Tuesday, May 7, 2019

Cybercrime and Digital Evidence Assignment Example | Topics and Well Written Essays - 750 words

Cybercrime and Digital Evidence - Assignment pillow slipNonetheless, the internet officers must adopt and apply all the demand cyber privacy policies. The currently increasing modes of cybercrimes embroil encryption and anonymity that are growing to advance levels. Nonetheless, data processor forensic has go forwarded a vital tool in eliminated all cybercrimes as well as convicting such related criminals including sexual predators, terrorists, and murders. Terrorists may utilization the internet platform to recruit members and plan their terror acts, while the sexual predators are likely to use social media sites to lure potential victims. Most of these crimes usually go undetected especially when the criminal investigation team uses technologies that were implemented before some computer technological advancements (Maras 151). However, the criminal investors must note that none is lost and they can still pursue cyber criminals even if they delete the breeding that may be re garded as illegal information or information. Notably, when persons use computer, they often think that when they delete such information or info, all such is erased completely. On the contrary, such agitates and data usually remain in the hard discus thus, providing platform of investigating and or tracking cyber related criminal activities. Deleted file and data usually remain in the in a binary form because of data remanence that is also considered as residual data presentation. Extraction of such data and files are avenues that cybercrime investigators should deploy to prosecute the criminals. In fact, deleting of the file and or data is just a mere renaming the data or file and hiding it from the user. This means that the original file can still be recovered in its original content thus, can be utilise for prosecution (Maras 172). Therefore, the public or persons who have experienced cybercrime related activities must not serge on the feigning that the suspected criminal has deleted the information they used against them, but they should report the same since such information could be retrieved for further actions. Additionally, the global position remainss (GPS) software is usually embedded in the satellite a smartphones glide systems are also modes of prosecution since they can be used to track a suspect. The GPS related information can be traced from the form manufacturers since the companies that develop this software usually develop satellite navigators therefore, using necessary tools and technologies the computer forensic experts should liaise with the GPS developer to obtain the information that they need for crime purposes. Notably, information usually travels with internet through the GPS systems and the same is distributed through satellite. However, the use of GPS to track criminal may be overturn futile since GPS software is only limited to certain address listing. In fact, the current GPS software systems do not record time when th e address was achieved thus, using them will make it difficult to determine when the alleged crime was committed. Moreover, it may be difficult to ascertain whether the address recorded in the GPS software system was automatically generated or was a mere input to implicate a person. Therefore, it would be advisable for the computer fore

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.