Monday, June 17, 2019

Cybercrime and Digital Evidence Assignment Example | Topics and Well Written Essays - 750 words

Cybercrime and Digital Evidence - Assignment ExampleNonetheless, the internet users must adopt and apply solely the necessary cyber privacy policies. The currently increasing modes of cybercrimes include encryption and anonymity that are growing to advance levels. Nonetheless, computer forensic has remained a vital rotating shaft in eliminated all cybercrimes as well as convicting such associate criminals including sexual predators, nemesisists, and murders. Terrorists may use the internet platform to recruit members and plan their terror acts, while the sexual predators are likely to use social media sites to lure potential victims. Most of these crimes usually go undetected especially when the criminal investigation team uses technologies that were implemented before some computer technological advancements (Maras 151). However, the criminal investors must note that none is lost and they can still pursue cyber criminals nevertheless if they delete the information that may be r egarded as illegal information or information. Notably, when persons use computer, they often think that when they delete such information or data, all such is erased completely. On the contrary, such files and data usually remain in the hard disc thus, providing platform of investigating and or tracking cyber related criminal activities. Deleted file and data usually remain in the in a binary form because of data remanence that is also considered as residual data presentation. Extraction of such data and files are avenues that cybercrime investigators should deploy to prosecute the criminals. In fact, deleting of the file and or data is just a mere renaming the data or file and hiding it from the user. This means that the original file can still be recovered in its original content thus, can be use for prosecution (Maras 172). Therefore, the public or persons who have experienced cybercrime related activities must not serge on the pretext that the suspected criminal has deleted th e information they used against them, scarce they should report the same since such information could be retrieved for further actions. Additionally, the global position systems (GPS) software system is usually embedded in the satellite a smartphones sailplaning systems are also modes of prosecution since they can be used to track a suspect. The GPS related information can be traced from the form manufacturers since the companies that develop this software usually develop satellite navigators therefore, using necessary tools and technologies the computer forensic experts should liaise with the GPS developer to obtain the information that they need for crime purposes. Notably, information usually travels by internet through the GPS systems and the same is distributed through satellite. However, the use of GPS to track criminal may be turn futile since GPS software is only limited to legitimate address listing. In fact, the current GPS software systems do not record time when the address was achieved thus, using them will make it difficult to determine when the aver crime was committed. Moreover, it may be difficult to ascertain whether the address recorded in the GPS software system was automatically generated or was a mere insert to implicate a person. Therefore, it would be advisable for the computer fore

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.