Verified Document

Computer Forensic Evidence Case Study

¶ … 2005, one file sent by the BTK killer to a Wichita television station led police to investigate Dennis Rader, a church president, and ended the 30-year murder spree of this serial killer. What evidence was pivotal in this case? Computer evidence has become increasingly pivotal in demonstrating the guilt or innocence of a suspect. This has recently been seen in the so-called BTK case. The case is testimony to the value of using computer evidence in modern forensic science. The BTK (Bind, Torture, Kill) killer was linked to eight murders in the 1970s and '80s and then resurfaced in 1991 and later in the 21st century. But when the killer Dennis Rader "came to his pastor in January with a floppy disk, saying he had the agenda of a church council meeting and needed to run off copies on a printer," the electronic imprint in the disk linked Rader to a message sent by the BTK to a Wichita TV station (Computer Trail Led To BTK Suspect, 2009, CBS). The BTK killer was known for the cruel and taunting message he sent to various media sources and this propensity of his was used to 'crack the case.'

Later, other evidence would link Radar to the crime, such as souvenirs he kept of his victims as well as other DNA evidence. But the critical link in the chain was the disk, which gave law enforcement (who had been following Radar) the ability...

Police had been communicating with Radar under the guise of media personalities. Radar left a disk with a message regarding his crimes. "Additional investigation showed the disk was opened in computers at the Christ Lutheran Church and Park City Community Public Library. The file document had been created on February 10, modified on the February 14, and printed that same day. It has been revised four times and was last saved by user 'Dennis.' Most of the information from the disk was found in its properties domain. Such information is automatically written by the software and is based on software registration information and the identity of the user logged on at the time of the activity on the document" (Williams & Landwehr 2006). Investigators were able to easily trace the disk to the church and spoke to the pastor. The pastor helped identify Dennis after investigators confiscated the church computer as evidence.
A dossier on Iraq's security and intelligence organizations was released to the public by Prime Minster Tony Blair as a Word document on the 10 Downing Street Website

(www.number-10.gov.uk) in February 2003. An analysis of the document by Dr. Glen

Rangwala, a Newnham College, Cambridge University lecturer in modern politics,

found that much of the material…

Sources used in this document:
References

Computer trail led To BTK suspect. (2009). CBS. Retrieved August 27, 2011 at http://www.cbsnews.com/stories/2005/03/04/national/main678013.shtml

Lewis, Mike. (2003). Government 'intelligence' report on Iraq revealed as plagiarism.

fas.org. Retrieved August 27, 2011 at http://www.fas.org/irp/news/2003/02/uk020603.html

A piece of plagiarism. (2003). BBC. Retrieved August 27, 2011 at http://news.bbc.co.uk/2/hi/uk_news/politics/2736149.stm
2011 at http://meria.idc.ac.il/british-govt-plagiarizes-meria.html
The Police Chief, 73 (12). Retrieved August 27, 2011 at http://policechiefmagazine.org/magazine/index.cfm?fuseaction=display&article_id=1065&issue_id=122006
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensics: Generally, Forensics Can Be Described
Words: 917 Length: 3 Document Type: Essay

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

Computer Forensic Tools: The Use of Computers
Words: 1019 Length: 3 Document Type: Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Forensics Evidence Elimination Tools the
Words: 790 Length: 3 Document Type: Essay

DIBS Forensic Workstation - Complete solution for problems faced by investigator of computer crimes; FREDDIE - Forensic recovery of evidence deice diminutive interrogation equipment; EnCASE - Fully integrated forensic application for Windows; and ProDiscover DFT - completely integrated Windows ™ application for the collection, analysis, management and reporting of computer disk evidence. Designed specifically to meet NIST (National Institute of Standards and Technology) standards. (Timberline Technologies, 2005) Harris (2005) states that if anti-forensic

Computer Forensics Case Study
Words: 2206 Length: 8 Document Type: Research Paper

Computer Forensics The issue at hand involves the examination of a scene from an office space within Widget Corporation. We find that this is the assigned office for a Mr. Didit. The information we have at hand is digital -- a photograph taken from an approximate distance of 3 feet from the occupant's desk. Using the photograph, we find that there are a number of electronic and non-electronic devices and our

Computer Forensics: Donning Your Detective
Words: 403 Length: 1 Document Type: Term Paper

Specialized forensic tools will be necessary to retrieve and analyze deleted, renamed and encrypted data that search tools will overlook. Further, forensic tools will help with complex information correlation. For example, to construct a timeline of events it may be necessary to tie network log stamps and data together with database access and usage logs. Reporting is the final phase of forensic investigation. Here, the article is weak, only recommending

Computer Forensics Digital Evidence
Words: 1511 Length: 4 Document Type: Research Paper

Forensics and Digital Evidence Forensics is a discipline which uses standardized techniques to pull apart an event, analyze what happened, and find a more accurate conclusion to the data analysis than just witness testimony. For centuries, lacking even rudimentary techniques like fingerprinting or blood type analysis, the legal system relied on confessions and witness testimony. We may turn to Ancient Greece for one of the first recorded examples of a type

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now