Digital Forensic Essay

Improved Essays
Introduction
What is digital forensic? According to Ian Rose (2015), “Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.” Is digital forensic important? Yes. Nowadays, Digital devices are everywhere in people’s daily lives, from computers, smart phones, gaming consoles to monitors, GPS, printers and so on. Any device that can store data might be a very important piece of evidence in digital forensic. Dave Evans (2011) has written that “Cisco IBSG predicts there will be 25 billion devices connected to the internet by 2015 and 50 billion by 2020.” in his report. Obliviously, digital forensic will be more and more important as
…show more content…
History
The world of computers has rapidly changed since 1975, which is the time the first personal computer ‘The MITS Altair 8800’ was introduced. Before that, computers were just some huge, expensive, heavy equipment. FBI Magnet Media Program, which is now called Computer Analysis and Response Team (CART), is created in 1984, during the next decade, many cyber forensic companies and organizations are founded, such as the International Association of Computer Investigative Specialists and Access Data. These are the symbols that digital forensic becomes a noticeable field to the public and the government.
In 2000s, digital forensics stepped into its developing phase. Convention on Cybercrime came in force in 2004, a year later, an ISO standard was published in 2005. The training of digital forensic specialist also drew attention from big companies, some companies which are developing forensic software began to offer certification programs.
As of 2015, digital forensic becomes an important filed in information security, and this subject has made a great contribution to the peace of the world.

Applications and famous
…show more content…
There are many cases that made use of computer forensic, such as Corey Beantee Melton’case in 2005. Another import branch is mobile device forensic, one famous case is the Brad Cooper in 2008. For both computer and mobile device forensic, they deal with logs such as browser history, email history, call log, and actual file in the device, like pictures and videos. For now, most important files are extracted from computers, however, as Danyl Bosomworth pointed out in his report about mobile marketing, smart phones are getting more and more usage comparing to computers, moreover, nowadays, any $300 worth smart phone is powerful enough for daily use, combining with cloud and internet, people are more likely to put personal data such as pictures, calendars or chat logs in their smart phones due to the easiness and convenience to use, which makes this mobile device forensic more and more important.
The rest of digital forensics’ branches are network forensics, database forensic, forensic data analysis. Scott Tyree who kidnapped a 13-year old girl on 2002, was arrested by the cooperation of a kind hearted man who contacted with FBI, FBI investigators and Yahoo. This case is a good example how different branches of digital forensics can collaborate for a greater

Related Documents

  • Improved Essays

    Police Technology

    • 1272 Words
    • 6 Pages

    Technological advances can be a huge advantage to the law enforcement community, but may also be a disadvantage as well. Technology. As the use of the Internet and other computer networks has grown rapidly in recent years, so has the opportunity for electronic crime. Unlawful activity can be committed or facilitated online. Criminals can trade and share information, mask their identity, identify and gather information on victims, and communicate with co-conspirators. Web sites, electronic mail, chat rooms, and file sharing networks can all yield evidence in an investigation of computer-related crime. Law enforcement officials know this and they have responded to the problem by using the same technology as the criminals. This paper will set…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Forensic Science Dbq Essay

    • 1049 Words
    • 5 Pages

    The discipline of forensic science has been under fire for quite some time now, and one can say that it is completely justified. Fraudulent and incompetent analysts, such as Annie Dookhan, have performed investigations in flawed crime labs, like that of the Baltimore crime lab, and through this process, have imprisoned the innocent, just as Cameron T. Willingham was falsely convicted. Issues occurred in all of these instances that allowed for the devaluing of the field of forensic science.…

    • 1049 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Van Dam Home Case Study

    • 665 Words
    • 3 Pages

    Forensic technologists play a critical crime scene role, carefully preserving the evidence digitally and physically while maintaining a custody chain for later usage by the prosecution. The best investigative timeline of this case with the greatest degree of details can be found on crime enthusiast Vance Holmes’ Trial Tracker website and the Murderpedia website (n.d.), and evidence specifically from the Reno & Figueroa 2002 Newsweek article.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Computer forensics is the preservation, acquisition, extraction, analysis, and interpretation of computer data. The ultimate goal of computer forensics is to identify, collect, preserve, and analyze the data that has been collected to use in a legal case. A lot of devices are capable of storing…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The advancement of forensic science has progressed immensely since its conception. The contributions it has made for the legal system are immense. One such example are its techniques used to extract DNA during forensic cases. DNA is considered to be one of the most well regarded and highly assessed sources of information (Gershaw et al., 2010). Another important development used during investigations is CODIS or the Combined DNA Index System. This is a computer database funded by the Federal Bureau of Investigation. It stores information such as DNA profiles which are inserted into the database by the local, state, and federal crime laboratories in the United States (Gershaw et al., 2010).…

    • 1040 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Digital Forensics

    • 755 Words
    • 4 Pages

    It is critical to precisely recode the area of the scene; the scene itself, the power state (i.e. on or off), computer conditions, storage media, remote network devices, cell phones, internet and network access, and other electronic devices. The investigators should know that digital evidence may be not in a close perimeter to the computers or different devices (Mukasey, Sedgwick, & Hagy, 2001). Digital evidence have to be handled carefully to protect the integrity of the evidence in both physical device and the data it contains. Chain of Custody form is an important form serving as identifies the evidence, identifies who has handled the evidence, records MD5 and SHA-1 hash value, and lists dates and times the evidence was handled. Moreover, evidence bags also include labels or evidence forms my team can use to document the evidence. All steps taken to acquire the data or changes of the evidence must be documented, including what and why the changes are made. One may need to prove the integrity of the evidence in a court of law (Ryder,…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Forensic Evidence Essay

    • 1578 Words
    • 6 Pages

    In the criminal justice world, the theory of criminal investigation is laid out in a way that seems to be the same for every situation, but that is not the case in all cases. In some cases, the process has to be critiqued to fit the situation. In the world we live in we criminals are unfortunately getting better and better at committing crimes with little trace. People believe that the information investigators need are right their hands because of the CSI effect. This makes it harder and harder for criminal investigators to do their jobs and track down criminals because the public has this false since that they have magical technologies just like they have on the television. Although that would be awesome if someone of that technology was…

    • 1578 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Although there are many different branches in the realm of forensic science, forensic technicians are in the forefront of the field and others rely heavily upon their findings (Schneider 238). Many forensic technicians are classified as crime scene investigators. These technicians go to crime scenes to collect vital evidence and gather information on the victim and surroundings. When evidence is found, testing will be done in a lab to find information regarding the crime (“Forensic Services”). Other technicians, such as Jackie, hold a supervising position the laboratory. These technicians do a variety of different tasks such as testing evidence, running quality assurance checks on the technology, and guiding other technicians into finding results of a case (Lehman 107). According to Jackie, there is always something to be…

    • 1291 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    If I had a choice in what career field I wanted to go into, I would go into either forensics or law, which also work hand in hand. I’ve always been fascinated with helping people, especially in the forms of getting justice for those who deserve it. Ever since I was a young girl, I had a keen interest in how the human mind works and what causes people to act the way that they do, mainly in criminals. Because of this interest, I took a course in AP Psychology my junior year of high school, which sustained my attraction in wanting to go into forensics or law. In the summer of 2017, I was invited to attend a National Youth Leadership Forum conference dealing with the nation’s security in the units of intelligence, defense, and diplomacy. Here,…

    • 222 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Mueller III, former director of the Federal Bureau of Investigation (FBI) once said “there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” This is the new reality of today’s cyber world. With the ever increasing popularity of using virtual environments for businesses both large and small, using traditional method is no longer sufficient at combating cyber-attacks like the WannaCry virus. Digital forensic investigations techniques need to be altered to combat this new style of cyber-attacks. However, there are several challenges to the digital forensic investigative process that make the investigation process susceptible to incongruities, particularly during the legal process. There are several proposals that are considered to improve the digital forensic investigation process but essentially, to avoid massive attacks such as the ones these companies have faced, companies to need be proactive in their attempts to combat malicious activity in their digital environments.…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Despite my mother’s abomination towards anything related to forensics, because of-you know-the study of crime, guns, horrific injuries, and dead people is a little shocking, I was drawn towards it after lazily reading Wikipedia articles about it. Being an inquisitive and analytical person, my eyes had lit up reading those internet pages and forensics had caught my attention. Wanting to learn more, I asked my health science teacher about a possible way for me to pursue my interest through my school’s medical club, HOSA. It was an unexpected coincidence when she told me a competitive event was offered in forensic science; I immediately grabbed the opportunity and over the course of many months, studied the ins and outs of my forensics textbook in preparation for the competition.…

    • 497 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Loss Of Evidence

    • 1706 Words
    • 7 Pages

    My opinion has been that the intellectual property infringement which is on the rise globally must be dealt, and suspects must be prosecuted. This could be achieved by having private experts and law enforcers working together. I always recommend that forensic experts should involve law enforcement in a situation where search warrant and arrest warrant are necessary. I believe by having computer forensics expert witness working with police, they can make a lot of difference in the admissibility and acceptance of the evidence in the court of law in the cases of trade secrets and intellectual property violation. The work of a company forensic expert is to detect and prevent computer aided attacks; they should also ensure that digital evidence that is submitted to court in an event of prosecution is credible. A forensic experts can assist the attorney to explain to court on how obtaining forensic images on a digital device is crucial in solving source code…

    • 1706 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Cybercrime In Canada

    • 546 Words
    • 3 Pages

    In Canada to strengthen the security of already existing law and electronic devices vivid kinds of tools are being used. To implement national and international responses to collect electronic evidence in cybercrime activities Canada using wide range of tools. Following are the important national and international tools: [4]…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The American Academy of Forensic Sciences is a professional website that was founded in 1948. The purpose of this American Academy of Forensic Sciences community is to provide information towards leadership of science, and the knowledge about the legal system. This community was developed to inform and educated everyone about their knowledge about this program, and to help them gather information on that specific subject of forensic science. It is searching for people that will join their community. These people need to have, or had engaged in the field of the forensic science and these people should believe of contribuis tessential to their time to advance the science through videos, newspaper, and articles.…

    • 1192 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Secondly is to protect and secure the useful promising information that is relevant to the computer. An investigator should ensure that no available evidence are damaged, destroyed, or contaminated, and no possible computer virus is brought in to the suspect computer during the forensic inspection. Information represented by physical items, such as computer hardware and printed files, can be described easily by correctly following traditional physical evidence procedures. The actual challenge comes from acquiring evidence stored in these physical items, such as hard drives, CDs, DVDs, zip disks, or floppy disks. All data residing in the suspect computer’s hard drives and disks need to be protected from any potential evidence and this has…

    • 211 Words
    • 1 Pages
    Decent Essays