Académique Documents
Professionnel Documents
Culture Documents
I. INTRODUCTION
On January 10th, 2007, in an apartment in 2280 Gemes
street, in Florida, Buenos Aires city, Argentina, Solange
Grabenheimers lifeless body was found, with four stabbings in
her neck and signs of choking. The main suspect of the murder:
her friend and roommate Lucila Frend [1] in the left on Image
1.
COMPUTER FORENSICS
Identification
Collection
Preservation
Analysis
Presentation
Image 2 Steps of Computer Forensics
A. Identification
Once the crime has been committed, an identification
which consists on knowledge and verification of the criminal
act, must be initiated; generally, it is done with an assessment
of resources, scope and objectives to carry out the
investigation, which must be done by a suitable teamwork,
with defined limits, functions and responsibilities.
Additionally, a previous investigation must be done to describe
the current situation, the facts, the affected parties, possible
suspects, the infrastructure that has been affected or violated, in
order to understand the situation and define an action path to
follow according to the investigation.
Remote sessions
relevant to case.
Physical
topology.
and
configuration
data
and
monitoring
network
E. Presentation
During the process of the implementation of Computer
Forensics, Documentation has been mentioned many times. Is
an important step of the process because it will allow to show
accurate, understandable, clear and complete data in a written
report with the steps that were carried out in the analysis
process, the discovery and interpretation of each step to
provide a conclusion for each of them. In most cases, the
document is presented to institutions that do not have enough
technic knowledge of the subject, and so it must be written in
an easy and understandable way.
In general, the presentation of two documents is
recommended. The first is an Executive Report that
summarizes the most important data during the investigation
without going into technical details. This report has to be very
clear, accurate, and brief, leaving out any questions. The
second document, a Technical Report, details more precisely
all the analysis performed on the evidence, highlighting
techniques and found results, emphasizing observations, and
leaving behind personal opinions.
IV. CONCLUSIONS
After knowing about Computer Forensics, recognizing that
there are several difficulties for its correct implementation is
necessary. These difficulties range from the proper academic
and technic training of the forensic technicians, to the laws of
each country and the way that they are implemented, and how
digital evidence is provided in each legal case. But difficulties
become challenges for everyone involved in the process:
legislators, judges, researchers, computer specialists.
Every forensic discipline evolves as time passes because of
new discoveries, new scientific methodologies are developed,
and implementation techniques are improved in order to favor
the technicians work and analysis made every day. The
computer field does the same thing, because it suffers changes
on a daily basis, which implies greater training and preparation.
REFERENCES
[1] S. Amaya, La Nacin, La Nacin, 04 July 2011. [En
lnea]. Available: http://www.lanacion.com.ar/1386331-casosolange-que-podria-llegar-a-condenar-o-absolver-a-lucilafrend. [ltimo acceso: 10 February 2016].
[2] M. G. Noblett y M. M. Pollit, FBI, FBI, October 2000.
[En
lnea].
Available:
https://www.fbi.gov/aboutus/lab/forensic-sciencecommunications/fsc/oct2000/index.htm/computer.htm.
[ltimo acceso: 10 February 2016].
[3] FBI, FBI, FBI, April 2000. [En lnea]. Available:
https://www.fbi.gov/about-us/lab/forensic-sciencecommunications/fsc/april2000/swgde.htm/. [ltimo acceso:
15 February 2016].
[4] Wikipedia, Wikipedia, Wikipedia, 22 September 2014.
[En
lnea].
Available:
https://es.wikipedia.org/wiki/Edmond_Locard#Principio_de_i
ntercambio_de_Locard. [ltimo acceso: 2 March 2016].
[5] C. d. T. e. Criminalstica, Ministerio Pblico Fiscal, July
2015.
[En
lnea].
Available:
http://www.mpf.gob.ar/capacitacion/files/2015/07/ManualCriminalistica.pdf. [ltimo acceso: 3 March 2016].