Verified Document

Computer Crime And The Electronic Crime Scene Term Paper

¶ … computer related data on a forensic level. With new advances in technology, there are new opportunities for criminals to commit crimes online and through hacking into computer systems. These crimes committed are often very complex, and take special techniques in order to collect enough evidence to suggest a suspect or even the presence of a crime itself. The paper then goes on to discuss the sensitivity of electronic evidence and the process of collecting, documenting, examining, and packaging anything found in a scan of electronic devices by forensic investigators. The computer age has brought with it a whole new host of problems for law enforcement. According to the research, "the Internet, computer networks, and automated data systems present enormous new opportunity for committing criminal activity," (U.S. Department of Justice, 2013, 6). Many electronic devices are becoming facilitators for electronic crime. Often, hackers and other criminals use computer systems and the Internet in order to commit crimes against both individuals in larger organizations. Crimes committed digitally include things like auction fraud, computer intrusion, economic fraud, e-mail harassment, extortion, identity theft, and software piracy, among many others (Protext International, 2003). Personal consumer products, like desktop, laptops, and tablets can all be used in digital crime. Yet also, larger electronic systems in business or enterprise operations can also be sources of digital crime. Thus, towers, modular racks, minicomputers, and mainframes can all be where evidence is also located (Protext International, 2003). Additionally, access control devices can also contain evidence, like smart cards, dongles, and biometric scanners (Protext International, 2003). Even telephone switching systems, answering machines and fax machines can all contain hidden data that suggests evidence of the digital crime. Unfortunately, as technology advances so do crimes. Forensic investigators often retrieve sensitive information to use against the initial user. In order to combat this type of crime, investigators need a whole new set of skills in the digital realm. Electronic crimes are still crimes, and thus law enforcement must treat them as though. Thus, "the law enforcement...

Department of Justice, 2013, 16)
A lot of the evidence left behind in electronic crime is actually latent. This means that there is some residual evidence of the crime committed because it was at some time stored or transmitted by a computer or other electronic device. Thus, "electronic evidence is latent evidence in the same sense that fingerprints or DNA evidence are latent. In its natural state, we cannot see with contained in the physical object that holds her evidence," (U.S. Department of Justice, 17). Special skills and processes are needed in order to uncover the evidence that remains on a computer's hardware or other electronic device. Still, new devices and processes are being designed in order to combat digital crime. The research suggests that "cloud computing brings opportunities for network forensics tracing Internet criminals in a distributed environment" (Fu et al., 2010, 1). The new developments of cloud computing bring new potential for forensic evidence on a larger scale, like never before seen any evidence of computer crimes.

Moreover, electronic evidence is very sensitive. Unfortunately, "it can be altered, damage, or destroyed by improper handling or in proper examination. For this reason, special precautions should be taken to document, collect, preserve, and examine this type of evidence" (U.S. Department of Justice, 17). Very serious forensic processes are required in order to collect electronic data that is usable in a court of law. In fact, there are four specific phases that are involved in the forensic investigation of electronic evidence. This includes collection, examination, analysis, and reporting. Moreover, electronic evidence can also be time sensitive. It may have certain aspects that you raise or eliminate incriminating evidence after a certain amount of time or after the evidence is written over with other data (Protext International, 2003). Even "components such as keyboard, mouse, removable storage media, and other items may hold latent evidence such as fingerprints, DNA, or other physical evidence that should be preserved" (National Institute of Justice, 2013). As such,…

Sources used in this document:
References

Backus, W.D., & Chapian, M. (2000). Telling yourself the truth (20th ed.). Minneapolis, MN: Bethany House Publishers.

Adams, J.E. (1986). How to help people change. Grand Rapids: Zondervan Publishing House.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensics Case Study
Words: 2206 Length: 8 Document Type: Research Paper

Computer Forensics The issue at hand involves the examination of a scene from an office space within Widget Corporation. We find that this is the assigned office for a Mr. Didit. The information we have at hand is digital -- a photograph taken from an approximate distance of 3 feet from the occupant's desk. Using the photograph, we find that there are a number of electronic and non-electronic devices and our

Securing the Scene the Objective of This
Words: 641 Length: 2 Document Type: Essay

Securing the Scene The objective of this study is to develop a plan to approach and secure an incident scene and discuss the initial steps taken for an investigation while explicating the importance of creating an order of volatility by identifying the potential evidence that is most volatile and explain how evidence would be extracted. This study will identify the high-level steps that would be performed in collecting and analyzing the

Computer Forensics Digital Evidence
Words: 1511 Length: 4 Document Type: Research Paper

Forensics and Digital Evidence Forensics is a discipline which uses standardized techniques to pull apart an event, analyze what happened, and find a more accurate conclusion to the data analysis than just witness testimony. For centuries, lacking even rudimentary techniques like fingerprinting or blood type analysis, the legal system relied on confessions and witness testimony. We may turn to Ancient Greece for one of the first recorded examples of a type

Crime Workplace Is Not Safe From Numerous
Words: 3278 Length: 11 Document Type: Essay

Crime Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only

Crime in Chiccago Organized Crime
Words: 6162 Length: 20 Document Type: Research Proposal

The Prohibition made these mobsters however more daring and they begun to become involved in criminal operations that affected the American communities as well. Aside the Prohibition, it has to be stated that at that time, the United States was also facing severe economic problems. This was as such the moment organized crime was born. There were numerous nations conducting illicit operations during Prohibition, including the Irish, the Jews,

Has Computer Technology Enhanced Overall Efficiency of South Florida...
Words: 7588 Length: 28 Document Type: Term Paper

Criminal Justice Computers and Their Effects upon Police Efficiency Computer technology has transformed the modern day police department. Numerous systems now provide assistance in fields ranging from communication, to information storage and retrieval, and even allocation of personnel. Properly designed, computer applications save time and energy. They permit police officers to do the work they were hired to do - police. The various articles in this report both feature and support the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now