Computer Misuse: Where To Find Evidence

Discovering the cyber criminalIf you’re working in computer forensics, knowing where to look for electronic evidence is crucial. A good computer forensics investigator will attempt to find evidence in each of the following areas:

The Computer: Digital memories don’t forget anything. A hard drive is just a goldmine for finding every file that was created, saved, downloaded, sent, or deleted to it or from it, including documents, e-mails, images, and financial records. You will be able to find file content intact, as well as lots of details about when the file was created, accessed, and edited, and you might even be able to get previous versions. In short, a hard drive is an excellent time machine.

Visited Websites: Any digital device used to access the Internet might be searched for a listing of where on the Web an user has visited — and when. No one surfs anonymously.

PDA: A hand-held device records a man’s life unlike any other device does. To discover the where, what, with whom, and how much of a person’s life, check his PDA.

Facebook, Twitter, or a different social network: Full transcripts of postings and private chats in social networks are gaining on e – mail as the primary source of e-evidence. Note: These chatters chat a lot and do not use punctuation or an easily identifiable language.

Cellphone or smart phone: As on a PDA, the information you’ll find on an user’s mobile can be the e-evidence you want — or it may lead you toward other e-evidence. You can find detailed logs of incoming and outgoing messages and text messages; transcripts of text messages; address books, calendars; and more.

Chat room: Sadly, predators and other criminals hang out in chat rooms throughout the whole world.

E-mail: Everything, no matter how incriminating or mindless, is sent and received by e-mail. In reality, nothing is subjected to searches more than e-mail is. It functions as truth serum, and, for exactly that reason, the link between e – mail and jail is generally ignored.

Any device that has memory: Digital cameras, iPods, flash drives, SIM cards – – if it uses memory, it might have evidence.

GPS device: Monitoring technology has already been used in high profile court cases. To find a man’s whereabouts, assess the GPS device.

Network or Internet service provider (ISP): An ISP is a rich source of digital dirt and details. It is recorded by each network device, if bytes pass through it.