Computer Forensics Research Paper

Improved Essays
Computer forensics started in the late 1970's when it was determined that there was evidence to be found on computers that could assist in the apprehension or conviction of a suspect. Since then there have been many different ideas as to what is considered the proper process of attaining the data and what is legal for either the government or corporations. Today, almost anyone that you meet will have a cell phone that is a considerably more powerful computer than the one that guided the Apollo space crafts to the moon, and because of this there is an incredible amount of data that could be used in an investigation to clear an innocent suspect or incriminate a guilty one.
The three best uses of criminal forensics, in my opinion, are; the murder

Related Documents

  • Improved Essays

    Avmed: Forensic Analysis

    • 294 Words
    • 2 Pages

    In December of 2009 a company named AvMed, which is a Florida based not-for-profit health plan provider, had two laptops stolen (Anderson,2010; “We help our members”, n.d.). One of the laptops was recovered and it contained encrypted patient information. However, the second laptop was not encrypted and it contained names, Social Security numbers, addresses, birthdays and other healthcare information. Initial reports indicated a little over two hundred thousand clients were impacted, but a forensic analysis by Price Waterhouse Coopers revealed that the scope of the data breach may involve 1.2 million customers.…

    • 294 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The NYC computer forensics investigative procedures contain eight stages with electronic tools that are used to support an investigation. The first step that is taken is obtaining a search warrant, & in order to do this there must be probable cause to present to a magistrate. How probable cause is identified is by an investigation, or information obtained in a legal standard& documented by the officer who is seeking the evidence, & he/she must prepare an affidavit that defines the area to be searched, & the evidence being sought (Volonino pp 56). The reason for obtaining a search warrant is so that a defendants Fourth Amendment is not violated.…

    • 652 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Prong 2: The vast development of forensics since 1971 could now easily intimidate D.B. Cooper out of attempting this crime again. Technology back then was too underdeveloped to catch a calculated criminal like D.B. Cooper. DNA wouldn’t be used forensically for until nearly 15 years after the hijacking. Had this technology been around, D.B Cooper would be rotting in jail as we speak.…

    • 388 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Laci Peterson was born, May 4, 1975 she passed away on December 24, 2004. Laci was an American woman who was the subject of a highly discussed murder case after she went missing while seven and a half months pregnant with her first child. Peterson was reportedly last seen alive on December 24, 2002. Apart from her husband, the last two people known to have spoken to Laci before she disappeared were her half-sister, Amy Rocha, and her mother, Sharon Rocha. Amy cut Scott's hair, with Laci present, on the evening of December 23, 2002.…

    • 700 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Computer forensics is the preservation, acquisition, extraction, analysis, and interpretation of computer data. The ultimate goal of computer forensics is to identify, collect, preserve, and analyze the data that has been collected to use in a legal case. A lot of devices are capable of storing…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Secondly is to protect and secure the useful promising information that is relevant to the computer. An investigator should ensure that no available evidence are damaged, destroyed, or contaminated, and no possible computer virus is brought in to the suspect computer during the forensic inspection. Information represented by physical items, such as computer hardware and printed files, can be described easily by correctly following traditional physical evidence procedures. The actual challenge comes from acquiring evidence stored in these physical items, such as hard drives, CDs, DVDs, zip disks, or floppy disks. All data residing in the suspect computer’s hard drives and disks need to be protected from any potential evidence and this has…

    • 211 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Forensic Science Dbq Essay

    • 1049 Words
    • 5 Pages

    The discipline of forensic science has been under fire for quite some time now, and one can say that it is completely justified. Fraudulent and incompetent analysts, such as Annie Dookhan, have performed investigations in flawed crime labs, like that of the Baltimore crime lab, and through this process, have imprisoned the innocent, just as Cameron T. Willingham was falsely convicted. Issues occurred in all of these instances that allowed for the devaluing of the field of forensic science. If a lab is faulty or fraudulent, it is likely for the analysts who work within it to be flawed as well, as the two are essentially a team.…

    • 1049 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a result of the Shadow Brokers’ breach, one strain of ransomware, WannaCry, spread worldwide in May 2017 hitting several targets that included public utilities and large corporations. It even attacked National Health Service facilities in Great Britain,…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Essay On Bullet Shooting

    • 824 Words
    • 4 Pages

    Once the scene is secured all physical evidence must be found, documented, identified, collected, photographed and preserved properly to ensure that there is no contamination. All evidence must be sent to the laboratory to be analyzed to determine what happened before and during a crime. Without the use of forensic science many crimes would go on solved and suspects can go free from committing crimes. The Advancement of technology in the 21st century with technology and science combined together has made it much easier for solving…

    • 824 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Abstract I responded to a homicide scene that took place at a nearby gas station/convenience store at 0300 hrs. When I arrived, I was immediately briefed about what has taken place at this scene. There was a mother, a child, and an employee that witnessed the event. I was also informed that there was also a deceased on scene.…

    • 951 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Forensic Science History

    • 996 Words
    • 4 Pages

    Forensic science dates back thousands of years. It dates back farther then 1248.It has become a major part of solving crimes. There are many different ways forensic science can help in todays time, some include, bullet comparison, fingerprints, toxicology, presumptive test for blood, presence of blood in a forensic context and photography for the identification of criminals. Without forensic science many cases would go unsolved for years. All it takes is dna, fingerprints, or some blood to solve a case, without forensic science that wouldn’t be possible.…

    • 996 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Have you ever watched 48 Hours? Or Law & Order? How about Forensic Files? Well, if you have, have you ever wondered how a person died? Or why they died?…

    • 1408 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In a trial, there are four main types of evidence that can be admitted into a case: testimony, circumstantial evidence, direct evidence, and real or physical evidence. Today, evidence usually comes from sources of the real of physical evidence such as bullets, body fluids, and fingerprints. Inside that category of evidence, there is a specific field called Forensic Science. According to “Forensic Science: Evidence, Clues, and Investigation” by Andrea Campbell, the physical evidence category, sometimes called hard evidence, is the best evidence to present in a trial dealing with a crime.…

    • 401 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays