Studyspark Study Document

Computer Forensics Solving Crimes Using Term Paper

Pages:2 (668 words)

Subject:Technology

Topic:Computer Viruses

Document Type:Term Paper

Document:#23646832


Such information is collected using packet sniffers which are programs that can access all information passing through a computer, and not only information particularly sent to the computer. The packet sniffer can either pick all the information, or just selected what is needed, and at the specific time when the information passed through the computer. This is then copied into a given memory. However, for the packet sniffers to be used, the investigators must have proper authorization depending on what they are investigation. This is to help protect the privacy of computer users.

Computer forensics also works by disk imaging. This is a process where all information on a disk is copied in the form of an image and looked into. Disk imaging copies all files, both active and inactive, unlike when creating a backup where one only copies active files. One advantage of disk imaging is that it provides an extra source of information in the chance that the original disk is deleted or infected by viruses, or damaged in any other way. This is because when analyzing the original data, anything is bound to happen.

Wiretapping is also used in not so complicated cases. Wiretapping can simply be done by hooking a recorder to telephone lines. In a much advanced situation, bugs are hooked to telephone lines. Bugs are devices that receive audio information and send it to a set destination via radio waves. The bug is hooked to the circuit of the telephone and therefore turns itself on and off depending on how the phone is being used.

The information collected in any of the above ways is then used to carry out investigations, and even presented in courts as evidence. It is however unfortunate that Computer forensics is rarely used when investigating crimes. Investigators and law enforcement agencies should embark more into this mechanism since in the present day; many activities are being carried out using computers and via the internet.


Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Internet Use to Solve Crimes

Pages: 4 (1348 words) Sources: 3 Subject: Criminal Justice Document: #84583718

Through these applications, corrections officers can also help reduce internal violence by providing better command and control. These interfaces include criminal intelligence information, such as photographs, fingerprints and documents. These information can be transferred or shared with institutions. These functions, in combination with location identification devices facilitate the tracking down of the movements of high-risk inmates or at-risk personnel in any facility or area. For parole and probation functions,

Studyspark Study Document

Product Placement Hawaii Five-0- Solving Crimes With

Pages: 2 (873 words) Sources: 3 Subject: Education - Computers Document: #47100483

Product Placement Hawaii Five-0- Solving crimes with Microsoft phones The CBS crime drama Hawaii Five-0 is a re-configured version of the old 1960s crime drama set in exotic Hawaii. In its newest incarnation, the special task force crime fighters use contemporary methods to track crime, including smartphones. Every episode begins with a new crime, which is then resolved by the end of the hour. Microsoft has negotiated a special product placement deal

Studyspark Study Document

Forensic Lab Forensic Crime Labs Are Important

Pages: 4 (975 words) Sources: 4 Subject: Education - Computers Document: #89844619

Forensic Lab Forensic crime labs are important institutions within the criminal justice system and each lab must be up to standard in order for this system to operate at a high and fair level. A good crime lab begins with a good design based on solid fundamentals and thorough planning. The purpose of this essay is to design a digital forensic crime lab that can be used in a university setting.

Studyspark Study Document

Forensics Evidence Elimination Tools the

Pages: 3 (790 words) Sources: 2 Subject: Education - Computers Document: #55947555

DIBS Forensic Workstation - Complete solution for problems faced by investigator of computer crimes; FREDDIE - Forensic recovery of evidence deice diminutive interrogation equipment; EnCASE - Fully integrated forensic application for Windows; and ProDiscover DFT - completely integrated Windows ™ application for the collection, analysis, management and reporting of computer disk evidence. Designed specifically to meet NIST (National Institute of Standards and Technology) standards. (Timberline Technologies, 2005) Harris (2005) states that if anti-forensic

Studyspark Study Document

Cyber Forensics and Legal Considerations

Pages: 11 (3240 words) Sources: 11 Subject: Law Document: #74919824

Cyber Forensics and Legal Considerations: Is the Law Keeping up with Advancing Technology?
Introduction
Because of the digital age and the possibilities it has introduced, digital forensics is now a necessity within the realm of law enforcement. However, there are numerous considerations to be made within this realm: constitutional law, property law, contract law, tort law, cybercrime, criminal procedure, evidence law, and cyber war. This paper will examine how the

Studyspark Study Document

Police and Forensic Science

Pages: 9 (2715 words) Sources: 1+ Subject: Criminal Justice Document: #57733188

Forensic Science and Police Work Forensic science has been playing a very crucial role in crime-solving activities of the investigative agencies for last many years. Its popularity has grown tremendously even though it cannot be trusted to formally indict someone. This is because while forensic evidence is considered important, there are certain specific problems attached with it, which can significantly limit the credibility of the results obtained from forensic examination. Forensic evidence

Join thousands of other students and

"spark your studies".