Skip to main content

Automated and Manual Forensic Examinations

  • Reference work entry
  • First Online:
Encyclopedia of Criminology and Criminal Justice
  • 186 Accesses

Synonyms

Automated; Computer forensics; Manual

Overview

Constant changes in the technology of computers and small-scale digital devices create a number of challenges for computer forensic examiners and the law enforcement community. Two of these challenges are the identification of devices and media and the retrieval of the data from these devices coupled with having the proper training in forensic techniques to recover digital data properly. Automated tools and command-line-driven techniques, known as manual forensics, are the two methods used to retrieve digital evidence from these devices. Today’s automated tools are often a more efficient method for forensic examiners to collect and analyze digital evidence than command-line procedures, which gain the same result. Depending on the situation and the type of device and media, different forensic methodologies are used. The computer forensic process is the identification, collection, preservation, analysis, and reporting of evidence...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,350.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 4,999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading and References

  • Allen W (2006) Computer forensics. IEEE Secur Priv 59–62. Accessed 6 Oct 2011. http://dsonline.computer.org

  • Bell G, Boddington R (2010) Solid state drives: the beginning of the end for current practice in digital forensic recovery? J Digit Foren Secur Law 5(3):1–20

    Google Scholar 

  • Britz M (2009) Computer forensics and cyber crime: an introduction, 2nd edn. Prentice Hall, Columbus

    Google Scholar 

  • Craiger JP (2005) Computer forensics procedures and methods. In: Bidgoli H (ed) Handbook of information security, vol 3. Wiley, Hoboken

    Google Scholar 

  • Crozby P (2001) Methods in behavioral research, 10th edn. McGraw Hill, Boston

    Google Scholar 

  • Dixon P (2005) An overview of computer forensics. IEEE Potent 24:1–10

    Google Scholar 

  • Lewis P (2008) Understanding the basics of computer forensics. EDPACS 37:3

    Google Scholar 

  • National Institute of Standards and Technology (2001) Computer forensics tool testing program. Accessed 6 Oct 2011. http://www.cftt.nist.gov/

  • National White Collar Crime Center (NW3C) (2010) “TUX4N6™ user guide.” Accessed 6 Oct 2011. www.nw3c.org

  • National White Collar Crime Center (NW3C) (2011) Identifying and seizing electronic evidence training. www.nw3c.org

  • Schweha J, Inch S (2008) Remote forensics may bring the next sea change in e-discovery: are all networked computers now readily accessible under the revised federal rules of civil procedure? J Digit Foren Secur Law 3(3):5–28

    Google Scholar 

  • Scientific Working Group on Digital Evidence (SWGDE) (2006) Best practices for computer forensics. Accessed 6 Oct 2011. http://www.swgde.org/

  • Scientific Working Group on Digital Evidence (SWGDE) (2006) Data integrity within computer forensics. Accessed 20 Oct 2011. http://www.swgde.org/

  • Scientific Working Group on Digital Evidence (SWGDE) (2008) Special considerations when dealing with cellular phones. Accessed 24 Oct 2011. http://www.swgde.org/

  • U. S. Department of Justice (2009) Searching and seizing computers and obtaining electronic evidence in criminal investigations. Office of Legal Education Executive Office for United States Attorneys

    Google Scholar 

  • U.S. Department of Justice (2004) Forensic examination of digital evidence: a guide for law enforcement. NIJ Special Report

    Google Scholar 

  • U.S. Department of Justice (2008) Electronic crime scene investigation: a guide for first responders, 2nd edn. NIJ Special Report

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jessica Bennett .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Bennett, J., Hopper, R. (2014). Automated and Manual Forensic Examinations. In: Bruinsma, G., Weisburd, D. (eds) Encyclopedia of Criminology and Criminal Justice. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5690-2_613

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5690-2_613

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5689-6

  • Online ISBN: 978-1-4614-5690-2

  • eBook Packages: Humanities, Social Sciences and Law

Publish with us

Policies and ethics