Thursday, September 26, 2019
Cybercrime and Digital Evidence Assignment Example | Topics and Well Written Essays - 750 words
Cybercrime and Digital Evidence - Assignment Example Nonetheless, the internet users must adopt and apply all the necessary cyber privacy policies. The currently increasing modes of cybercrimes include encryption and anonymity that are growing to advance levels. Nonetheless, computer forensic has remained a vital tool in eliminated all cybercrimes as well as convicting such related criminals including sexual predators, terrorists, and murders. Terrorists may use the internet platform to recruit members and plan their terror acts, while the sexual predators are likely to use social media sites to lure potential victims. Most of these crimes usually go undetected especially when the criminal investigation team uses technologies that were implemented before some computer technological advancements (Maras 151). However, the criminal investors must note that none is lost and they can still pursue cyber criminals even if they delete the information that may be regarded as illegal data or information. Notably, when persons use computer, they often think that when they delete such information or data, all such is erased completely. On the contrary, such files and data usually remain in the hard disc; thus, providing platform of investigating and or tracking cyber related criminal activities. Deleted file and data usually remain in the in a binary form because of ââ¬Å"data remanenceâ⬠that is also considered as residual data presentation. Extraction of such data and files are avenues that cybercrime investigators should deploy to prosecute the criminals. In fact, deleting of the file and or data is just a mere renaming the data or file and hiding it from the user. This means that the original file can still be recovered in its original content; thus, can be used for prosecution (Maras 172). Therefore, the public or persons who have experienced cybercrime related activities must not serge on the pretext that the suspected criminal has deleted the information they used against them, but they should report the same si nce such information could be retrieved for further actions. Additionally, the global position systems (GPS) software is usually embedded in the satellite a smartphones navigation systems are also modes of prosecution since they can be used to track a suspect. The GPS related information can be traced from the form manufacturers since the companies that develop this software usually develop satellite navigators; therefore, using necessary tools and technologies the computer forensic experts should liaise with the GPS developer to obtain the information that they need for crime purposes. Notably, information usually travels through internet through the GPS systems and the same is distributed through satellite. However, the use of GPS to track criminal may be turn futile since GPS software is only limited to certain address listing. In fact, the current GPS software systems do not record time when the address was achieved; thus, using them will make it difficult to determine when the alleged crime was committed. Moreover, it may be difficult to ascertain whether the address recorded in the GPS software system was automatically generated or was a mere input to implicate a person. Therefore, it would be advisable for the computer fore
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.