Home computers and desktop computers became more popular

Assignment Help English
Reference no: EM131074477

In the 1980s, when home computers were not yet popular and desktop systems were being developed for business and the government, the only digital forensics being practiced were used to detect and investigate hacking and computer compromise. In fact, the most common criminal act involving computers was the use of systems and dial-up modems to connect to the Department of Defense's networks to get free long distance. As home computers and desktop computers became more popular, the main communications systems for interconnectivity among computer users was through the use of dial-up commercial systems. This eventually resulted in the development of more advanced commercial networks, such as America Online (AOL). [Does anyone remember "Prodigy"?]

As with any mechanism that makes life easier for consumers, those with criminal intent developed a means to exploit those systems for other-than-lawful purposes. Thus, since they could be used for different types of criminal activity, computers became a bigger focus of the criminal justice system. A computer could be:

used to commit a crime, such as hacking or transferring private or illegal information (e.g., stolen social security numbers, credit card information, or child pornography);

used to store evidence of a crime (e.g., child pornography, a "murder list," narcotics ledgers, "cooked" accounting books); Or it could be the target of a crime.

From an national and international perspective, computers can be, and have been, used to facilitate acts of terrorism and/or threats to national security. As a result, techniques had to be developed to allow criminal justice professionals to search through digital data contained on a computer or network to identify and collect evidence.

At first, criminal justice professionals employed commercial mainstream or wide-use software that could be used to recover data or search for and recover data on a hard drive. Norton Disk Edit tools, for example, could be used to search a computer for digital evidence, but it also caused changes to the computer's data. Eventually, specialized forensic software was developed (e.g., EnCase, FTK, SMART, etc.) to more accurately collect and search digital evidence without damaging or changing its content.

Initially, the courts did not understand the technology (neither the computers nor the forensic processes and software developed to examine them), and the law was not up-to-date enough to facilitate the investigation and prosecution of technology-based crimes. Further, there were no universal digital forensic standards or established best practices that practitioners could follow and which would have helped circumvent challenges to digital evidence in court. But, fortunately, over the last twenty years or so, new laws have been enacted, created or modified to account for technology-based crimes. Digital forensic standards have been developed that are used across the discipline, and specialized tools have been developed to help law enforcement meet those standards.

So why is this important to each of you, as non-criminal justice professionals? Part of the answer is this: While conducting a forensic analysis of your organization's computers systems or networks - whether you're searching for evidence of hacking or employee misconduct, or in response to a request for discovery in a lawsuit, for example - you may come across information that could lead to a criminal prosecution. If you do not follow the same standards used by criminal justice professionals (e.g., using write-blockers, making every effort to analyze a bit-by-bit forensic copy instead of the original evidence directly), any evidence you find could be rendered inadmissible in court. However, if you perform your duties as a forensic examiner with criminal justice standards in mind, not only will it increase the utility of the digital evidence in a criminal or civil court, but it should also provide more certainty in your own results. In all situations involving the potential misuse of digital information, you should maintain a sensitivity to the potential for commercial/corporate terrorism or threats to geopolitical security.

OK, then. Here's your task for this week's discussion. Provide at least one example of how being familiar with and following 1) digital forensic best practices AND 2) criminal justice standards would benefit you, even if you worked in a non-criminal justice digital forensics position.

Discuss thoroughly. You must also respond - in a substantive, intelligent way - to at least one of your fellow classmates' postings.
just 4-5 paragraphs

Reference no: EM131074477

Questions Cloud

Explain the different types of costs : Explain the different types of costs (variable, fixed, sunk, opportunity, direct, indirect). Discuss the types of costing method(s) the company uses. Give 1-2 examples of each method presented.
Use of aspirational principles and enforceable standards : Explain the APA Ethics Code decision-making process. Discriminate between the use of aspirational principles and enforceable standards
What do we call the perspective of psychological science : What do we call the perspective of psychological science that deals with how much our genes, and our environment, influence our individual differences?
What are the possible types of compensation that wwh may use : Excluding cash compensation, what are the possible types of compensation that WWH may use? What are the advantages and disadvantages of each type of compensation identified by you in question A?
Home computers and desktop computers became more popular : In the 1980s, when home computers were not yet popular and desktop systems were being developed for business and the government, the only digital forensics being practiced were used to detect and investigate hacking and computer compromise.
Prepare a statement of cash flows for shabbona corporation : Prepare a statement of cash flows using direct method. Prepare a statement of cash flows for 2014 for Shabbona Corporation. Prepare a statement of cash flows using the indirect method.
Differences between juvenile and adult courts : Compare the key differences between juvenile and adult courts, including language differences. The adjudication process by which a juvenile is transferred to the adult court system.
Which category of criminal evidence include judicial notice : In 200 words define judicial notice. In your opinion, which of the four categories of criminal evidence includes a judicial notice? Explain your answer.
Claims that you have heard people make : Examine the key reasons why so many people might seem to be attracted to more pseudoscience-type claims. Describe at least two (2) such claims that you have heard people make

Reviews

Write a Review

English Questions & Answers

  What change has the character experienced

What change has the character experienced? It seemed to me as if nothing would or could ever be known. All that had so long engaged my attention suddenly grew despicable.

  Category points description

You are required to analyze this week's case study and submit a two- to three-page paper addressing the key questions identified. Remember that all case studies present both too much and too little information. There may be information presented that..

  What does didion mean by the ambushes of family life

What does Didion mean by "the ambushes of family life"? Didion says she would like to give her daughter "home for her birthday, but we have live differently now."

  What does parallel structure mean for a sentence

What does "parallel structure" mean for a sentence? Can you provide an example of a parallel structure? What are some ways to cut out unnecessary wordiness from your sentences?

  How will systems respond to penetration

How will systems respond to penetration of info in several forms into our homes, brains and cars? Is cyberspace/ media internet system reducing our involvement in families?

  Write on article virtual friendship and the new narcissism

Write a response to the article "Virtual Friendship and the New Narcissism"

  Explain elements in celias initial e-mail meeting

An analysis of the elements in Celia's initial e-mail meeting communication that you view as appropriate or inappropriate based on the situation, concepts from your textbook, lectures, and personal experience.

  The allegory of the cave

According to "Kaspar Hauser Speaks" by Steven Millhauser, Did Kaspar become enlightened in the way Plato "The Allegory of the Cave" describes? How do you know?

  Write outline about career choice is successful in military

Write an outline about career choice is to be successful in the military and become a respectful officer. This is a high school assignment.

  Prepare a letter from an electronics store

Prepare a letter from an electronics store starting the customer will not be reimbursed for a malfunctioning cell phone still under warranty.

  Proofdiscuss the relationship between the textjournal

proofdiscuss the relationship between the textjournal readings and the information on the website related to the chosen

  Identify experiences that will help you prepare for career

Identify experiences that will help you prepare for your career. Then write an essay in which you use cause-effect reasoning to prove your claim.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd