There are very few people who don’t have some sort of computer access
every day. As a result, computer crime is increasing very quickly. The
Federal Bureau of Investigations has a mission to identify online sexual
predators who target and exploit children, to identify those who seek
to steal intellectual property and to tear down the criminal organizations
who are involved in Internet fraud.
The FBI says that over $100 billion is the cost of cybercrime each year.
However, computer forensics has also been used in murder cases, such as
the serial murder BTK case and the Laci Peterson murder. When it comes
to sex crimes, an investigation using computer forensics is done the same
way as other investigations. Highly skilled and trained personnel follow
specific protocol when gathering evidence from the computer and the computer itself.
Cyber forensics has traditionally focused on “dead-box” analysis.
This means that investigators analyze data at rest — the computer
is off when a copy is made of the hard drive. This has been the technique
used for the last 15 years without much change. Now, however, “live-box”
forensics, utilizes one to four gigabytes of information on the computer
that is often overlooked. It gives investigators access to the information
that is in the computer’s memory chips. It also gives investigators
access to whatever might be on the live hard drive. When the computer
is shut down, all of that information on the memory chips is lost.
Using a combination of dead-box and live-box forensics gives investigators
the computer’s complete data for use as evidence in the case.
If you have been charged with an
Internet sex crime, it’s essential that any evidence to be used against you is carefully
explored by a defense expert. An attorney who is well-versed in cyber
sex crimes can be a valuable ally for you.
Source: Evidence Technology Magazine, “Computer Forensics,” Rich Cummings, accessed Oct. 12, 2015