Our world today is being dominated by the proliferation of technologies in a pace nobody can imagine. Every aspect of our society is now affected by the advancement of these phenomena which includes computers doing a lot of things in businesses, basic services and other important details in our society. One important facet benefited by these mainframe structures is the law enforcement organization. Such advantages include the speed of transmission of data, added security and storage of evidences, and others that improve the process of law enforcement.One feature applying computer systems in the law investigation is the computer forensics.
Computer forensics is the acquirement, assessment, and treatment of information found on workgroups that concerns a criminal inquiry. It employs science in establishing facts that will help in the exploration of evidences relevant to a particular scenario.
...Before, there is a hard time gathering evidences that would support the prosecution regarding a particular crime committed.In the advent of technology, this problem was resolved by applying forensics augmented to computer systems and evidences like DNA (DeoxyriboNucleic Acid), blood samples, and other physical evidences were now treated better to serve as a concrete proof in the determination of a case.
Also, rescuing files that were deleted or damaged can also be done and these were already utilized to charge criminals with appropriate cases. Moreover, computer forensics is made in a manner that holds fast to the basic principles of evidence that are acceptable in a court of law.Threats on the evidences are always present like bugs, viruses and others that degrade the data so exceptional care should be applied when managing records of proof. These requirements were attained and maintained
through different standards applied by the concerned agencies of the government.
One is the proper evaluation of equipments used by subjecting it to a series of tests to verify the accuracy of the results acquired through the apparatus under analysis. An upcoming feature in the field of computer forensics is on the handheld devices which include PDA, cellular phones and other portable electronic devices. It is assumed that crimes in the present and in the coming future will be committed using these gadgets. Given the challenges in dealing with these handy devices, like data unpredictability, hardware diversity, interfacing with other devices, synchronization with other equipments and other serious problems which hinders the investigation, it is believed that there would be a particular solution to be able to deal with these portable gadgets.
Knowing its system architecture is one key in solving those issues presented in processing investigations involving these moveable devices.A model was formulated to overcome the major flaws in digital forensics concerning these gadgets. First is the preparation stage, wherein a careful perception on the nature of the offense is made. Familiarity with a variety of portable devices, its peripherals, and further specific concern will be of great help. Critical preparation of tools and in depth training of investigators is also needed for a successful dealing with raw data. To sum it all, a detailed preparation stage enhances the value of evidence and reduces the perils associated with an inquiry.
The next phase is securing the crime scene. It is a standard operating procedure for any investigator to have total control of the scene over any intrusion coming from unwanted people. For example, the gadget must be
left in its existing condition until appropriate evaluation was made. Quality of evidence is very critical on this period and the main priority should be given at this stage in preventing the evidence from being tampered or corrupted. After that, scene assessment is to be made.There is a possibility that further evidences can be acquired other than the gadget itself like its peripherals and the like.
Performing groundwork discussion on the proprietor and user of these electronic apparatus or system officer can present important information resembling the principles of the structure, precautions, various functions present in the gadget, and other relevant details. The next part is disabling the communication features of the device under custody since this might lead to the overwriting of files and possible corruption of information.Afterwards, proper handling of the unstable data from the device should be taken into careful consideration. Corresponding forensic tools can be utilized to acquire the information from the mobile devices along with other instruments to obtain a more desirable result. Next is securing evidences from external media storages like memory sticks, flash cards and others.
Again, only forensic tools that passed the set of standards provided by the concerned agency should be used in acquiring such data to guarantee its admissibility in a court proceeding. If possible, there must be an exclusive area for the confinement of this hardware to preserve the evidences gathered. Proper labeling of these acquired devices should be followed before taking it into the forensic laboratory area. Afterwards, examination of evidences is next. This segment engages in examining the contents of the collected evidence by forensic specialists and digging up information, which is critical for
confirming the case.
Subsequent stages involve the analysis of data obtained, which is a more detailed, tedious treatment on the data being scrutinized. Next is the presentation of evidences to the concerned law enforcement officials’, where the complete examination results and analysis is reviewed to get a complete report. The last stage is the review of the whole process that took place before coming up with the report. This is conducted and evaluates the entire model for further modifications. Given all these detailed stages in conducting a law investigation process particularly computer forensics, it is imperative that the entire model use computers to further improve the whole procedure itself. It cannot pursue its objective without the utilization of this computer system since the structure involves electronics principles.
While there is a continuous progression in technology, particularly mobile devices, it is therefore necessary for the computer forensics people to continue exploring and improve as well. Furthermore, the proposed model should be consistently evaluated to ensure its viability in this fast-changing environment primarily caused by technology
References
- Heiser, J. G. & Kruse, W. G. (2002).
- Computer Forensics - Incident Response Essentials. Boston: Addison-Wesley
- Business Law essays
- Contract essays
- Consumer Protection essays
- Property essays
- Ownership essays
- Agreement essays
- Common Law essays
- Contract Law essays
- Justice essays
- Security essays
- Tort Law essays
- United States Constitution essays
- Crime essays
- Lawsuit essays
- Treaty essays
- Family Law essays
- Marijuana Legalization essays
- Constitution essays
- War on Drugs essays
- Court essays
- Jury essays
- Police essays
- Protection essays
- Community Policing essays
- Criminal Law essays
- Judge essays
- Lawyer essays
- Employment Law essays
- Copyright Infringement essays
- Injustice essays
- Intellectual Property essays
- Breach Of Contract essays
- Jurisprudence essays
- Social Injustice essays
- Juvenile Justice essays
- Internet Privacy essays
- Cyber Security essays
- Bill Of Rights essays
- Civil Liberties essays
- First Amendment To The United States Constitution essays
- Fourth Amendment To The United States Constitution essays
- Second amendment essays
- Animal Cruelty essays
- Law Enforcement essays
- Juvenile Justice System essays
- Surveillance essays
- Forensic Science essays
- Crime Prevention essays
- Criminal Justice essays
- Criminology essays