Exposing Criminals Using Digital Forensics

The aim of the digital forensic process is to safeguard any evidence in its original state while conducting a structured investigation by collecting, categorizing, and validating the digital data for the purpose of getting information regarding a particular past event. In a digital forensic case, it mainly involves three processes that are important for the retrieval of the information which is needed. The three processes are:Acquisition: This is the process where the information which is in the hard drive that is in the investigation is duplicated and the information is blocked or the writer is blocked so as to prevent the information that is on the hard drive to be altered or modified.Analysis: At this stage, the information which was found in the hard drive is examined carefully. This stage involves scrutiny of the data by the experts in preparation to present evidence in the court of law. This evidence can be retrieved by using various techniques such as keyword searches, whereby they will search for items such as the list of the names or account numbers and such like things.Reporting: In this part, the experts involved should provide a vivid report on their findings in regard to the case under study or investigation.SummaryThis report scrutinizes the involvement of Clyde Barrow in fraud. The investigation also covers the fact that if Clyde Barrow and Bonnie Parker had been communicating. In the investigation conducted it was established that Clyde Barrow was involved in the fraud, in addition, it was established that the two suspects had been communicating with each other. Also, we were able to establish that Clyde Barrow was involved in terrorist activities. The evidential facts are as follows:- Clyde Barrow was dealing in counterfeit money. This can be proven by the fact that there were images of the counterfeit money in his hard drive. The images upon investigation were found to be illegal, i.e. they were not legal tender.- Clyde barrow and Bonnie Parker not only knew about each other, but they had also been communicating via e-mail. In our investigations, we were able to establish that the two had, in fact, had exchanged e-mails.