English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

Basically, I am at a loss to this, and just looking for some help, and/or a point in the right direction. How is digital evidence gathered, not just generically, but are their different techniques for different programmes, ie evidence on outlook, word excel and so on. This question is related to ID theft and I have probably spent 20 hours on it and have'nt got any closer

Cheers

27pence

2007-01-20 06:19:33 · 8 answers · asked by 27pence 1 in Politics & Government Law Enforcement & Police

This is in relation to a PC or a laptop. Say for instance a person has been involved in phishing attacks, digital evidence will be more than likely be found on his outlook account. What is the actual process, as to how an image is determined from this info. (image meaning a copy that can be used in a court of law).

2007-01-20 07:42:30 · update #1

8 answers

I assume you mean the gathering of information about specific crimes already committed.Law enforcement agencies are able to track down computer evidence to a specific U.R.L.
A unique address.They also must have a degree of handshaking information services as some of these criminals are in different countries.Interpol is one organisation I can think of,but there must be others out there aswell.
I`ve often seen police descending on suspected criminals,and removing computers,and disks and files etc.Hope this helps!

2007-01-20 06:35:21 · answer #1 · answered by Anonymous · 0 0

The problem is with the way that you have structured your question.
For example, do you mean - the collection of digital photographs from a digital camera - at a airport - on a bus - or on an underground, or do you mean something different.

You must have an 'application' in mind - then ask a DIRECT question, otherwise, who in hell will know what your question is.

2007-01-20 07:17:31 · answer #2 · answered by greagues2 2 · 0 0

When you write a file to a hard drive and delete it, it is still there. It is just removed for you FAT so it doesn't show. There programs that read the bits on a hard drive and they find info that way. As you use your hard drive more those areas are over written but it takes a while so they can still find a lot of things that you think are gone. You can get or write programs that overwrite files with other things and them delete them.

2007-01-20 06:32:43 · answer #3 · answered by Get Real 4 · 0 0

there's no protection measures put in place by skill of the customary workstation consumer that could truly "cover" suggestions. The disk will consistently hold a "shadow image" that is extracted with government application and technicians. All information superhighway activity is additionally tracked and recalled, yet that demands a courtroom order. the only thank you to totally erase a demanding force is with a hammer. there is likewise disc application it extremely is obtainable to customers which will overwrite the disc 3 or 4 situations with meaningless random strings of code, in effect scrambling the date so badly it may on no account be decoded. that's what you're able to desire to do with a demanding force you ought to furnish away because it extremely is going to erase all own suggestions.

2016-11-25 22:27:00 · answer #4 · answered by ? 4 · 0 0

never been involved ,except for having no brake lights, which i tried to defend, cos how can i see the back of my car when i am driving, however the officer finally agreed with me, if i promiced to have them fixed the same day, which i duly did.
i would imagne that they collect info like hire purchase companies, income tax people, unless there is anything really exciting to put down, i mean what else is there. i d theft is a crime, and nasty, so i believe all of us should have a chip, like our cats and dogs , that appears to work at present, desperate actions, sometimes need desperate remedies.

2007-01-20 06:34:53 · answer #5 · answered by doda 3 · 0 0

1. your computer leaves traces of itself as it travels the internet/web by leaving it's IP address behind.
2. information, even though you think it is deleted, is left on your "hard drive" in a designated location
3. also on your computer software are "log files" which tell the story of where you've been on the internet and what you have downloaded.
4. these files area easily seen and recovered by forensic experts

2007-01-20 06:50:30 · answer #6 · answered by Officer Baz Says... 2 · 0 0

Every where you go is on your hard drive,forever.
Remove and destroy the hard drive.

2007-01-20 06:27:23 · answer #7 · answered by Anonymous · 0 0

it is collected digitally.

2007-01-20 06:22:19 · answer #8 · answered by penniepusher J 1 · 0 0

fedest.com, questions and answers