The unprecedented growth of digital forensics is a natural outcome of computers expanded use in virtually every sphere of human activity. Digital forensics investigates computer-originated crime, through application of an evolving range data recovery tools and related forensic software. All digital devices, including mobile tablets and smartphones, can be subjected to forensic exploration and assessment.
Among evidence essential to digital forensics are:
- the time/date a file was created,
- the last time it was accessed, written, edited and saved, and
- if the accused actually saw the material.
These factors can provide a picture of whether a particular individual was genuinely involved in an alleged crime and if not, who else might have been. They also determine if incriminating evidence is authentic or was planted to implicate a person or firm.
Digital Forensics in Use
The Basic Process
Expertly implemented, suites of forensic software find deleted emails and files, as well as erased images and details of Internet history and use, thought to be irrevocably lost. In this way, materials
- accidentally misplaced,
- purposefully hidden, or
- perhaps unlawfully destroyed can be retrieved and used as evidence in criminal cases, if necessary. In addition to recovering such evidence, appropriately enacted digital forensics also:
- authenticate the material to ensure it was created during the period of the alleged criminal activities, and
- evaluate its relevance to the legal case under consideration.
Look for additional information on the Evolution of Digital Forensics – Part 2 and Part 3. If you would like more information about eDiscovery or how TERIS solutions can assist you, please contact us!