22 Sep 2022

52

How to Recover Deleted Files and Forensic Computer Evidence

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 715

Pages: 2

Downloads: 0

Computer technology has presented opportunities for the law enforcement profession. This technology has also created challenges that the profession has been forced to respond to. To ensure that criminals do not use computer technology to further their agenda, the law enforcement community has developed guidelines and techniques for gathering computer evidence (NIJ, 2004). These guidelines shed light on the steps that law enforcement agents need to take as they gather and present evidence. Thanks to these guidelines and the techniques, it can be hoped that computer technology will enhance operations instead of being exploited for criminal activities.

The National Institute of Justice developed guidelines that are intended to facilitate the collection of computer evidence. Among other things, these guidelines shed light on the crucial elements of the computer forensic process. Evidence assessment and evidence acquisition are some of these elements (NIJ, 2004). Essentially, evidence assessment is concerned with evaluating the evidence that has been collected for the purpose of establishing the next step that needs to be taken. On the other hand, evidence acquisition involves ensuring that the integrity of the evidence is not compromised (NIJ, 2004). This process requires that great care must be exercised to preserve evidence.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Evidence examination, documentation and reporting are other vital processes in computer forensics (NIJ, 2004). Once evidence has been gathered, it must be scrutinized. The examination enables officers to obtain key facts that can be used to build a case. With the evidence examined, the next step is documentation. This step involves recording the insights that have been gained from the evidence examination process. At this step, the official also needs to document the steps that they have taken in the entire computer forensic process (NIJ, 2004). When all this is done, the officer then reports to the concerned authority. It is important to note that the steps discussed here are not all-inclusive. An officer may take other steps as they deem fit as they seek to obtain computer evidence.

When a first responder arrives at the scene, there are a number of considerations that they need to make. The safety of those responding is one of the considerations that the first responder should make (NIJ, 2004). Child pornography, counterfeiting, computer intrusion and identity theft are some of the crimes that call for the application of computer forensic (NIJ, 2008). While these crimes do not usually pose a security threat, it is vital for the first responder to guarantee the safety of all those involved. Another consideration that the responder should make concerns the need for additional resources. Upon examining the scene, the responder may learn that additional resources are required (NIJ, 2004). The key facts at the scene are yet another consideration that the responder has to make. These facts range from the operating system being used to the people involved in the crime.

Timestamps are among the crucial items that aid computer forensic experts in executing their mandate. Essentially, timestamps record the time when an event takes place on a computer system. Creation date and modified date are two of the vital attributes that an expert can locate in a computer system (Vacca, 2009). As the name suggests, the creation date allows one to determine when a file was originally saved. On the other hand, the modified date offers insights regarding the times at which modifications to a file were made. These attributes can be used to determine the process that a file has undergone and to establish the actions of criminals.

In an earlier section, it was noted that documentation and reporting are among the key elements of the computer forensic process. As they document and report, officers need to maintain some common notes. Search authority, requests for assistance and custody documentation are among the notes that require proper maintenance (NIJ, 2004). These notes essentially lend authority and credibility to the investigative process. The dates when key actions were taken should also be documented. This enhances accountability. Other notes that the investigative officer should maintain include handling of evidence and the personal details of the investigator. The notes on these issues help to legitimize the investigative process.

The computer forensic investigation process is intricate and complex. Four main steps are taken in this process. The steps include evidence assessment, evidence acquisition, evidence examination and documenting and reporting (NIJ, 2004). Each of these steps has been explored in detail in an earlier discussion. These steps are vital as they enable investigators to collect and analyze crucial computer evidence. It is therefore important for the investigator to exercise great care at each step.

References 

National Institute of Justice (NIJ). (2004). Forensic Examination of Digital Evidence: A Guide for Law Enforcement. Washington, DC: U.S. Department of Justice Office ofJustice Programs.

National Institute of Justice (NIJ). (2008). Electronic Crime Investigation: A Guide for First Responders, Second Edition. Washington, DC: U.S. Department of Justice Office ofJustice Programs.

Vacca, J. R. (2009). Computer and Information Security Handbook. Burlington, MA: Morgan Kaufmann.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). How to Recover Deleted Files and Forensic Computer Evidence.
https://studybounty.com/how-to-recover-deleted-files-and-forensic-computer-evidence-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Texas Roadhouse: The Best Steakhouse in Town

Running Head: TEXAS ROADHOUSE 1 Texas Roadhouse Prospective analysis is often used to determine specific challenges within systems used in operating different organizations. Thereafter, the leadership of that...

Words: 282

Pages: 1

Views: 93

The Benefits of an Accounting Analysis Strategy

Running head: AT & T FINANCE ANALLYSIS 1 AT & T Financial Analysis Accounting Analysis strategy and Disclosure Quality Accounting strategy is brought about by management flexibility where they can use...

Words: 1458

Pages: 6

Views: 81

Employee Benefits: Fringe Benefits

_De Minimis Fringe Benefits _ _Why are De Minimis Fringe Benefits excluded under Internal Revenue Code section 132(a)(4)? _ De minimis fringe benefits are excluded under Internal Revenue Code section 132(a)(4)...

Words: 1748

Pages: 8

Views: 196

Standard Costs and Variance Analysis

As the business firms embark on production, the stakeholders have to plan the cost of offering the services sufficiently. Therefore, firms have to come up with a standard cost and cumulatively a budget, which they...

Words: 1103

Pages: 4

Views: 180

The Best Boat Marinas in the United Kingdom

I. Analyzing Information Needs The types of information that Molly Mackenzie Boat Marina requires in its business operations and decision making include basic customer information, information about the rates,...

Words: 627

Pages: 4

Views: 97

Spies v. United States: The Supreme Court's Landmark Ruling on Espionage

This is a case which dealt with the issue of income tax evasion. The case determined that for income tax evasion to be found to have transpired, one must willfully disregard their duty to pay tax and engage in ways...

Words: 277

Pages: 1

Views: 120

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration