Sunday 19 July 2015

ROLE OF A COMPUTER FORENSIC EXAMINER IN AN INVESTIGATION



Electronic and digital devices have the scope of storing a vast amount of information regarding a person’s personal and professional life.  It is a reliable repository of crucial information that needs to be extracted and presented to verify or nullify the events in a legal proceeding. Digital Media & Storage Devices including computers, laptops and tablets becoming a potential source of evidence in all litigations has made the involvement of a digital forensic expert inevitable. 

http://www.pennfoster.edu/~/media/Images/Tabs/Programs/ForensicComputerExaminerCert.ashx

A Computer Forensic Examiner plays an integral part in the investigation and successful resolution of a case. While forensic analysts are known by different names such as computer forensic analysts, digital forensic investigators/ specialists/ experts, their job essentially revolves around evidence management and representation. They are experienced in identifying, organizing and preserving data or evidence in an efficient manner in order to provide accurate proofs in support of statements during a trial. 

The role of a Computer forensic specialist is not limited to evidence recovery and presentation. Unbeknownst to most, forensic analysts are capable of providing a new direction to a case and make a huge difference in courtrooms with their analytical ability, critical thinking and expert presentation of facts in a convincing manner. Here is a brief summary of duties performed by these expert professionals to aid an investigation:

Evidence Recovery, Management & Representation
This is the primary responsibility of a forensic examiner. Whether it is an encrypted document or deleted files, digital forensic specialists are capable of converting them into formats acceptable in courts. They have the ability and knowledge to analyze and track evidence in any form like documents, files, videos, images, encrypted data, deleted/ hidden information, emails, messages, identifying modifications, altercation and recent digital and internet activities.
http://www.invsolutionsllc.net/wp-content/uploads/2011/08/Computer-Forensics.png

Besides dealing with a variety of evidence, analysts are trained to locate data/ evidence from any digital source. They deploy tools, techniques and critical analysis to break through complex gadgets or day to day devices like computers, laptops, cell phones, tablets, SD cards, peripheral as well as connecting devices in addition to network servers, social media activity tracking and evaluating financial statements, records and accounts. Forensic Examiners have a knack for wading through a vast amount of data and locating the required information.

Correlating Events & Statements
Information is of no use if it cannot prove a point or lead the case towards success. It is a crucial aspect of forensic investigation to establish timeline of events, verify or nullify the statements of witnesses and present witnesses to support facts and circumstances. Digital Forensic Analysts are experienced and skilled in analyzing the information and compiling them to establish a coherent inferences or conclusions.

 http://www.pegasus-investigations.co.uk/wp-content/uploads/2011/07/computer-forensics.jpg
Expert Witness Testimony
The witness presented by an expert digital forensic analyst aided by digital evidence acts as a solid way of presenting testimony. Forensic analysts are trained to present evidence in a convincing manner as well as explain jargons and complex technicalities in simple user friendly terms that can be easily admitted by judges & juries. The efficient representation of facts & figures and the inferences drawn thereby by an experienced forensic examiner ensures the successful resolution of a legal proceeding. 

However, before approaching an investigative agency to aid you in computer forensic examination you need to make certain that the organization is reputed, experienced and the required resources and skills to handle privileged information obtained during the investigation in a confidential manner.