software or tool cannot access the system, then decryption ought to be undertaken using the most appropriate decryption technique in order to remove cryptographic keys without modifying the data. A good example of a tool that can be used in acquisition for Linux data acquisitions is the Idetect, a tool that attempts to extract detailed information about active processes in a target storage system. Another forensic data acquisition tool is the Windows Memory Forensic Toolkit (WMFT), which allows for the analysis and acquisition of image files running Windows XP and Windows 2003 (Guo, Jin & Shang,

Related Documents

  • Superior Essays

    Log files created by the web browser also store web browsing history information such as web pages visited and accessed along with dates and times of those visits (Ravi, 2007). The registry can provide evidentiary value to the digital forensic investigator as well in relation to web browser artifacts. Items such as passwords, default search provider and search engine, and the URLs typed into the web browser address bar are stored in the NTUSER.DAT file located within the NTUSER.DAT hive in the registry. Twenty five URLs can be stored at one time in the NTUSER.DAT file and they are cycled out as new URLs are typed into the web browser.…

    • 661 Words
    • 3 Pages
    Superior Essays
  • Decent Essays

    1. From what sources might the incident response team gather evidence? The incident response team should be alert to any electronic devices as they begin gathering evidence from different sources. For example, they see a gaming system.…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Avmed: Forensic Analysis

    • 294 Words
    • 2 Pages

    In December of 2009 a company named AvMed, which is a Florida based not-for-profit health plan provider, had two laptops stolen (Anderson,2010; “We help our members”, n.d.). One of the laptops was recovered and it contained encrypted patient information. However, the second laptop was not encrypted and it contained names, Social Security numbers, addresses, birthdays and other healthcare information. Initial reports indicated a little over two hundred thousand clients were impacted, but a forensic analysis by Price Waterhouse Coopers revealed that the scope of the data breach may involve 1.2 million customers.…

    • 294 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    When it comes to criminal trials, there are many important pieces of evidence. Forensic Science: Evidence, Clues, and Investigation by Andrea Campbell, explains that forensic evidence uses sources such as fingerprints, hair particles, and mainly hard evidence. The story also explains that there are a couple downfalls when using this evidence. One main downfall falls heavily on the investigators who handle the substances. Even though they’ve collected hard, substantial, evidence, it is hard for the jury to trust the hands that dealt with it.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    DEA Forensic Analysis

    • 525 Words
    • 3 Pages

    At times, there are certain cases where investigators run into dead ends or obstacles depending on the circumstances at hand. As in this case of the kidnapping and murder of special agent Enrique Camarena and Captain Alfredo Zavala, the DEA and forensic investigators faced many hurdles. The processing of significant evidence was constantly put to a halt. The DEA and investigators were unable to do things in the way that they wanted to. This put them through many challenges and hurdles in the investigative process.…

    • 525 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Natural Driving Quiz

    • 462 Words
    • 2 Pages

    Simply formatting a hard drive 2. __________________________ is a list of people who have had physical possession of the evidence. Chain of custody 3.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    a) Consent to Search In R v. Wills (1992) the court found the following criteria necessary for a valid consent search: 1. There was consent, expressed or implied; 2. The giver of the consent had the authority to give the consent; 3. The consent was voluntary (not police coerced); 4. The giver of consent was aware of the police conduct; 5.…

    • 1052 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The fourth amendment protects all citizens from illegal searches and seizure of their possessions and property. The Weeks v. United States case law was established in 1914, which consisted of police entering Fremont Weeks home and illegally seizing evidence of Weeks transporting lottery tickets through the mail. This case is what brought forth the exclusionary rule, which makes any evidence obtained during an illegal search and seizure possibly inadmissible in court. To uphold the fourth amendment, officers need a probable cause to justify the search of someone’s home and other property. To establish probable cause, officers need factual evidence that leads them to believe that the suspect has committed a crime.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In order to establish an effective forensic readiness plan in the private sector, three major requirements need to be fulfilled. The first requirement is appropriate technology. Technology is critical in helping the organisation obtain evidence, preserve and protect…

    • 843 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Essay On Dr. Henry C. Lee

    • 301 Words
    • 2 Pages

    Henry C. Lee is one of the world’s most renowned forensic scientists. His career includes the discovery of a new method in DNA extraction and a procedure that aides in developing footprints. Dr. Lee has worked on several high profile cases, most notably the O.J. Simpson trial where his testimony helped solidify the defense theory that there were multiple attackers. Currently Dr. Lee is the director of Forensic Research and Training, he has written over 40 books, and is the founder of the Henry C. Lee Institute of Forensic Science. Dr. Lee’s contributions to the field of forensic science have spanned over forty years and have been instrumental in forensic science being recognized within the judicial system and law enforcement as a credible means of investigating…

    • 301 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Fire scenes are different than the regular crime scenes because as for the evidence of a fire scene was most likely destroyed or burned, the person who committed the crime does not usually the crime scene. This makes it a little more difficult to piece together the suspect and convict someone of their crimes. 2. The blast effect is what happens when a rush of gasses from the source of the bomb blows outward.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This tool is useful because it will allow the plaintiff or the defendant to demand records. Inspection of property and things this tool is useful because it allows the plaintiff or the defendant to gain access each other property or tangible items. For example, in an auto accident the plaintiff can have engineers do tests on the defendant's vehicle for new evidence. The results could possibly change the outcome of the…

    • 925 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Throughout many centuries, it has always been important to know how and why crimes have been committed. Criminal Investigators have participated in solving countless of cases in order to prevent future crimes. Many victims and those accused, which are known to be innocent, have been assisted to receive justice due to the help from the system. This job profession is just as important as any others in the federal justice system. Forensics investigation is a standard scientific application to criminal investigations, also an execution to law procedures ensuring evidence to present in court.…

    • 1540 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Digital Evidence

    • 640 Words
    • 3 Pages

    A big concern around the collection and analysis of digital evidence is when an executed search warrant becomes a general warrant. Digital evidence is scattered within a computer surround by data that is considered to be protected documents. Because of this fact digital evidence collection and analysis can turn a warrant into a general warrant. This is a major problem for law enforcement because it means that whole cases could be thrown out, or criminals could end up back on the street. Many people have tried to determine what the best course of action is to try and avoid general warrants with computers.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Ryan Smith12/12/17Forensics Final Project Part 1 Task 1) What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation? The Nature of the alleged crime is unauthorized access to 3 photos that belong to Brendan Oliver. The photos were stolen and are being sold without Mr. Oliver’s consent. The nature of the crime influences a prospective investigation because the photos contained some sensitive nature.…

    • 711 Words
    • 3 Pages
    Great Essays