Studyspark Study Document

Forensic Tools Computer-Based Forensics Tools Thesis

Pages:2 (605 words)

Sources:2

Subject:Science

Topic:Forensics

Document Type:Thesis

Document:#15473784


It is thus that technologies which work to yield that crucial data from the memory store of any such device have become so valuable to law enforcement in the age of terrorism. According to the Computer Forensics Tool Testing Program (CFTT), "a cellular forensic tool shall have the ability to logically acquire all application supported data elements present in internal memory without modification" (Ayers, 15)

This is to indicate that such technology should be able to hack into mobile communication devices without detection by the subject, making it a valuable tool in investigating crimes and preventing suspected crimes. The evaluate of its requirements is produced by the CFTT, which is an organization that "provides a measure of assurance that the tools used in the investigations of computer-related crimes produce valid results." (Ayers, 6)

A major drawback of such technologies, and one that invokes a yet far more complex discussion concerning the philosophy of law enforcement both in light of recent challenges to national security and with respect to the availability of ever more powerful information gathering technology. In this case, the danger that the privacy of ordinary citizens could be compromised is considerable. The ability of such technology to gather information without detection denotes that without careful instruction and oversight, our law enforcement agencies may be seen as being in the possession of too great a forensics capability. As such technology becomes more readily available, so too must the regulatory oversight of its use become more normalized and effectively maintained by law enforcement culture.

Works Cited:

Ayers, R. (2008). Mobile Device Forensics-Tool Testing. National Institute of Standards and Technology.

Bourque, L. (2008). Five Essential Computer Forensics Tools. Enterprise it Planet.

Online at http://www.enterpriseitplanet.com/security/features/article.php/3786046


Sample Source(s) Used

Works Cited:

Ayers, R. (2008). Mobile Device Forensics-Tool Testing. National Institute of Standards and Technology.

Bourque, L. (2008). Five Essential Computer Forensics Tools. Enterprise it Planet.

Online at http://www.enterpriseitplanet.com/security/features/article.php/3786046

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Forensic Lab Forensic Crime Labs Are Important

Pages: 4 (975 words) Sources: 4 Subject: Education - Computers Document: #89844619

Forensic Lab Forensic crime labs are important institutions within the criminal justice system and each lab must be up to standard in order for this system to operate at a high and fair level. A good crime lab begins with a good design based on solid fundamentals and thorough planning. The purpose of this essay is to design a digital forensic crime lab that can be used in a university setting.

Studyspark Study Document

Computer Forensic Tools: The Use of Computers

Pages: 3 (1019 words) Sources: 1 Subject: Education - Computers Document: #42088103

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Studyspark Study Document

Computer Forensics Case Study

Pages: 8 (2206 words) Sources: 6 Subject: Education - Computers Document: #32424416

Computer Forensics The issue at hand involves the examination of a scene from an office space within Widget Corporation. We find that this is the assigned office for a Mr. Didit. The information we have at hand is digital -- a photograph taken from an approximate distance of 3 feet from the occupant's desk. Using the photograph, we find that there are a number of electronic and non-electronic devices and our

Studyspark Study Document

Computer Forensics: Donning Your Detective

Pages: 1 (403 words) Sources: 1 Subject: Education - Computers Document: #29572898

Specialized forensic tools will be necessary to retrieve and analyze deleted, renamed and encrypted data that search tools will overlook. Further, forensic tools will help with complex information correlation. For example, to construct a timeline of events it may be necessary to tie network log stamps and data together with database access and usage logs. Reporting is the final phase of forensic investigation. Here, the article is weak, only recommending

Studyspark Study Document

Computer Forensics Digital Evidence

Pages: 4 (1511 words) Sources: 4 Subject: Criminal Justice Document: #71682715

Forensics and Digital Evidence Forensics is a discipline which uses standardized techniques to pull apart an event, analyze what happened, and find a more accurate conclusion to the data analysis than just witness testimony. For centuries, lacking even rudimentary techniques like fingerprinting or blood type analysis, the legal system relied on confessions and witness testimony. We may turn to Ancient Greece for one of the first recorded examples of a type

Studyspark Study Document

Computer Science Defensive Response Strategy

Pages: 3 (802 words) Sources: 3 Subject: Business - Management Document: #84425547

These activities include securing the current computing environment which includes any current tools, patches, updates and best known methods. This represents the bulk of the cost effective security capabilities and facilitates better detection. Visibility to key areas and activities is vital. Effective monitoring to identify issues, breaches and attacks is necessary. This drives immediate interdiction by response capabilities. Efficient management of efforts to contain, repair and recover as needed

Join thousands of other students and

"spark your studies".