Digital Forensics

Improved Essays
In today’s society as we all know the use of digital technology is evolving everyday because not only are we surrounded by internet activities, but now we’re surrounded by a huge cesspool of digital technology. Just to name a few, digital technology includes but not limited to computers, CD’s and DVD’s, portable storage media and cell phones. When it comes to examining digital technology it can include anything from photos, video’s, text documents, Internet activity logs along with phone numbers or any other data that can be stored electronically.(Knetzger&Muraski,2008). Consequently, with the use of the digital world it has caught the attention of many criminals who are committing crimes against people such as: Child enticement, child pornography, …show more content…
With that being said, the purpose of writing this document will aide in helping to train patrol officers in how to do a complete analysis when collecting and analyzing digital evidence. The document that I have written for the training division includes the following types of computer forensic concepts which are write blocking, bit-by-bit or bitstream copying, hashing or hash valves, forensic analysis, indexing process and the recovering of deleted and encrypted files. These concepts are performed once all the material has been collected, documented, photographed, labeled and …show more content…
The third concept Hashing is basically “the mathematical analysis of the data that generates the drives unique string of characters that are based on files and the structure of the drive.”(Knetzger&Muraski,2008). Hashing can also be used on single files in order to check for identical ones. The standard hash software utility is known as the Message Digests 5 or MD5 which refers to analgorithm where it generates 128 bit string of characters and when performed on suspect’s disk then both the string of character and the string from the cloning drive must match and if the match this produces an exact bit-by-bit match.(Knetzger&Muraski,2008). Here’s an example of an MD5 valve for a single file; b017e028a96ca4fbb536e30f1cb834f8. The fourth concept Forensic Analysis is the process when all evidence is turned over to the forensic specialist who will then capture clones, recovers and analyzes all the data that has been seized from the suspect’s hard disk or any other data device that was seized and in addition making absolutely sure that there has been

Related Documents

  • Improved Essays

    Holmes/Scarpetta Project- The Valley of Fear What discipline was involved? Digital Forensics (cryptology)- The process of encrypting messages and examining digital media forensically to find, analyze, and present facts and opinions. What was the equipment used? The ciphers represent the pages of previous editions of Whitaker's Almanack.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Avmed: Forensic Analysis

    • 294 Words
    • 2 Pages

    In December of 2009 a company named AvMed, which is a Florida based not-for-profit health plan provider, had two laptops stolen (Anderson,2010; “We help our members”, n.d.). One of the laptops was recovered and it contained encrypted patient information. However, the second laptop was not encrypted and it contained names, Social Security numbers, addresses, birthdays and other healthcare information. Initial reports indicated a little over two hundred thousand clients were impacted, but a forensic analysis by Price Waterhouse Coopers revealed that the scope of the data breach may involve 1.2 million customers.…

    • 294 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    DEA Forensic Analysis

    • 525 Words
    • 3 Pages

    At times, there are certain cases where investigators run into dead ends or obstacles depending on the circumstances at hand. As in this case of the kidnapping and murder of special agent Enrique Camarena and Captain Alfredo Zavala, the DEA and forensic investigators faced many hurdles. The processing of significant evidence was constantly put to a halt. The DEA and investigators were unable to do things in the way that they wanted to. This put them through many challenges and hurdles in the investigative process.…

    • 525 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Natural Driving Quiz

    • 462 Words
    • 2 Pages

    Simply formatting a hard drive 2. __________________________ is a list of people who have had physical possession of the evidence. Chain of custody 3.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Unit 1 Discussion Board Featured in the winter 2016 issue of Context, a publication of the American Sociological Association, the article titled “Digital Punishment’s Tangled Web” is written by Sarah Esther Lageson. Sarah is in the Rutgers University-Newark School of Justice, where she studies how technology changes the law, criminal justice, and systems of American punishment and the effects it has on society. “I have studied the growth of what I call digital punishment by interviewing those who run criminal history and mug shot websites, by analyzing the content they produce, and by interviewing those working to clear their own criminal records through legal means even against the reality of an endless digital trail”. Sarah explains that…

    • 736 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Further proof is needed to see if there is or is not a link between the items. Forensic scientists then examine individual characteristics of firearms to assure or negate this possibility. Many firearms are built to the same specifications, so there is very little variation in makes and models of the same type, but, individual characteristics provide unique attributes to firearms and tool marks. These markings are accidental, or unintentional attributes left on the object during the manufacturing process. Examiners view striations and impressed marks on bullets to help with identification because they have the potential to be…

    • 1447 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Computer forensics is the preservation, acquisition, extraction, analysis, and interpretation of computer data. The ultimate goal of computer forensics is to identify, collect, preserve, and analyze the data that has been collected to use in a legal case. A lot of devices are capable of storing…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Digital Forensics

    • 755 Words
    • 4 Pages

    It is critical to precisely recode the area of the scene; the scene itself, the power state (i.e. on or off), computer conditions, storage media, remote network devices, cell phones, internet and network access, and other electronic devices. The investigators should know that digital evidence may be not in a close perimeter to the computers or different devices (Mukasey, Sedgwick, & Hagy, 2001). Digital evidence have to be handled carefully to protect the integrity of the evidence in both physical device and the data it contains. Chain of Custody form is an important form serving as identifies the evidence, identifies who has handled the evidence, records MD5 and SHA-1 hash value, and lists dates and times the evidence was handled. Moreover, evidence bags also include labels or evidence forms my team can use to document the evidence.…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Throughout many centuries, it has always been important to know how and why crimes have been committed. Criminal Investigators have participated in solving countless of cases in order to prevent future crimes. Many victims and those accused, which are known to be innocent, have been assisted to receive justice due to the help from the system. This job profession is just as important as any others in the federal justice system. Forensics investigation is a standard scientific application to criminal investigations, also an execution to law procedures ensuring evidence to present in court.…

    • 1540 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Digital Evidence

    • 640 Words
    • 3 Pages

    A big concern around the collection and analysis of digital evidence is when an executed search warrant becomes a general warrant. Digital evidence is scattered within a computer surround by data that is considered to be protected documents. Because of this fact digital evidence collection and analysis can turn a warrant into a general warrant. This is a major problem for law enforcement because it means that whole cases could be thrown out, or criminals could end up back on the street. Many people have tried to determine what the best course of action is to try and avoid general warrants with computers.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Coroner's Toolkit is a group of basically free tools designed by Wietse Venema and Dan Farmer to be used in the forensic analysis of a UNIX machine. There are several reasons as to why local law enforcement agencies. First, the Coroner's Toolkit is specifically designed to be used in cyber-crime investigation (Farmer & Venema, 2005). This is an exceptionally powerful suite and therefore proper training of UNIX is a major condition in order to manage the Toolkit. Another important reason for purchasing this toolkit is that it helps in reconstructing the activities of an intruder by inspecting the documented times of file accesses and recuperating erased documents.…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A specific problem that faces that criminal justice system is child exploitation in the age of technology. Child exploitation is a crime that has existed for millennia, but since technology has developed, the crime has grown exponentially. Traditionally a predator would have to target a family member or someone in the community as their pool of targets was relatively limited. However, the advancement of technology has made it easier for predators to not only collect and share paraphernalia, but it has also created a new pool of potential victims. To begin with, the definition of child pornography must be understood so the extent of how technology can contribute to its production can be understood.…

    • 1553 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    There are multiple stages of the criminal court process that create a burden of proof that contribute to criminal justice investigations. Every court process begins with a crime allegedly committed to determining its legal status. Law enforcement and detectives determine if the crime was illegal or legal due to the investigations. They investigate a crime by interviewing victims, witnesses, and suspects. They also gather physical evidence by taking pictures, fingerprint, and DNA samples.…

    • 1283 Words
    • 6 Pages
    Improved Essays