You are on page 1of 17

Computer Forensics

Sara Jones CSC 105:05

Objectives
The Field of Computer Forensics History of Computer Forensics Collecting Evidence Advantages of Computer Forensics Disadvantages of Computer Forensics How Computer Forensics is used by government, corporate America, and the public Computer Forensic Companies in New Jersey

The Field of Computer Forensics What is Computer Forensics?


Scientific

process of preserving, identifying, extracting, documenting, and interpreting data on computer to obtain potential legal evidence

Used

History of Computer Forensics


Michael Anderson
Father

of computer forensics special agent with IRS

Meeting in 1988 (Portland, Oregon)


creation

of IACIS, the International Association of Computer Investigative Specialists the first Seized Computer Evidence Recovery Specialists (SCERS) classes held

Certification for Computer Investigative Specialists

CEECS (Certified Electronic Evidence Collection Specialist Certification) Awarded to individuals who complete the CEECS regional certification course Also awarded to individuals in the Certified Forensic Computer Examiner course that successfully pass the written test

Certification for Forensic Computer Examiner


Internal Certification Training Program

Must successfully complete two week training course offered by IACIS and correspondence proficiency problems

External Certification Testing Process

Not a training course Testing process


Active Law Enforcement Individuals qualified for IACIS membership

Recertification

Every three years must complete recertification process


Must be in good standing with IACIS Complete proficiency test

Questions to ask Computer Forensic Specialists


What are their daily, weekend, after-hours rates? Do they charge for machine time? Ask how many forensic cases they have worked on Ask how long they have been in the forensic business How many cases have they done similar to yours? Ask to see their training and certifications Ask they if they ever testified as an expert witness Ask them for references from previous clients

Collecting Evidence
Make Exact copies of all hard drives & disks using computer software

Date and Time stamped on each file; used for timeline

Protect the Computer system

Avoid deletion, damage, viruses and corruption


Normal Files Deleted Files Password Protected Files Hidden Files Encrypted Files

Discover files

Reveal all contents of hidden files used by application and operating system Access contents of password protected files if legally able to do so Analyze data Print out analysis

Computer System All Files and data Overall opinion

Provide expert consultation/testimony

How Evidence is Protected


A Computer Forensic Specialist promises to: Not delete, damage or alter any evidence Protect the computer and files against a virus Handle all evidence properly to prevent any future damage Keep a log of all work done and by whom Keep any Client-Attorney information that is gained confidential

Advantages of Computer Forensics


Ability to search through a massive amount of data
Quickly Thoroughly In

any language

Disadvantages of Computer Forensics


Digital evidence accepted into court

must prove that there is no tampering all evidence must be fully accounted for computer forensic specialists must have complete knowledge of legal requirements, evidence handling and storage and documentation procedures

Disadvantages of Computer Forensics


Costs
producing

electronic records & preserving them is extremely costly


Sattar vs. Motorola Inc

Presents the potential for exposing privileged documents Legal practitioners must have extensive computer knowledge

How Computer Forensics are Used


Criminal Prosecutors

Large Corporations

Child Pornography cases


Michael Jackson Case

Embezzlement Insider Trading


Martha Stewart Case

Homicides
Scott Peterson Trial

Embezzlement
John Gotti, Bugsy Siegal

Law Enforcement Any Individual

Financial Fraud
ENRON

Claims
Sexual harassment Age discrimination Wrongful termination from job Background checks

Civil Litigations

Fraud Divorce Breach of Contract Copy right False Accident Reports Workmans Compensation Cases

Insurance Companies

Computer Forensic Services in New Jersey

Computer Forensic Services, LLC All State Investigations, Inc.

Other Computer Forensic Services Locations in New Jersey


Middlesex County
Avenel Carteret Cranbury Dayton Dunellen East Brunswick Edison

Union County
Berkeley Heights Cranford Elizabeth Fanwood Garwood Kenilworth Linden

Ocean County
Barnegat Bayville Beach Haven Beachwood Brick Forked River Jackson

Fords
Highland Park

Plainfield
Rahway

Lakehurst
Toms River

Conclusion
With computers becoming more and more involved in our everyday lives, both professionally and socially, there is a need for computer forensics. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.

Bibliography

All State Investigations, Inc. January 2005 http://www.allstateinvestigation.com/ComputerForensicServices.htm Computer Forensics, Inc. http://www.forensics.com/ Computer Forensic Services, LLC. January 2005. http://www.computerforensic.com/index.html International Association of Computer Investigative Specialists. January 2005. http://www.cops.org/ Middlesex County Computer Technology. January 2005. http://www.respond.com/countyguides/1800000002/NJ/023 Virtue, Emily. Computer Forensics: Implications for Litigation and Dispute Resolutions. April 2003. http://ncf.canberra.edu.au/publications/emilyvirtue1.pdf

You might also like