Forensic Technology Essay

Improved Essays
Due to the recent uprise in pop culture and tv crime shows such as CSI: Crime

Scene Investigation, and books like The Girl With The Dragon Tattoo, the field of

Computer Forensics is no longer being put on the back burner. According to many

popular news outlets such as Forbes and Newsweek, the field of Computer Science is

expected to grow exponentially, leaving the the specialty of Forensic Science the need

to adapt with it. As long as technology has been at the base of human fingertips, there’s

always been substantial cases of fraud, network security issues, and online identity

theft. The field of Computer Forensics didn’t come into popularity until the 80’s and with

the rise of the .com era much computer evidence was used in
…show more content…
Like any crime, there’s specific procedures that law

enforcement must take to ensure the authenticity of the evidence being presented.

Many times, when a forensic specialist is presented with a computer or a ton of

computers with which to retrieve information, the most vital procedure is making sure

the computer is secure. Once this is done and no outside forces are a threat, the

the specialist then locates every file saved on the hard drive, including encrypted and

ones not yet overwritten. It’s also part of the job title to locate and retrieve files that may have been deleted as well as decrypt and get access to protected files. It’s very

important to get copies of all the documents and prepare a testimony in court. With

copies, the original computer and evidence stays intact completely reducing the

chances of admissible evidence. Acute attention to detail, patience, and precision

are good qualities to have when working in the field of Computer Forensics. Like

mentioned before, any analyst may be called in to analyze the hardware or hard drive

on many computers all simultaneously. Of course, with most of these cases the
…show more content…
People in the Computer Forensics field typically sport a Bachelors in Computer

Forensics or a related field such as Computer Science with some extra credentials

on the side. However, unlike very skewed jobs such as Forensic Accounting, and

Forensic Pathology, Computer Forensics is a little bit more lenient as far the as the

job qualifications are concerned. Sometimes a person either starts out as a IT

administrator or law enforcement agent and works their way into it. Some of the best

professionals in the field are self taught, it’s important that the individual have a clear

understanding of networking protocols, operating systems, various types of software,

and security breach issues. A clear criminal history is also important seeing as the

person can potentially be testifying against civil cases in court, anything can damage a

specialists credibility. In many cases, people within this field work in government

laborites and small law enforcement agencies. When working in an agency, it may be

a requirement that the individual be sworn in as a law enforcement officer first,

Related Documents

  • Superior Essays

    In the criminal justice field there are a number of jobs and one of those jobs is Computer Forensics. Now computer forensics is defined as the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible (forensiccontrol.com. n.d.). All of this is done by the use of detecting and prevention of a crime as well as in any dispute where some evidence may be stored digitally. Furthermore, they follow the same or similar processes as other forensic disciplines, and faces some if not all of the same issues (forensiccontrol.com.…

    • 1260 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The significant step taken by most of the Organizations or firms recently is the use of ethical hacking process or techniques to evaluate the success or failure of their current security measures. Ethical hacking is usually done by the computer professionals who legally break into the computer system to report the owners about the vulnerabilities found. This paper is based on the “Ethical Hacking”, which has now become an essential part of any business organizations, which needs to deal with high level of security and severe malicious…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Ethos, pathos, and logos really do make the FBI webpage very effective on the readers. Because the author has the knowledge, knowing who he/she is talking to, and how to use their words, the readers can leave the webpage with a new aspect on how careful they should be with their computers before they could be victims of cyber-attacks. With anyone using ethos, pathos, and logos, they could have articles just effective as the FBI…

    • 869 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Firewall Vs Firewall

    • 1167 Words
    • 5 Pages

    Computers have become widespread in the modern world. Almost everyone now owns a computer, unlike the past where only a few people used a computer. Computers have become a necessity due to their increased usage. More threats arise with the widespread usage of the computers and hence they should be protected from the malware attacks to make sure that they are safe and efficient. These malware attacks are caused by a third party trying to access personal data from the computer as people tend to use computers to save their personal information.…

    • 1167 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    While the first things that come to mind of a CSI are often murder scenes, it can also be things such as sexual assault cases. Being a CSI you are held to a high standard of honesty. One properly must follow all procedures, as well as accurately handling and processing evidence. While in most jobs one is held to a high standard, this one is especially important because one could improperly provide incorrect evidence, which could convict the wrong person of the crime (Crime Scene Investigator Career…

    • 1708 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    The forensic toolkit should be able to collect volatile and non-volatile data to ensure collection of all relevant information. Also, the digital forensics investigator should have a forensic laptop available to conduct investigations off site; as well as a hardware write blocker to ensure evidence is not altered. Furthermore, a disk imager and external hard drives should be available when an image is required of a digital…

    • 1243 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The ultimate goal of criminal investigation is to uncover the truth. (Swanson, Chamelin, Territo, & Taylor, 2012) As an investigator, there seems to be a million things one must learn. These lessons not only come from a classroom, they are also developed while working in the field. These well-defined elements and procedures will apply in one form or another to every case an investigator handles. It is important that these procedures are followed properly to ensure the integrity of the investigation is not…

    • 777 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Crime Technology

    • 1448 Words
    • 6 Pages

    Watch groups could form and individual people could be more aware of what is going on around them. State-of-the-art technology should be added to assist law enforcement since they cannot be everywhere at one time. In addition to high tech surveillance, new technologies and intelligence could be added to police departments and agencies. This could help survey the known criminals on the internet. Training officers to be able to keep up with the growing field of technology is important in finding and arresting criminals.…

    • 1448 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Confirmation Bias Essay

    • 2410 Words
    • 10 Pages

    The issue of confirmation bias is very important because it can happen even in our day to day lives but when it is in the legal system it can be very dangerous to the person that is in the hot seat. Confirmation bias can lead to things such as a false confession or a wrong eyewitness identification. If the police officer thinks the suspect is guilty even before conducting the interview process, they will most likely seek information that is incriminating towards the suspect (Hill, McGeorge, & Memon,…

    • 2410 Words
    • 10 Pages
    Superior Essays
  • Improved Essays

    If the chain of custody ever comes into question during a criminal proceeding, the reliability of evidence can be challenged, which can lead to a weakened case when the links cannot be established. The chain of custody begins at any crime scene, and usually started at the beginning. Every officer who comes in contact with crime scene evidence, from the initial investigating officer to the prosecutor who submits the samples during trial, should be well aware of what took place. Simple but critical procedures of having all forms of evidence such as proper labeling at the crime scene, a shoe, or a pair of glasses are immediately submitted to the crime lab. The importance of careful documentation on every individual evidence will ensure the chain of custody will not break to solve the crime well.…

    • 1421 Words
    • 6 Pages
    Improved Essays