Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet

2002 ◽  
Author(s):  
Matt Parsons
Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Author(s):  
Cameron H. Malin

With the vast advances in computer, mobile, and online technologies, visibility into an offender’s thought processes and decision-making trajectory has been markedly enhanced. Digital behavioral artifacts, or digital evidence “breadcrumbs” of an offender’s behaviors, are now often left in publicly accessible locations on the Internet—such as social media platforms and social messaging applications—and in locations not privy to the public—such as the offender’s devices. Importantly, early seminal literature introduced and described examining an offender’s actions as series of steps along a path of threat escalation, or “pathway.” The totality of these emerging digital behavioral artifacts allows investigators to piece together an offender’s behavioral mosaic at a much more intimate and granular level, warranting a revised pathway—the cyber pathway to intended violence (CPIV)—that captures the thoughts and actions of an offender leading up to an act of deliberative, predatory violence. This chapter introduces the emerging discipline of Digital Behavioral Criminalistics and how this process can meaningfully be used by threat assessors to elucidate an offender’s steps on the CPIV.


Author(s):  
Bernd Carsten Stahl ◽  
Moira Carroll-Mayer ◽  
Peter Norris

In order to be able to address issues of digital crime and forensic science in cyberspace, there is a need for specifically skilled individuals. These need to have a high level of competence in technical matters, but they must also be able to evaluate technical issues with regards to the legal environment. Digital evidence is worth nothing if it is not presented professionally to a court of law. This chapter describes the process of designing a university course (a full undergraduate BSc degree) in forensic computing. The aim of the chapter is to present the underlying rationale and the design of the course. It will emphasise the problem of interdisciplinary agreement on necessary content and the importance of the different aspects. It is hoped that the chapter will stimulate debate between individuals tasked with designing similar academic endeavours and that this debate will help us come to an agreement what the skills requirement for forensic computing professionals should be.


2019 ◽  
Vol 23 (1) ◽  
pp. 123-140
Author(s):  
Oleg A Ostrovsky

Modern information systems, such as e-learning, e-voting, e-health, etc., are often used inappropriately for irregular data changes (data falsification). These facts force to review security measures and find a way to improve them. Proof of computer crime is accompanied by very complex processes that are based on the collection of digital evidence, forensic analysis and investigation. Forensic analysis of database systems is a very specific and complex task and therefore is the main source of inspiration for research. This article presents the fact that classical methods of collecting digital evidence are not suitable and effective. To improve efficiency, a combination of well-known, world-independent database technologies and their application in the field of forensic science are proposed. It also offers new directions for research in this area.


Sign in / Sign up

Export Citation Format

Share Document