Computer Forensics: Convicting Criminals Based on Computer Usage Evidence

Digital forensics is one of the most significant ways that computer usage evidence may be utilized to prosecute a criminal. Evidence gathered from computer use may be utilized in various ways, such as tracking user behavior, retrieving lost data, and examining internet traffic. Recovering lost files is one method of convicting a crime (Baltzan, 2008). For instance, in a recent case, investigators discovered deleted text conversations from a man’s cell phone that linked him to the crime and led to his conviction for murder (Cohen, 2021). A file is not instantly removed from the hard disk when deleted from a computer. Instead, the file is classified as “removed,” allowing fresh data to be written. Nonetheless, erased files can be retrieved and used as proof if the proper methods and instruments are employed.

Investigating a criminal’s online behavior is another technique to bring them to justice. A person’s behavior may be gleaned from online activities, including connections, hobbies, and behaviors. For instance, in a cyberstalking case, authorities could monitor the suspect’s online behavior and use it as proof to find him guilty (Todd et al., 2021). Ultimately, monitoring user activity can be utilized to prove a criminal’s guilt. User activity can show trends that can be utilized to support a suspect’s case. For instance, in a fraud case, detectives could monitor a suspect’s actions and utilize them as proof to find him guilty (Matanky-Becker & Cockbain, 2022). In conclusion, there are several ways that computer usage evidence may be used to prosecute offenders, including tracking user behavior, analyzing internet traffic, and retrieving deleted information. In order for law enforcement agencies to be able to successfully combat cybercrime, they need to have the tools and the training necessary to obtain and analyze electronic evidence.

References

Baltzan, P., Phillips, A., Lynch, K., & Blakey, P. (2008). Business-driven information systems. New York: McGraw-Hill/Irwin.

Cohen, R. L. (2021). Prosecution for Sticks, Stone, and Words that Killed Conrad Roy: A Look at the Free Speech Fundamentalism Behind Michelle Carter’s Conviction. Indiana Journal of Law and Social Equality, 9(2), 1.

Matanky-Becker, R., & Cockbain, E. (2022). Behind the criminal economy: using UK tax fraud investigations to understand money laundering myths and models. Crime, Law and Social Change, 77(4), 405-429. Web.

Todd, C., Bryce, J., & Franqueira, V. N. (2021). Technology, cyber stalking, and domestic homicide: Informing prevention and response strategies. Policing and Society, 31(1), 82-99. Web.

Cite this paper

Select style

Reference

LawBirdie. (2024, May 22). Computer Forensics: Convicting Criminals Based on Computer Usage Evidence. https://lawbirdie.com/computer-forensics-convicting-criminals-based-on-computer-usage-evidence/

Work Cited

"Computer Forensics: Convicting Criminals Based on Computer Usage Evidence." LawBirdie, 22 May 2024, lawbirdie.com/computer-forensics-convicting-criminals-based-on-computer-usage-evidence/.

References

LawBirdie. (2024) 'Computer Forensics: Convicting Criminals Based on Computer Usage Evidence'. 22 May.

References

LawBirdie. 2024. "Computer Forensics: Convicting Criminals Based on Computer Usage Evidence." May 22, 2024. https://lawbirdie.com/computer-forensics-convicting-criminals-based-on-computer-usage-evidence/.

1. LawBirdie. "Computer Forensics: Convicting Criminals Based on Computer Usage Evidence." May 22, 2024. https://lawbirdie.com/computer-forensics-convicting-criminals-based-on-computer-usage-evidence/.


Bibliography


LawBirdie. "Computer Forensics: Convicting Criminals Based on Computer Usage Evidence." May 22, 2024. https://lawbirdie.com/computer-forensics-convicting-criminals-based-on-computer-usage-evidence/.