Forensics Journal - Stevenson University 2011 | Page 33
FORENSICS JOURNAL
When using software programs, investigators must ensure that the
evidence is removed from the seized computer in accordance with the
law. Many computer software programs and tools have the ability to
identify digital coding and illicit videos and photographs. When these
codes are shared online between computers, investigators can detect
the Internet Protocol address responsible for sending and receiving
the illicit images.
Forensic evidence is widely used in court proceedings; however, handling of computer evidence and chain of custody must be meticulous.
Problems occur with the mishandling of computer evidence when
traces of important evidence are hidden. A simple misunderstanding
or miscommunication can cause a mistaken conviction of an innocent person. During the recent case State of Connecticut v. Julie Amero
in Norwich, Connecticut, Amero was wrongly convicted of “the
delinquency of minors because a spyware-infected school computer
in her class displayed pornographic sites’ pop-ups during her lecture.
Amero’s conviction, which was later overturned, demonstrated a
lack of technical awareness within the legal system” (Peisert, Bishop,
& Marzullo, 2008). It is obvious that the judicial system has not
adequately defined the parameters of computer forensics evidence and
its admissibility.
According to Howard, hashing is a step in the forensic investigation which involves authenticating and identifying the electronic
information discovered through the imaged computer media. Hashing authentication ensures that the forensic image and the original
computer media are identical. Hashing is:
• “The process of taking computer data as a string of
info ɵ