Synonyms
Overview
Constant changes in the technology of computers and small-scale digital devices create a number of challenges for computer forensic examiners and the law enforcement community. Two of these challenges are the identification of devices and media and the retrieval of the data from these devices coupled with having the proper training in forensic techniques to recover digital data properly. Automated tools and command-line-driven techniques, known as manual forensics, are the two methods used to retrieve digital evidence from these devices. Today’s automated tools are often a more efficient method for forensic examiners to collect and analyze digital evidence than command-line procedures, which gain the same result. Depending on the situation and the type of device and media, different forensic methodologies are used. The computer forensic process is the identification, collection, preservation, analysis, and reporting of evidence...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading and References
Allen W (2006) Computer forensics. IEEE Secur Priv 59–62. Accessed 6 Oct 2011. http://dsonline.computer.org
Bell G, Boddington R (2010) Solid state drives: the beginning of the end for current practice in digital forensic recovery? J Digit Foren Secur Law 5(3):1–20
Britz M (2009) Computer forensics and cyber crime: an introduction, 2nd edn. Prentice Hall, Columbus
Craiger JP (2005) Computer forensics procedures and methods. In: Bidgoli H (ed) Handbook of information security, vol 3. Wiley, Hoboken
Crozby P (2001) Methods in behavioral research, 10th edn. McGraw Hill, Boston
Dixon P (2005) An overview of computer forensics. IEEE Potent 24:1–10
Lewis P (2008) Understanding the basics of computer forensics. EDPACS 37:3
National Institute of Standards and Technology (2001) Computer forensics tool testing program. Accessed 6 Oct 2011. http://www.cftt.nist.gov/
National White Collar Crime Center (NW3C) (2010) “TUX4N6™ user guide.” Accessed 6 Oct 2011. www.nw3c.org
National White Collar Crime Center (NW3C) (2011) Identifying and seizing electronic evidence training. www.nw3c.org
Schweha J, Inch S (2008) Remote forensics may bring the next sea change in e-discovery: are all networked computers now readily accessible under the revised federal rules of civil procedure? J Digit Foren Secur Law 3(3):5–28
Scientific Working Group on Digital Evidence (SWGDE) (2006) Best practices for computer forensics. Accessed 6 Oct 2011. http://www.swgde.org/
Scientific Working Group on Digital Evidence (SWGDE) (2006) Data integrity within computer forensics. Accessed 20 Oct 2011. http://www.swgde.org/
Scientific Working Group on Digital Evidence (SWGDE) (2008) Special considerations when dealing with cellular phones. Accessed 24 Oct 2011. http://www.swgde.org/
U. S. Department of Justice (2009) Searching and seizing computers and obtaining electronic evidence in criminal investigations. Office of Legal Education Executive Office for United States Attorneys
U.S. Department of Justice (2004) Forensic examination of digital evidence: a guide for law enforcement. NIJ Special Report
U.S. Department of Justice (2008) Electronic crime scene investigation: a guide for first responders, 2nd edn. NIJ Special Report
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this entry
Cite this entry
Bennett, J., Hopper, R. (2014). Automated and Manual Forensic Examinations. In: Bruinsma, G., Weisburd, D. (eds) Encyclopedia of Criminology and Criminal Justice. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5690-2_613
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5690-2_613
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5689-6
Online ISBN: 978-1-4614-5690-2
eBook Packages: Humanities, Social Sciences and Law