Research Paper: Forensics Model

Pages: 8 (2206 words)  ·  Style: APA  ·  Bibliography Sources: 6  ·  Level: College Junior  ·  Topic: Education - Computers  ·  Buy This Paper


[. . .] It is helpful that this data be reviewed through text files, which can be analyzed manually or using other tools. The Bulk Extractor, current version 1.4.1, is able to do a series of forensic analyses on data in hard drives, cell phones, usb memory sticks and computer discs. Materials managed and available through Digital Corp and downloaded at:, Instructions available as well. (Garfinkel, 2012).

Summation of Prepared Court Documents

1. I am a certified forensics examiner for the City of Winslow. My identification is 238723, and I have been with the organization for 10 years.

2. My education includes: xyz university, abc university, over 400 hours in complimentary forensics training courses and I am Board Certified in Forensics analysis. I have taught courses and seminars at over 200 venues.

3. I was contacted by Detective X in the City of Winslow Police Department. He produced a duly executed search warrant for the premises, signed by Judge Y on March 1, 2014.

4. Under Detective X's instructions, On March 2, 2014 at 1014am, I entered the premises of Widget Corporation, 124 Main Street, Winslow, X, and proceeded to the desk noted in personnel files from Widget of Mr. X Didit.

5. I photographed and digitally preserved the scene, and also acquired previous digital materials from Detective X.

6. Due to the impact on the personal life and preservation of Constitutional Rights, it was important to calculate the hash value of the various electronic and digital devices found at the scene. Because electronic evidence is becoming so important in criminal identification, it is important to understand the authentication and use of electronic devices. The 2006 Federal Rules of Civil Procedure were amended to establish new standards concerning the preservation and discovery of electronically stored devices, and hash values are important to authenticating such devices. A hash value is a unique numerical identifier, a digital fingerprint, if you will, that is assigned to a file, group of files or portion of a file based on a standard mathematical algorithm generated (MD5 and SHA). This means that each value, or each file, is distinctive and can be tracked for alteration. Hashing is the term we use to guarantee that the original data set remains original and may be used as legal, unaltered, evidence (Federal Evidence Review, 2008).

7. I personally examined the photographs taken by original investigating officers and compared with my own, finding no alteration of any materials or evidence. Further, a thorough fingerprint and DNA analysis was done; all personnel who had visited the scene prior (law enforcement or Widget employees) were also fingerprinted and DNA samples taken, if not on file, to eliminate them from crime scene materials.

8. The items were inventoried and then checked by two additional staff members, both of whom signed notarized affidavits to the veracity of the materials (Romano, 2005).

9. All materials collected were tagged and given unique identification numbers; all digital and electronic data was analyzed by professional forensic analysts, and all materials were stored securely and documented using appropriate levels of Federal Evidence Law (Romano).

10. The information I provided to the Court in terms of actual materials found in Mr. Didit's workspace, the analysis and inventory of the materials, and the verbatim download of his browsing, email and data storage habits are all signed and sworn materials, preserved as evidence also under appropriate levels of Federal Evidence Law (Romano).


Evident Crime Scene Products. (2014, January). Orion-Lite DNA Kit. Retrieved from

Federal Evidence Review. (2008, September 18). Using Hash values in Handling Electronic Evidence. Retrieved from

Garfinkel, S. (2012, November). Using bulk_extractor for digital forensics triage and cross-drive analysis. Retrieved from

Krotski, M. (2011, November). Effectively Using Electronic Evidence Before and At Trial. Retrieved from U.S. Department of Justice:

National Institute of Justice. (2008, April 14). Securing and Evaluating the Scene. Retrieved from Office of Justice Programs:

Romano, L. (2005, June 1). Electronic Evidence and the Federal Rules. Retrieved from Digital Commons: [END OF PREVIEW]

Four Different Ordering Options:

Which Option Should I Choose?

1.  Buy the full, 8-page paper:  $28.88


2.  Buy + remove from all search engines
(Google, Yahoo, Bing) for 30 days:  $38.88


3.  Access all 175,000+ papers:  $41.97/mo

(Already a member?  Click to download the paper!)


4.  Let us write a NEW paper for you!

Ask Us to Write a New Paper
Most popular!

Digital Evidence Forensics and the Law Research Paper

Forensic Psychologist's Legal Responsibilities and Rights Research Paper

Ethics in Forensic Accounting Essay

Forensic Research: The Psychology of the Criminal Research Paper

Incident Response and Computer Forensic Investigation Research Paper

View 220 other related papers  >>

Cite This Research Paper:

APA Format

Forensics Model.  (2014, March 7).  Retrieved July 22, 2019, from

MLA Format

"Forensics Model."  7 March 2014.  Web.  22 July 2019. <>.

Chicago Format

"Forensics Model."  March 7, 2014.  Accessed July 22, 2019.