Computer Forensics Fraud Investigations Essay Example

Paper Type:  Essay
Pages:  7
Wordcount:  1844 Words
Date:  2022-12-06

Introduction

By using computer as a forensic software, an investigator can is capable of recovering files metadata like the last written, created, and the previous access dates (Moore, 2014). This kind of data can be used to prove or disapprove suspects claims related to the evidence found on the hard drive. A computer forensic invigilator can uncover the deleted files in the computer as well as unearth internet search history, previously received emails and sent emails. The items can be more useful in filling a case against a suspect. Through providing evidence that a suspect searched for a given keyword, or through obtaining an incriminating email, the computer forensic investigation is much capable of producing substantial evidence for the case.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Computer forensic investigators can significantly assist in certain areas of investigation for instance by creating a synergy. During the investigations of the files in the hard drive, a forensic investigator can select clues for other investigators. Through looking the emails, the investigators may serve as the indicators for bank accounts as well as other names which are associated with the perpetrator hence resulting in a break in the case (Moore, 2014). Both the forensic accountant and the computer forensic investigator can work hand in hand from the beginning of an investigation. A forensic accountant can assist the computer forensic investigator with specific keywords to help find a hard drive which will consequently save much time and effort. Also, a computer forensic investigator maybe in a position to reveal clues that can help the forensic accountant to further an investigation. For instance, in a case where the financial statement is being committed, there could be the presence of emails that can explain how the perpetrator planned his/her activities on committing the fraud. The relationship between the forensic accountant and the computer forensic investigator can serve to be very important on solving various types of fraud such as extortion of documents, credit cards fraud and embezzlements fraud. In the modern technological world, digital evidence has never been regarded as more important. Through the act of collaboration, recovering deleted files, and creating a valuable synergy, the computer forensic examiners will go ahead to avail key evidence for the many cases.

The capacity to collect, analyze as well as to interpret electronic evidence is known as the digital forensics; the act is since becoming more common within the field of fraud examinations (Moore, 2014). Moreover, having the ability to possess the knowledge of a given hardware and software tools, to correctly practice for the recovery and as well as the analysis methods. Digital forensic is regarded as a powerful tool and also a skill for the fraud investigators only if they know the right places to look. Computer forensic do avail the tools to collect and keep legally admissible evidence from various computing devices.

Forensics of Computers and Handheld Devices Identical or Fraternal Twins

Smartphones with advanced features such as the built cameras, storage devices, and the internet features of the handled devices have greatly influenced computer forensic investigations (Yates, 2010). The forensic investigators usually use the mobile phone cell station to inquire about the approximate locations of the crime suspects and the victims. The principles that should be followed while handling the digital evidence such as data should not be tampered with on the storage media, an audit trail should be created and preserved and a competent person should access the original data (Yates, 2010). The investigators do face various challenges on their duties to protect the evidence and when the existing evidence may be overwritten as a result of the new information while the criminals remotely gain access to the handheld devices and consequently destroy the key evidence. The certifications for the computer forensic investigators should be extended more than the no handheld devices to various smartphones by individual companies.

Computer Forensics - Past, Present, and Future

The past, present and the future status of the computer forensic has so far been driven by far as a result of the capabilities of the technology (Casey, 2011). The availability of the third generation computers can study machines in actions as well as retrieve information such as the port in use. The various areas of evidence that were thought not to be unreachable in a forensic sound manner are nowadays attainable due to the virtue of the current developments. Also, the various applications of the investigative techniques majorly within the digital environments have so far led to the emergence of the field termed as the digital forensics. The field is commonly accepted to have emerged from the practice of law enforcement. A major new challenge for the future of computer forensics is to modernize its methods as well as its processes to help maximize the yielding of the valuable evidence (Casey, 2011). It is also of importance to cover some of the disciplines histories to clearly understand its approach and the future directions that should be taken.

It's also documented that the first period in computer forensic history is characterized by dealing with relatively small capacity storage devices which allowed for the complete hard disk to be copied and analyzed exhaustively in search for the evidence (Casey, 2011). From then computer networks have become more comfortable to use, inexpensively and achieved much popularity. The internet started to spread rapidly, and today households and most workplaces use it extensively.

Computer forensics: is it the next Hot IT subject

Digital forensic is termed as the recovery of data as well as the information from the computer system and their networks. It cannot be accomplished by the software alone, and significantly it's something that cannot be performed by the untrained IT forensic professional (Nelson et al. 2014). The U.S federal law enforcement agency developed digital forensics, and it led to the emergence of science. It's regarded as the art of detecting, processing as well as examining digital fingerprints. Within the past five years, the field of forensic science has experienced a lot of changes, i.e., by yesterday technology was on the drawing board and today it's a part of the criminal investigations. The main focus of traditional information security research is to help in defending systems against attacks majorly before they occur (Nelson et al. 2014). Even though, the most recent detection system has been able to recognize as well as take actions against attacks. Through the understanding of computer legal history, it's better to understand how the development of an educational program for this discipline has taken place (Nelson et al. 2014). The previous computer forensic practitioners operated without proper formal forensic training or academic education, and they had the experience of working in a saturated computer forensic environment. In a nutshell, computer security traditionally has been able to focus much on protecting useful information systems from severe attack.

The Increasing Significance of Computer Forensics in Litigation

Digital forensic have since risen as one of the active forces outside and within the legal environment mostly in the civil litigation which can as well employ very many digital forensic techniques (Pangalos et al. 2010). These techniques include the following, computer forensics, mobile phone forensics, audiovisual forensic, and cell site analysis. The methods are all essential evidence to prove the facts for the prosecution as well as the defense. Civil litigation is one of the most critical parts of the justice system which has been supported consistently by digital evidence (Pangalos et al. 2010). Also, the procedures which are within the civil cases differ a bit from those in criminal cases. The civil aspect covers an array of misconducts outside of the criminal specter, known as the white collar crimes which are found within the traditional manner. The civil litigation typically covers some crimes which are carried through deceit and consequently are inspired by the financial gain like bribery, fraud, intellectual property theft, tax evasion, commercial disputes, and computer misuse.

Moreover, litigation matters which involves digital evidence and are located in a laptop, computer, Smartphone, portable device, tablet, and any other device is open territory for eDiscovery (Pangalos et al. 2010). Similar aspects of successfully utilizing digital forensic experts which are within civil litigation are in the case of a family divorce or matters. In summary, if an individual has illegally accessed their partner's social media account or email, then an expert in computer forensic can examine the various digital evidence of which some may have been removed or deleted.

Computer Forensics: An Essential Ingredient for Cyber Security

Computer forensic usually apply the use of computer investigations as well as thorough analysis techniques to collect evidence which is due to what occurred in the computer which is admissible before the court of law (Hughes, & Cybenko, 2014). Computer forensics generally requires balance combinations of legal acumen, technical skills, and ethical conduct. Moreover, computer forensic specialists usually apply the use of powerful software tools to open data to enable it to be sorted through and be figured out as relevant facts and also the better ways to put them before the court of law. According to Hughes and Cybenko, (2014), the rates of cybercrime are increasing, and computer forensics is the essential discipline that has the authority to impede the progress of the real cybercriminals.

The main aim of the computer forensic is to establish structured investigations which are properly documenting a series of evidence to disclose what happened in the computer and those who are behind it (Hughes & Cybenko 2014). The use of private computers has increased in homes and businesses, and consequently companies are sharing more information online unlike before hence high tech crimes are continuing to grow at a faster rate. The acts could create a need for crime investigators to access the computers due to information based on them. There is much awareness in the legal community of an assist for computer forensic services to achieve prosecutions which could fail due to inadequate procedures, equipment or the presentation in the court of law.

Computer Forensics: The Modern Crime Fighting Tool

Due to the advancements in forensic technology, law enforcement has come up with tools and resources at its disposal. The act will make it difficult for criminals to escape with their actions. Due to these, the demand for legal technology has persistently increased over time. The technologies advances have so far have been of great help in law enforcement hence assisting in solving crime case. The following are the new forensic tools and forensic technology which are used to fight criminal activities; massively parallel sequencing (MPS), the tool may be the most advanced tool in the field of forensic biology (Li, X., & Juhola, 2014). Massively parallel sequencing tool avails much information about DNA evidence; hence it will be of great importance in solving missing persons as well as in situations where there has been a massive disaster with many deaths. The second tool is known as the Hair Bacteria Assessment which is used to analyze crime suspect's hair bacteria to match sexual criminal suspects (Li, X., & Juhola, 2014). Also, there is another tool called Rapid DNA; the new forensic technology is capable of using DNA to create family connections in the ti...

Cite this page

Computer Forensics Fraud Investigations Essay Example. (2022, Dec 06). Retrieved from https://proessays.net/essays/computer-forensics-fraud-investigations-essay-example

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism