04052025Sun
Last updateWed, 19 Mar 2025 3pm

Legal News

Computer Forensics Crime

Computer Crime is now more complicated than ever. Computer crime covers many different types of ‘traditional crimes’. In the past a murder was a simple murder investigation.

Now, a murder will no doubt involve the forensic examination of the suspect’s computer and mobile phone. This can be for evidence of the crime on the computer, (was the suspect emailing a friend about the crime?), for evidence on the mobile phone, (was the suspect videoing the crime on his telephone?), or, again with the mobile phone, was the suspect where they say they were at the time they suggest that they were there? Using the mobile phone and a relatively new science called Cell Site Analysis, this can be proven.

Detecting Computer Forensics Crime is not always easy. Crimes can include Inappropriate Email Usage, Email Abuse, Digital Fraud, IP Theft, E-Stalking, Breach of Contract, Computer Break-ins, Phone ‘Phreaking', Inappropriate Data Duplication, Digital Pornography, Inappropriate Internet Usage , Internet Abuse, Unauthorised Data Duplication, Bankruptcy Data Investigation, Forgeries, Murder, Disloyal Employees, Assault, Rape, 'Happy Slapping', Industrial Espionage, Theft, Private Investigation of Personal Computer, Private Investigation of Cellphones/Mobile Phone, Private Investigation of PDA, Blackberry Forensic Examination, SatNav forensics and many more.

Inappropriate Email Usage - This could be sending pornographic images to others using their email system.

Email abuse is simply that the user is utilising their email system for unauthorised emails, (this could be amongst other things, emailing friends, or sending 'spam').

Digital Fraud. This area covers a vast area, including DDoS, credit card duplication, keystroke logging and subsequent funds extractions etc

IP Theft - the theft of an organisations, (or individuals) Intellectual Property.

E-Stalking - Virtual Stalking. Following people to chat rooms, talking to people pretending you are someone else etc

Breach of Contract - Failing to observe the rules of a contract and using the computer for this purpose.

Computer Break-Ins - Also known as 'hacking'

Phone 'Phreaking'
- Imitating a phone to use another’s' phone account, therefore making calls on someone else’s phone bill.

Inappropriate Data Duplication - Copying files that are either copywrited or confidential information, the property of another person or organisation, without their permission

Digital Pornography - Using the computer for distribution of pornography

Inappropriate Internet Usage -
browsing websites that are not appropriate, (pornographic, gambling, paedophilic etc)

Bankruptcy Data Investigation
- Investigating a bankrupts computer to check that funds have not been laundered electronically

Forgeries
- Using the computer for duplicating bank notes, stock certificates etc

Murder - Checking the computer, mobile phone, PDA or other digital device for evidence relating to the crime, either proving guilt, or disproving guilt.

Disloyal Employees - Employees who have possibly sent client information to competitors, or employees who are deliberately sabotaging their company computer or computer systems.

Assault - Digital evidence of an actual assault, or proof of innocence of involvement of an assault.

Rape - Evidence that could prove a rape, or prove the innocence of a party accused of rape
.
'Happy Slapping' - evidence that a person has had involvement in Happy Slapping, (been beaten whilst onlookers video the assault, (normally on a mobile phone video recorder))

Industrial Espionage - Theft of Data from company with the intention of using the data against the company that owned it.

Theft - Digital evidence of a theft or the 'fencing' of stolen goods.

Private Investigation of a Personal Computer - Checking a personal computer for incriminating evidence of infidelity/financial wrongdoings etc.

Private Investigation of a Mobile Phone/Cellphones - Checking a mobile phone for incriminating evidence of infidelity/financial wrongdoings etc

Blackberry Examination - Checking a Blackberry for incriminating evidence of infidelity/financial wrongdoings etc.

Private Investigation of a Personal Digital Assistant, (PDA) - Checking a PDA for incriminating evidence of financial wrongdoings/infidelity etc

SatNav forensics - checking Satellite Navigation Systems to ensure that the accused was where he said he was.