Computer Forensic in Law Enforcement: Tools and Technologies

Verified

Added on  2019/11/26

|5
|889
|401
Report
AI Summary
This report examines the evolution and application of computer forensics within law enforcement. It highlights the necessity of specialized tools, training, and technologies for investigating cyberattacks, emphasizing the role of scheduling software in crime-level investigations. The report details the evolution of law enforcement tools through national needs assessments, gap analysis, and research agendas. It identifies technological impediments in cyberattack investigations, extracting 44 requirements for investigators and mapping solutions using a gap analysis matrix. The report then discusses various computer forensic tools such as SANS SIFT, Pro Discovery, X-way Forensic, and Volatility framework, emphasizing their role in locating information, protecting evidence, and creating evidentiary reports. It explores how these tools aid in accessing deleted files, examining slack space, and searching data streams. The report also discusses the role of intelligence analysis and provides real-life examples of tools used in legal crime investigations, including DNA and bloodstain analysis. References to various research papers and publications provide further context and support the findings.
Document Page
Running head: COMPUTER FORENSIC IN LAW ENFORCEMENT
Computer Forensic in Law Enforcement
Name of the student:
Name of the university:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1COMPUTER FORENSIC IN LAW ENFORCEMENT
Evolution of computer forensic in law enforcement cases
In order to make investigation on computer forensic in enforcement cases, it is very much
necessary to utilize law enforcement tools and technologies for investigating cyber attacks. For
investigating cyber attack it is very much necessary to utilize specialized tools, training and
technologies as well. Different law enforcement scheduling software is also there those are
helpful for crime level investigation. Three main requirements those are associated to the law
enforcement tools and technologies are evolved through three steps such as:
1. A national needs assessment
2. Gap analysis report
3. National research and different development agenda
The law enforcement tools and technologies for investing the cyber attacks help to detail
the technological impediments those are facing the cyber attack investigation. Forty four
different requirements of cyber attack investigators are also extracted. With the help of gap
analysis matrix the need of the investigators and all the collected solution could be mapped
properly. Gap analysis is dependent on the existing solution that is helpful to address the need of
the investigators. Different computer forensic tools and technologies are there such as-
SANS SIFT
Pro discovery forensic
X-way Forensic
Volatility framework
Four of these tools are very much helpful for crime level investigation. These security
tools enable the computer professionals to locate different information on a computer disk and
Document Page
2COMPUTER FORENSIC IN LAW ENFORCEMENT
similarly it also helps to protect the evidence from the external attackers. It helps to create
quality evidentiary reports for the usage of legal proceeding also. Deleted files, slack place
examination and windows alteration data stream are allowed to be accessed with the help of law
enforcement forensic. File processing and even detail searching applications are also possible
with the help of law forensic tools and technology. If enough numbers of proofs are available
then only, the evidence can stand up in a court law. With the help of different tools potential
level problems can be encountered.
This particular tool is recommended by both the government and private organizations.
The combination of information and evaluation results as intelligence. The ways through which
the transformation cold be evaluated are named as law enforcement tools. The intelligence
analysis is all about decision making process and information evaluation. The benefits that are
generated from the forensic tools include support hashing of all files those allows comparative
filtering. Proper pathway locators can be selected with the help of forensic tools and on the other
hand, this tool also can be used for larger investigation.
From a real life investigation it has been found that, different tools are there those are
widely used in the legal crime investigation. The other tools those are used in crime investigation
include digital surveillance for Xbox, 3D Forensic Facial Reconstruction, Video Spectral
Comparator 2000 etc (Forensic-cases-murder, 2017). In the year of 2016, a guy was arrested for
a murder case and with the help of forensic tool, the DNA and bloodstains samples were
collected and he was found guilty.
Document Page
3COMPUTER FORENSIC IN LAW ENFORCEMENT
References
Al-Alawi, A. I. (2014). Cybercrimes, Computer Forensics and their Impact in Business Climate:
Bahrain Status. Research Journal of Business Management, 8(3), 139-156.
Cole, K.A., Gupta, S., Gurugubelli, D. & Rogers, M.K., (2015), January. A Review of Recent
Case Law Related to Digital Forensics: The Current Issues. In Proceedings of the
Conference on Digital Forensics, Security and Law (p. 95). Association of Digital
Forensics, Security and Law.
Dykstra, J. & Sherman, A.T., (2013). Design and implementation of FROST: Digital forensic
tools for the OpenStack cloud computing platform. Digital Investigation, 10, pp.S87-S95.
Flory, T.A.C., (2015). Digital forensics in law enforcement: A need based analysis of Indiana
agencies (Doctoral dissertation, Purdue University).
Forensic-cases-murder (2017) Forensic-cases-murder-leanne-tiernan. exploreforensics.co.uk.
Retrieved 5 September 2017, from http://www.exploreforensics.co.uk/forensic-cases-
murder-leanne-tiernan.html. [online]: http://www.exploreforensics.co.uk/forensic-cases-
murder-leanne-tiernan.html
Lillis, D., Becker, B., O'Sullivan, T. & Scanlon, M., (2016). Current Challenges and Future
Research Areas for Digital Forensic Investigation. arXiv preprint arXiv:1604.03850.
Nelson, B., Phillips, A. & Steuart, C., (2014). Guide to computer forensics and investigations.
Cengage Learning.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4COMPUTER FORENSIC IN LAW ENFORCEMENT
Oluwasegun, S., David, O. E., Esther, E., & Victor, O. (2014). Computer forensics for law
enforcement. Journal of Emerging Trends in Engineering and Applied Sciences
(JETEAS), 5(1), 35-38.
Quick, D. & Choo, K.K.R., (2014). Data reduction and data mining framework for digital
forensic evidence: storage, intelligence, review and archive.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]