Computer forensic is one of the crucial science in the modern society. It is worth noting that computer forensic has become an important science in the criminal justice system. This is because it entails identification of evidence that is found in digital storage media and the computers. Computer forensic has been used in resolving various cases in the criminal justice system. The BTK serial killer case was resolved through computer forensics. There is forensic evidence that was crucial in the case. In 2004, the serial killer began communicating with the police. This became a breakthrough for the police in the investigation. The communication was through Microsoft word. The police handed the disk to computer forensics. Computer forensics used various software to examine the floppy disk (Volonino, Anzaldua, & Godwin, 2007). The evidence analyzed the data and found out that it was modified at Christ Lutheran Church. Other forensic evidence available included the DNA analysis and handwriting at the letters that was sent by BTK. Analytically, computer forensics assisted in solving the BTK serial killer case.
Ibrahim al-Marashi is a known writer whose article was plagiarized by the U.K government. He was not cited, yet he was the original author of the article. Modifying the text of another author could still reveal some of the information. Some of the evidence are left in the word document. Glen Rangwala identified some similarities in the article and discovered that the dossier was a copied from an article written by Ibrahim al-Marashi. Through computer forensic, it was evident that the paper as plagiarized. The information that was used to prove plagiarism was found in the word document. A hidden revision log in word document showed the names of files and people who worked on it. The log from the dossier became the evidence in the case. The information found in word document proved plagiarism by the UK government. This was a major embarrassment to the government and a breakthrough in computer forensics in finding evidence.
E-mail evidence has been used in various trails. It is worth noting that email evidence has a tremendous effect on a case. Studies show that over 85% of adults communicate through email. This means that in the case of lawsuits, emails can play a key role as evidence (Moriarty, 2005). Email evidence has changed the way trials and cases are carried out. Some of the cases that were affected by emails include Jack Abramoff and Ronald Hale cases. Quantum Communication V. Star Broadcasting was a case that involved a breach of contract.
In Jack Abramoff case, the emails made a tremendous impact in the case. The investigation revealed that there were missing emails that are believed to be the exchanges between Abramoff and Bush administration. The missing emails affected the congressional investigation in the case. The emails that Jack Abramoff sent to Susan Ralston. Jack Abramoff messed up by responding to the white house address of Ralston. The emails were to be sent to the Republican National Committee (RNC). The department of justice was put to task to release various emails and documents. The emails evidence showed that most White House officers used RNC email account in consulting business. The emails acted as evidence in the case and revealed the frauds that were carried out by White House officers.
The emails made an impact in the case of Quantum Communications and Star Broadcasting. The emails acted has evidence in the case and changed the outcome of the entire business deal. The emails acted has evidence in proving the breach of contract. The background communications through emails showed the activities that were going on without the knowledge of the other party.
Criminals can attempt to cover up trails of emails using various ways. The move to cover up emails is to prevent computer forensics from finding the evidence. Criminals can cover up email trails by demagnetizing the hard drive and destroying it. Criminals can also use disposable emails. This is an email whereby the message is deleted immediately after reading. Criminals also hide IP address and ensure that the emails are anonymous (Moriarty, 2005). This has made it difficult for computer forensics to trace the emails during the investigation. Also, criminals can cover up emails by editing the sections of emails that is turned over to the investigating department. Emails play a crucial role in criminal justice, but criminals have become knowledgeable in tampering with evidence.
Using the computer forensics knowledge, it is possible to get email evidence for an email trail. Technological footprints of the emails are essentials in tracing the path of the emails. One of the ways is by using Internet protocol address in identifying the computer that was used to send emails. Also, these become a strong evidence is the service provider that is linked to the IP address is willing to testify. The missing emails can also be retrieved from the hard drive. The hard drive can reveal the originality of the email and the parties involved. The evidence will be accepted through proper authentication of the emails. After finding the emails trails, it is crucial to ensure that the evidence is admissible. Authenticating the emails can also be supported through imaging process. This is the bit-stream process that is carried on the hard drive.
References
Moriarty, L. J. (2005). Criminal justice technology in the 21st century. Springfield, Ill: Charles C. Thomas.
Volonino, L., Anzaldua, R., & Godwin, J. (2007). Computer Forensics: Principles and practices. Upper Saddle River, N.J: Pearson/Prentice Hall.