Phases of Digital Forensic Investigation


 

Prior to beginning work on this discussion, read all of this week’s required resources.

Digital forensic investigations have posed many interesting dilemmas for criminal investigators over the years. From advancing methods of digital storage to increasingly portable computer devices, cyber criminals have rapidly engineered technology with which law enforcement often struggles to keep up.

For this discussion you must analyze the digital forensic investigation process. In your initial post you must address the following points.

  • Analyze two phases of the digital forensic investigation process.
  • Explain the major challenges inherent to each phase.
  • Explain the methods utilized by law enforcement investigators to detect and prevent cyber crime in each identified phase.
  • Examine the ways criminal investigators retrieve and analyze data from various mediums in each identified phase.
  • Analyze the technical aspects of the various mediums encountered by investigators during these two phases of digital forensic investigations.
  • Evaluate legal issues that investigators encounter in efforts at detecting and preventing cyber crime in each identified phase.

 

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 12: Evolution of Digital Forensics
  • Chapter 13: Acquisition and Examination of Forensic Evidence

Article

Cohen, C. L. (2007). Growing challenge of computer forensics (Links to an external site.). The Police Chief: The Professional Voice of Law Enforcement, 74(3). Retrieved from http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1136&issue_id=32007

  • This article examines some of the issues related to the investigation of cyber crimes and computer forensics. It will assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

Geraghty, M. (2007). The technical aspects of computer-facilitated crimes against children (Links to an external site.). The Police Chief: The Professional Voice of Law Enforcement, 74(3). Retrieved from http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1137&issue_id=32007

  • This article analyzes the technical aspects of cyber crime as it relates to children. It will assist in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

McHenry, J. & Gorn, M. (2016). Digital forensic examination: A case study. FBI Law Enforcement Bulletin, 1, 1-3. Retrieved from https://leb.fbi.gov/

  • The full-text version of this article is available through the EBSCOHost database in the University of Arizona Global Campus Library. The authors examine a digital forensic examination case study pertaining to cyber crimes against children. It will assist you in the development of this week’s discussion posts.

Recommended Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).  New York: Routledge.

  • Chapter 11: Cybercrime and criminological theories

Articles

Bell, A. E. (2007). Investigating international cybercrimes (Links to an external site.). The Police Chief, 74(3). Retrieved from http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1135&issue_id=32007

  • This article examines various aspects of the investigation of global cyber crimes. It may assist you in the development of this week’s activities.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

Websites

MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com/)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.