Verified Document

Computer Forensics Solving Crimes Using Term Paper

Such information is collected using packet sniffers which are programs that can access all information passing through a computer, and not only information particularly sent to the computer. The packet sniffer can either pick all the information, or just selected what is needed, and at the specific time when the information passed through the computer. This is then copied into a given memory. However, for the packet sniffers to be used, the investigators must have proper authorization depending on what they are investigation. This is to help protect the privacy of computer users. Computer forensics also works by disk imaging. This is a process where all information on a disk is copied in the form of an image and looked into. Disk imaging copies all files, both active and inactive, unlike when creating a backup where one only copies active files. One advantage of disk imaging is that it provides an extra source of information in the chance that the original disk is deleted...

This is because when analyzing the original data, anything is bound to happen.
Wiretapping is also used in not so complicated cases. Wiretapping can simply be done by hooking a recorder to telephone lines. In a much advanced situation, bugs are hooked to telephone lines. Bugs are devices that receive audio information and send it to a set destination via radio waves. The bug is hooked to the circuit of the telephone and therefore turns itself on and off depending on how the phone is being used.

The information collected in any of the above ways is then used to carry out investigations, and even presented in courts as evidence. It is however unfortunate that Computer forensics is rarely used when investigating crimes. Investigators and law enforcement agencies should embark more into this mechanism since in the present day; many activities are being carried out using computers and via the internet.

Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Use to Solve Crimes
Words: 1348 Length: 4 Document Type: Term Paper

Through these applications, corrections officers can also help reduce internal violence by providing better command and control. These interfaces include criminal intelligence information, such as photographs, fingerprints and documents. These information can be transferred or shared with institutions. These functions, in combination with location identification devices facilitate the tracking down of the movements of high-risk inmates or at-risk personnel in any facility or area. For parole and probation functions,

Product Placement Hawaii Five-0- Solving Crimes With
Words: 873 Length: 2 Document Type: Essay

Product Placement Hawaii Five-0- Solving crimes with Microsoft phones The CBS crime drama Hawaii Five-0 is a re-configured version of the old 1960s crime drama set in exotic Hawaii. In its newest incarnation, the special task force crime fighters use contemporary methods to track crime, including smartphones. Every episode begins with a new crime, which is then resolved by the end of the hour. Microsoft has negotiated a special product placement deal

Forensic Lab Forensic Crime Labs Are Important
Words: 975 Length: 4 Document Type: Essay

Forensic Lab Forensic crime labs are important institutions within the criminal justice system and each lab must be up to standard in order for this system to operate at a high and fair level. A good crime lab begins with a good design based on solid fundamentals and thorough planning. The purpose of this essay is to design a digital forensic crime lab that can be used in a university setting.

Forensics Evidence Elimination Tools the
Words: 790 Length: 3 Document Type: Essay

DIBS Forensic Workstation - Complete solution for problems faced by investigator of computer crimes; FREDDIE - Forensic recovery of evidence deice diminutive interrogation equipment; EnCASE - Fully integrated forensic application for Windows; and ProDiscover DFT - completely integrated Windows ™ application for the collection, analysis, management and reporting of computer disk evidence. Designed specifically to meet NIST (National Institute of Standards and Technology) standards. (Timberline Technologies, 2005) Harris (2005) states that if anti-forensic

Cyber Forensics and Legal Considerations
Words: 3240 Length: 11 Document Type: Term Paper

Cyber Forensics and Legal Considerations: Is the Law Keeping up with Advancing Technology? Introduction Because of the digital age and the possibilities it has introduced, digital forensics is now a necessity within the realm of law enforcement. However, there are numerous considerations to be made within this realm: constitutional law, property law, contract law, tort law, cybercrime, criminal procedure, evidence law, and cyber war. This paper will examine how the law is

Police and Forensic Science
Words: 2715 Length: 9 Document Type: Term Paper

Forensic Science and Police Work Forensic science has been playing a very crucial role in crime-solving activities of the investigative agencies for last many years. Its popularity has grown tremendously even though it cannot be trusted to formally indict someone. This is because while forensic evidence is considered important, there are certain specific problems attached with it, which can significantly limit the credibility of the results obtained from forensic examination. Forensic evidence

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now