Why Is Computer Forensic Analysis Important

Improved Essays
In a perfect world the need for determining the activity conducted in a network or within a computer would not be necessary; however, this is not a perfect world and there are times when it is imperative that the activity of a computer be monitored. Forensic analysis has been a central part of criminal investigations. Computers and digital devices have become a common component. According, to Fortune Subscribe “The Florida Computer Crimes Act of 1978 included legislation against the unauthorized modification or deletion of computer data; the Comprehensive Crime Control Act of 1984 included some provisions for the inclusion of computer activity in modern crimes; the Computer Fraud and Abuse Act in 1986 expanded that considerably”. There are several cases where Computer Forensics played a major role during the investigation. One main particular case that I can remember would be the Virginia Tech shooting, which took place in 2007. After investigation, investigators came to a conclusion that video games and a computer were the killer’s go to, …show more content…
It has helped them in so many ways to direct evidence of a crime, which is why this practice has become a integral part of many criminal investigations. According to the market research firm IBISWorld, the U.S. computer/digital forensics industry is expected to grow at an average annual rate of 6.7% over the next five years, from $1.2 billion in revenues today to $1.7 billion by 2019. We live in a world that is based off of technology. People are so unaware of how investigators have the ability to find out anything they want to know, just by using a computer. Computer Forensics uses different command and tools to find out all that they need to know or want to know. The police are not allowed to search anyone’s electronic devices unless they have a warrant to search, but I’m sure that it happens

Related Documents

  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    They should not discount any electronic device because it seems like it would not have data. Sources that should be responded to are any electronic devices that contains data such as desktop computers, gaming systems, laptops, e-mail, any information system, financial information system, human resources information system, learning management system, Internet service, network, television, chat logs, images, etc. Preserving evidence should be in the forefront of the investigators. If the incident is from a Federal…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The NYC computer forensics investigative procedures contain eight stages with electronic tools that are used to support an investigation. The first step that is taken is obtaining a search warrant, & in order to do this there must be probable cause to present to a magistrate. How probable cause is identified is by an investigation, or information obtained in a legal standard& documented by the officer who is seeking the evidence, & he/she must prepare an affidavit that defines the area to be searched, & the evidence being sought (Volonino pp 56). The reason for obtaining a search warrant is so that a defendants Fourth Amendment is not violated.…

    • 652 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As such, any forensic analysis done on the image of the digital media shall be valid even after the consent was revoked. b) Search Incident to Arrest The legal authority for police to search a subject incident to arrest is a common law that recognizes the importance of police safety and the preservation of evidence (Scanlan, 2011). The general principles of searching a digital device incidental to arrest are: what is sought relates directly to the offence, and there is a reasonable prospect that police will find what they are looking for (Waldock, 2011).…

    • 1052 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Essay On 1984 Technology

    • 501 Words
    • 3 Pages

    They can find who did it and also they can track them easier. Now all markets, houses and big companies have cameras everywhere because if you have cameras it is not easy for someone to break in. Technology is highly changed in many different ways which you read above, cameras is one of the best ways to catch someone doing things they are not supposed to. Also Cellphones which in the article known as trackers can track you down where ever you’re at with no problems. Police officers, technology helps them out a lot which they use in crime scene.…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    I do know for a fact that most forensic software doesn't have the capabilities to scan the suspect's computer for vulnerabilities, which I do think it's what's lacking in digital forensic software. In my opinion, when a computer is vulnerable to remote code execution,…

    • 200 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Computer technology progressed rapidly since the 1900’s. Computers are no longer scarcely around, many people have them and use them on a daily basis. They have also become an important source of evidence in criminal activities. Computers are very helpful for homicide investigators, because they can discover whether methods on how to murder were researched on the internet, if anything suspicious can be found in emails, or if threats were made towards the victim prior to the murder. Since children can easily get on the computer to use the internet, it gives sexual predators an opportunity to seek out child victims online.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The methods or ways which law enforcement can determine whether or not person (s) who granted consent to search someone else’s computer are found in the federal case of “U.S. v. Smith,” which involves a “third-party” consent to search a computer that is “normally” used by the third-party and others. In Smith, police were contacted by Smith’s live-in girlfriend to report that she had found child pornography on Smith’s computer which they “shared.” At the appeal trial, Smith’s attorney argued that Smith’s girlfriend; while she lived with him, did not have the legal authority as stated by the Supreme Court’s (the Court) ruling on exceptions to the Fourth Amendment, to grant consent to the search of his computer. (Knetzger, Michael and Muraski, Jeremy, 2008) (p. 245)…

    • 1746 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Digital Forensics

    • 755 Words
    • 4 Pages

    In preparing for processing the potential crime/incident scene, I would have my digital forensics team to understand and perform the following tasks: identify for potential digital evidence, understand rules of evidence, prepare for the search and seize digital evidence, and to ensure proper storage/chain of evidence processes are properly documented and followed. Computers and digital media are progressively involved in unlawful exercises. The computer maybe contraband, products of the crime, an instrument of the offense, or just a storage that holds evidence of the offense. Investigation of any criminal activity may deliver electronic proof.…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    In order to ensure the safety of the citizens of the United States of America, the US government should be allowed to surveill its citizens under the correct circumstances. After the bombing of the World Trade Center in September of 2001, security measures have been put in place in order to prevent similar events from happening. A person’s digital property should be subject to the same rules and regulations as their physical property. Of course this doesn’t mean watching every waking move, like in George Orwell’s 1984, “Always eyes watching you and the voice enveloping you. Asleep or awake, indoors or out of doors, in the bath or bed- no escape.…

    • 1027 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Digital Court Cases

    • 588 Words
    • 3 Pages

    I was able to find several examples of court cases involving digital evidence and its admissibility in court, but the search for specific cases involving searches of seized or suspect digital media was little harder to come by. The laws have changed drastically over the last decade as digital information has become more prevalent in our daily lives. For example, most important court decisions involving digital searches happened within the last five years, which is just crazy considering digital data storage has been used to the point of being commonplace for twenty to thirty years. In 2000, United States v. Scott‐Emuakpor set the precedent when collecting digital evidence, and that was that it was only necessary for testimony of a witness who was present while data was collected from computers for it to be admissible as evidence. Sounds ridiculous in hindsight, know what we know now of the common knowledge of rights to digital privacy.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction I George Orwell’s 1984 is a precaution novel of today’s society. In the book, civilian’s lives are controlled, every move they make is monitored with surveillance technology. Today there is surveillance technology and as time goes by they are creating more. George Orwell explains how Big Brother has strict control over society just by the use of technology, in today’s society everyone is so revolved, who knows what is being exposed to our government. Surveillance/ Limitations II “ The telescreen received and transmitted simultaneously any sound that winston made, above the level of a very low whisper can be picked up by it.”…

    • 888 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    We might detest how technology can track our daily lives in ways that might be deemed as unethical to many of us. Yet, when it comes to the greater good technology does definitely aid. Looking back into history, the development of a variety of technological devices have improved our security. CCTV footage helps immensely with surveillance; it helps identify individuals, deter robbery and produce a safe environment for society. In addition, digital footprints while collected without our consent inevitably helps locate and single out individuals that have malicious intentions.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Forensic DNA is the process of using and collecting DNA from crime scenes to solve criminal investigations and to ensure accuracy and fairness in the Criminal Justice System. DNA profiling has grown significantly in the past years and has been extremely useful in identifying suspects, criminals and other people involved in the crime. If the suspect is unidentifiable, DNA evidence is compared to a DNA database to identify the criminal. DNA testing has both advantages and disadvantages many of which relate to ethical, emotional, economic and practicality issues. Research states that an increasing number of criminal investigations have used DNA testing to successfully identify the perpetrator.…

    • 1264 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays