Sign In
Not register? Register Now!
You are here: HomeResearch PaperTechnology
Pages:
5 pages/≈1375 words
Sources:
Level:
MLA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 36.45
Topic:

Mobile Phones in Computer Forensics (Research Paper Sample)

Instructions:
The paper explains use of mobile phones in computer forensics source..
Content:
Name of Student Professor Course Number Date Mobile Phones in Computer Forensics Computer forensic incorporates both law and computer science in crime investigation. It aims at gathering maintaining inspecting and presenting every kind of digital medium and exploring f computers in search of proof from internet history deleted documents the history of system use and documents. Computer forensic refers to the method used to investigate computer usage and to account the details with the help of forensically sound method. Computer forensic gives proof concerning the computer usage the files accessed the time of access and the person who accessed the files. The paper explains use of mobile phones in computer forensics. For digital proof to be lawfully acceptable in courts, canvasses must pursue the right legal processes when analyzing and recovering facts from the computer systems. Unluckily, laws written prior to computer forensics era are frequently obsolete and cannot sufficiently evaluate the methods used in the investigation of a computer system. The incapability of law to keep speed with technological development may eventually limit the usefulness of proof in computer forensics in court. Privacy activists are getting worried that computer investigations tend to be a violation of the human rights of a suspect. Additionally as techniques for anonymity and encryption become highly developed there maybe, violation of technology through assisting wrong doers hides their deeds. Due to potential spiteful intents and lawful boundaries, technology role in computer forensics may possibly not reach its set target. In the current age, every data byte matters. Cell phones have an ability of storing personal information either unintentionally or intentionally. Mobile phone forensic specialists concentrate in the forensic data retrieval from cell phones, among other mobile tools in a way, which saves the proof under forensically, satisfactory conditions, which guarantees it is admissible by court. A mobile phone forensic analysis encompasses likely full retrieval of data reliant on the PDA model or the cell phone (Kessler, 2014). In a forensic investigation, the investigators conduct a careful data examination present in the SIM card, the mobile body, and any elective memory cards. Some kinds of information, which the investigators reclaim and scrutinize during a mobile phone forensic exploration even after omission include videos graphics and photos, address book admission which include email and residential addresses, phone number and contact names, message recovery and call times which include call durations received and dialed calls. According to Bennett (2011) there are some personal devices branded mobile devices in the current market. Examples of mobile devices are smart phones for instance blackberry and apple I-phones, cell phones, audio players for instance iPods personal digital assistance among other mp3 devices. Currently the most popular phone has a storing capacity equitable to a processor although regularly used as an entertainment center social network and potable office all combined into a convenient solitary device. A Smartphone refers to mobile equipment, which gives advanced offers and computing the capability to run applications with extra connectivity alternative in comparison to a cellular phone. The storage and technological capacity for mobile phones has developed exponentially. In the past decades, features and capabilities of mobile phones have converted them into repositories of data, which can accumulate a great amount of organizational and personal details. As evidenced by Kessler (2014) during the investigations, legal firms and law enforcement representatives realize the significance of proof contained in the mobile devices and determine how the proof can greatly influence the results of a trial. The honesty of the team selected to conduct a mobile phone forensic study is as necessary as the honesty required in the extracted files even if working to file the proof or required by the law enforcement to acquire facts for an illegal trial. With the correct submittal of the forensic evidence, the legal firms and law enforcement representatives are winning progressively more cases. It is crucial that mobile phones forensics researchers recognize the imperatives and legal issues contained in electronic proof gathering. Unluckily wrong doers have been in the mobile phone details revolution. In the last few years, criminals have been progressively using mobile phones among other handheld equipments when committing their unlawful activities. For instance a person dealing in drug trafficking may have a clients list who have his or her loan in a file kept in his portable device. Certainly almost every crime can entail some kind of digital proof, which is a convenient data hauler. This boosts the possibility for data incrimination to be kept in mobile phones and used as proof in criminal activities. Mobile phones can have electronic records details for instance text messages, spread sheets, word processing files, electronic mail, and global positioning system used in tracking details and pornographic representations, which can give law enforcement workers critical proof during a criminal research. A single portable device with a storage capacity and processing power helps the ability of a mobile device to print view and store electronic details (Bennett, 2011). In conviction of renowned criminals for instance murderers’ sexual predators and terrorists computer forensic has been a requisite. Social networking spots may be useful to sexual predators to hunt prospective victims while internet may be useful to terrorist organizations to conscript members. Conversely, most of the criminals forget to hide their trail during their use of technology in employing their crimes. They forget that data and computer files do not permanently leave the hard drive even when erased leaving a chance for investigators to follow their criminal records. Even though criminals erase their illicit files, the facts still remain in a double for...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

Need a Custom Essay Written?
First time 15% Discount!