Anti Forensics

Decent Essays
The topic of anti-forensics is very important in the field of computer forensics and security because it deals directly with how to identify if a crime has occurred. Digital crime is very difficult to investigate and prosecute, mainly because investigators need to build their cases based on evidence left on computers. The main goal of computer forensic investigators is to reveal and connect evidence into one coherent statement revealing the whole nature of the crime. However, the main goal of computer anti-forensics is to hide or alter electronic evidence so that it cannot be used in any legal proceedings. Today, cyber criminals are aware of the forensic methods used by investigators and try to mask or destroy any trace of evidence they leave

Related Documents

  • Improved Essays

    Avmed: Forensic Analysis

    • 294 Words
    • 2 Pages

    In December of 2009 a company named AvMed, which is a Florida based not-for-profit health plan provider, had two laptops stolen (Anderson,2010; “We help our members”, n.d.). One of the laptops was recovered and it contained encrypted patient information. However, the second laptop was not encrypted and it contained names, Social Security numbers, addresses, birthdays and other healthcare information. Initial reports indicated a little over two hundred thousand clients were impacted, but a forensic analysis by Price Waterhouse Coopers revealed that the scope of the data breach may involve 1.2 million customers.…

    • 294 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Prong 2: The vast development of forensics since 1971 could now easily intimidate D.B. Cooper out of attempting this crime again. Technology back then was too underdeveloped to catch a calculated criminal like D.B. Cooper. DNA wouldn’t be used forensically for until nearly 15 years after the hijacking. Had this technology been around, D.B Cooper would be rotting in jail as we speak.…

    • 388 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    DEA Forensic Analysis

    • 525 Words
    • 3 Pages

    At times, there are certain cases where investigators run into dead ends or obstacles depending on the circumstances at hand. As in this case of the kidnapping and murder of special agent Enrique Camarena and Captain Alfredo Zavala, the DEA and forensic investigators faced many hurdles. The processing of significant evidence was constantly put to a halt. The DEA and investigators were unable to do things in the way that they wanted to. This put them through many challenges and hurdles in the investigative process.…

    • 525 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Hash values were used during different phases. First, during the computer forensic examination procedure, the hash value is exhausted to guarantee that the analyzed copy has not been modified. A hash value is acquired of the imaged copy previous to the examination of data. c. Another purpose for hash values can be exploited to authenticate testimony presented in court testimony. One opinion noted that a “hash value” could be exercised to validate an electronic document by distinctive means.…

    • 1217 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The BTK was a very good but sloppy serial killer and it’s only because the lack of modern forensic technology that he was able to kill so many people. He knew not to leave finger prints but left DNA at almost every crime scene. DNA testing in the 1980s was relatively new and took a large sample to create a DNA profile and unlike today where the tests can be done within a day, there weren’t as many crime labs that could process the DNA. The Crime Scene investigators had a lot of evidence to process because the killing spread across the entire house.…

    • 516 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Computer forensics is the preservation, acquisition, extraction, analysis, and interpretation of computer data. The ultimate goal of computer forensics is to identify, collect, preserve, and analyze the data that has been collected to use in a legal case. A lot of devices are capable of storing…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Secondly is to protect and secure the useful promising information that is relevant to the computer. An investigator should ensure that no available evidence are damaged, destroyed, or contaminated, and no possible computer virus is brought in to the suspect computer during the forensic inspection. Information represented by physical items, such as computer hardware and printed files, can be described easily by correctly following traditional physical evidence procedures. The actual challenge comes from acquiring evidence stored in these physical items, such as hard drives, CDs, DVDs, zip disks, or floppy disks. All data residing in the suspect computer’s hard drives and disks need to be protected from any potential evidence and this has…

    • 211 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Forensic Scenarios

    • 529 Words
    • 3 Pages

    Stoiloff supported the need for scientific integrity and support for forensics. She has also emphasized the need for resources to help create new forensic technologies. She explained the importance of higher education in forensics and that the media portrayal of forensics is misleading and even wrong at times. Her testimony also spoke to the need of leadership as well as funding for the forensic community. The amount is large, congress has allocated one billion just for DNA backlogs so much more would be needed to truly make the forensic discipline better in all the areas needed.…

    • 529 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    1. Fire scenes are different than the regular crime scenes because as for the evidence of a fire scene was most likely destroyed or burned, the person who committed the crime does not usually the crime scene. This makes it a little more difficult to piece together the suspect and convict someone of their crimes. 2. The blast effect is what happens when a rush of gasses from the source of the bomb blows outward.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Digital Forensics

    • 755 Words
    • 4 Pages

    In preparing for processing the potential crime/incident scene, I would have my digital forensics team to understand and perform the following tasks: identify for potential digital evidence, understand rules of evidence, prepare for the search and seize digital evidence, and to ensure proper storage/chain of evidence processes are properly documented and followed. Computers and digital media are progressively involved in unlawful exercises. The computer maybe contraband, products of the crime, an instrument of the offense, or just a storage that holds evidence of the offense. Investigation of any criminal activity may deliver electronic proof.…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    On January 7, 2018 a murder had taken place in Baltimore, Maryland, and had been allegedly committed by Mr. Kevin Pearson. The victim a college student by the name of Jered Williams was out at a bar enjoying time with his friends during winter break. Mr. Pearson and Mr. Williams had gotten into an altercation inside the bar which led to them to be thrown out. According to some witnesses Mr. Pearson went into his car, followed after Mr. Williams, and shot him in the back. Police had found Mr. Pearson in his car thirty miles from the scene.…

    • 331 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Digital Evidence

    • 640 Words
    • 3 Pages

    A big concern around the collection and analysis of digital evidence is when an executed search warrant becomes a general warrant. Digital evidence is scattered within a computer surround by data that is considered to be protected documents. Because of this fact digital evidence collection and analysis can turn a warrant into a general warrant. This is a major problem for law enforcement because it means that whole cases could be thrown out, or criminals could end up back on the street. Many people have tried to determine what the best course of action is to try and avoid general warrants with computers.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Digital Evidence Analysis

    • 593 Words
    • 3 Pages

    Laptops, external storage devices, GPS locators, and desktop computers also come in various types. In the article, “Digital Evidence and the US Criminal Justice System” it states the listing and variety of products pose challenges because there is no uniform process to obtain information across makes and models, let alone different types of devices. Keeping archival information regarding older models of cell phones and its features, while keeping up to date with the rapid growth and diversity of technology, is also a challenge with digital evidence that scientists face in forensic laboratories (Houck & Siegel, 2015). Digital evidence can come from all individuals involved in the crime. This will confirm who the suspect and victim spoke with before the crime and the location of the suspect and victim before the crime took place.…

    • 593 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays