scholarly journals Digital forensics and its role in promoting criminal prosecution

Author(s):  
Seyyed Sajjad Kazemi ◽  
Sajjad Heidari

Digital forensics is essentially synonymous with computer forensics, but the term "digital forensics" is generally used for the technical review of all devices that have the ability to store data. Today, digital criminology is challenged in cloud computing. The first problem is to understand why and how criminal and social actions are so unique and complex. The second problem is the lack of accurate scientific tools for forensic medicine in cyberspace. So far, no complete tools or explanations for criminology have been provided in the virtual infrastructure, and no training for security researchers has been provided in detail. Therefore, the author of the present descriptive-analytical research is based on library resources and using fish taking tools. To investigate suspicious cases related to cyberspace, criminologists must be well-equipped with technical and legal issues to deal with. In this article, we analyze digital criminology and its role in judicial law. The benefit of computer forensic knowledge is not only an indispensable necessity for security and judicial institutions, but also professional users and owners of computer systems, systems and networks must be fully aware of and properly comply with its legal and technical requirements.

2012 ◽  
Vol 25 (2) ◽  
pp. 121-136 ◽  
Author(s):  
Zaklina Spalevic ◽  
Zeljko Bjelajac ◽  
Marko Caric

Scientific-technological development, along with initiating integrative forces that offer improvement of the quality of human life, concurrently created prerequisites for individuals to exploit certain innovations for performing criminal activities. Modern criminals wander through electronic networks, and assisted by high technology, perform a variety of criminal acts and ?launder? large sums of money. Computer forensics is a technological, systemic control of the computer system and its content for the purpose of gathering evidence of a criminal act or other abuse that it has been used for. Digital forensics requires particular expertise that goes beyond traditional data collection, as well as employment of techniques available to the final user or system support personnel. In this context, this article examines principles, methods and procedures in mobile device investigation, which nowadays represent a multifunctional, powerful computer weapon, and considers the necessity to update concrete procedures in accordance with the development and growth of IT.


2012 ◽  
pp. 1221-1236
Author(s):  
Gregory H. Carlton ◽  
Hill Zhou

Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users’ concerns away from the physical location of system components and toward the accessibility of the system’s services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.


Author(s):  
Jolita Kančauskienė

Jolita Kančauskienė, a Prosecutor of the Criminal Prosecution Department, Prosecutor General’s Office in the Republic of Lithuania, examines the role and development of electronic evidence in criminal legal proceedings in Lithuania. Since the ultimate objective is to use evidence to prove or disprove disputed facts, electronic evidence must be obtained in compliance with existing legislation and best practice to ensure admissibility at trial. Index words: Evidence law, criminal procedure, Electronic evidence law and legislation, Lithuania


2020 ◽  
Vol 40 (3) ◽  
pp. 201-208
Author(s):  
Clifford B. Anderson

This paper provides a brief history of the Vanderbilt Television News Archive that was established in 1968 with the goal of recording and preserving national news programming on the three major networks at the time (ABC, NBC, and CBS). The archive has faced several challenges as it evolved (it now covers representative news from the Fox and CNN cable networks) - most notably financial and legal issues – who really “owns” the news? Even today archiving digital news remains financially and legally challenged as the number of news networks increase and privacy laws emerge, resulting in the creation of “piracy archives”. The author also touches on the many ongoing issues that need to be addressed; e.g. the number of copies to be created, the importance of metadata, the technical requirements, what qualifies for preservation, and the ever-present issue of sustainability.


2017 ◽  
Vol 1 (3) ◽  
pp. 108
Author(s):  
Muhammad Nur Faiz ◽  
Rusydi Umar ◽  
Anton Yudhana

Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.


Author(s):  
Jan Krasniewicz ◽  
Sharon A. Cox

In computer forensics, it is important to understand the purpose of evidence file formats to maintain continuity of acquired data from storage devices. Evidence file formats such as E01 contain embedded data such as cyclic redundancy check (CRC) and hash values to allow a program to verify the integrity of the data contained within it. Students in computer forensics courses need to understand the concepts of CRC and hash values as well as their use and limitations in evidence files when verifying acquired data. That is the CRC and hash values in evidence file only verify the acquired data and not the evidence file per se. This important difference in E01 files was highlighted by showing students an anomaly in E01 files where certain bytes can be changed in E01 files without detection by computer forensic software using the embedded CRC and hash values. The benefit to students is that they can see the advantages of self-verification and limitations of what is verified giving the opportunity for a deeper understanding of evidence files and good practice.


Author(s):  
Mohammad Zunnun Khan ◽  
Anshul Mishra ◽  
Mahmoodul Hasan Khan

This chapter includes the evolution of cyber forensics from the 1980s to the current era. It was the era when computer forensics came into existence after a personal computer became a viable option for consumers. The formation of digital forensics is also discussed here. This chapter also includes the formation of cyber forensic investigation agencies. Cyber forensic life cycle and related phases are discussed in detail. Role of international organizations on computer evidence is discussed with the emphasize on Digital Forensic Research Workshop (DFRWS), Scientific Working Group on Digital Evidence (SWDGE), chief police officers' involvement. Authenticity-, accuracy-, and completeness-related pieces of evidence are also discussed. The most important thing that is discussed here is the cyber forensics data.


2014 ◽  
Vol 496-500 ◽  
pp. 2208-2215 ◽  
Author(s):  
Zhong Yong Fu ◽  
Zhen Zhou Zhao

With the popularity of computer and network technology, information security problem is increasingly highlighted, and the computer related crime phenomenon more and more. Computer forensics to protect information security and to crack down on computer crime provides scientific methods and means, can provide evidence of the court need. This paper first gives the definition of computer forensics, and then introduces the features of computer evidence, principles and classification of computer forensics, finally describes the research status of computer forensics, points out the problems existing in the computer forensics and its development trend is forecasted.


Sign in / Sign up

Export Citation Format

Share Document