Computer forensics has become an increasingly important tool in the constant battle against cyber crime. Many national and international law enforcement agencies include speciality computer crime divisions to track down cyber fraudsters, hackers, stalkers, terrorists and pornographers. The agencies deploy computer forensics experts to gather evidence over the Internet and by examining computer hard drives seized during police raids. Although cyber crime experts constantly develop new techniques, four core principles remain at the heart of computer forensics.
Other People Are Reading
Computer forensics teams often work across national borders to track down and prosecute cyber criminals. This poses difficulties because legislation covering digital evidence differs between jurisdictions. Law enforcement agencies work together and with governments across the world to standardise the principles and practices of computer forensics, according to "Forensic Focus."
A core principle of computer forensics is the techniques for collecting digital evidence must not alter the data. For digital evidence to stand up in court prosecutions, the evidence must remain intact and unaltered as far as possible. Proof that computer files have been altered or deleted during the investigation can prevent successful prosecutions. The evidence presented to court must be the same as the evidence collected from the computer.
Digital evidence often passes through the hands of many investigating agencies during the process of data analysis. Careful documenting of all evidence handling is a key principle of computer forensics. Experts work together to ensure each agency fully documents handling and all analysis and testing of the digital evidence.
Protecting digital evidence from tampering or unauthorised access is vital to ensure successful prosecutions of cyber criminals. Following processing and analysis, digital evidence is carefully stored in a secure environment. A core principle of computer forensics is only personnel deemed forensically competent should access the original digital evidence during and after analysis.
- 20 of the funniest online reviews ever
- 14 Biggest lies people tell in online dating sites
- Hilarious things Google thinks you're trying to search for