Computer Forensics – How Digital Evidence Is Collected

But we are not yet in the world of surveillance and security? Of Foucault’s ideas of discipline and punishment, the idea of ​​’big brother’ is known and not implemented for many years. Moreover, Bentham’s panopticon style Jail just looks, designed to keep inmates watch without knowing, completely changed the face tracking in today’s day and age. Of course, Bentham saw Jail to have a positive effect on criminal behavior, but doing the same thing for the general public? Mainly focused on the digital age and we have entered the information, one of the main advantages for companies to become elite distribute advertising and promotion of the people monitoring the internet shopping and surfing habits.

Subsequently the government body has ensured that people are always good internet surveillance made possible by frequent media coverage and legislative action. This not only makes the shopping experience more personalized and tailored to our tastes, but it enables a higher level of security to protect the public from the unauthorized and potentially dangerous online behavior. However, the level of monitoring raises the question, how far they have to go? This is one example of the effect on tracking people online presence can have. If you see this as a positive or negative, there is always a concern that personal data might be leaked, hacked or altered without permission. There are great sites like Google and Facebook will be able to see what you do online, your likes, dislikes, spending habits, social groups, hobbies and even your location, all while using their services. Do not they have information, they use it as a way to ‘make your online experience better’ but in reality they could use all the data to manipulate what you buy, choose what they want you to look at and potentially change the course of the use of the internet. If power is supplied to large companies, which allows easy access for government agencies could mean even your private conversations, calls, messages and the sensitive data without knowing.

Granted you learned, if the police ask to see the information, we are usually happy to allow this, but legislation is being considered can be compared to someone looking for property in your home while you are away. Do you like the idea? Safety vs. privacy, slim line and is difficult to tell which path you see fit for everyone. But it seems very similar to the idea of ​​panopticon prison stretch in the daily life of everyone in some shape or form sooner or later.

The Role of Digital Forensics investigators

Cyber ​​crime is on the increase. According to the FBI briefing, the number of cases continues to increase digital forensics. At first, the computer forensics industry literature uses the term to refer to a particular branch of forensic science dealing with the investigation and recovery of various materials found in computers. This field expanded to cover digital forensics analysis and investigation of all devices capable of storing digital data. This investigation is often done in conjunction with the crime, which is why it is important that the computer forensic investigator to have the necessary training, but also an interesting experience in the field. Work of the investigator is different from the system or network administrators.

The the most common applications of digital forensic investigations is to discredit or support a conclusion before the court, either criminal or civil. In the case of electronic discovery, investigators may also be useful in the private sector, along the lines of corporate security and internal investigations. Whatever the case, the task of a computer forensic investigator to follow the typical process that began with the seizure of the media and continues with the acquisition, also called forensic imaging. It is imperative that investigators have as much information as possible before undergoing these steps. The first step is often interviewed every person who can provide information with respect to the technical procedures case.

The start getting volatile evidence, that the data can be changed or disappear quickly if no proper treatment. After this step, which can be difficult to do, depending on the level of investigator access a computer or digital device. Next is the physical storage purchases, including memory cards, hard drives, removable disk or USB drive, which will be captured forensics, to ensure continuity of operation of the system, while also using the device as a digital forensics world evidence.

The interesting, but also challenging and demanding. A good computer forensic investigator must not only be highly trained and experienced in the field, but also can connect to step out of the technical world and in the courtroom. Testifying is probably the most challenging part of the job of an investigator. In court, the person must be able to translate technical concepts forensic situations that people can understand. No matter how perfect the investigation, poor presentation in court could have killed him.