The primary goal of this research is to raise awareness regarding legal loopholes and enabling technologies, which facilitate acts of cyber crime. In pursuing these avenues of inquiry, the author seeks to identify systemic impediments which obstruct police investigations, prosecutions, and digital forensics interrogations. The secondary objective of this research encourages policy makers to reevaluate strategies for combating the ubiquitous and evolving threat posed by cybercriminality. Research in this paper has been guided by the firsthand global accounts via the author’s core involvement in the preparation of the Comprehensive Study on Cybercrime (UNODC, 2013) and is keenly focused on core issues of concern, as voiced by the international community. Continue reading
This write-up is just to demonstrate that how one’s browser history can go off track misleading the examiner. An investigator can identify it by noticing the odd in history, sample given in Figure 2. Let’s first take a closer look at this page below (Figure 1)– the URL (says cnn.com) and the title of tab … Continue reading
Can you tell us something about your background and why you decided to work in the field of applied trauma psychology? I have had a very mixed career; I have worked in medical research, as a retail operations director, property development, Head of a counselling service and running my own company. I think that the … Continue reading
First published January 2010 by John Irvine http://johnjustinirvine.com http://twitter.com/John_Irvine For the better part of the past thirteen (thirteen?!) years, I have been a computer forensic examiner. Sure, the title varies by job and location — digital forensic analyst, media exploiter, computer forensic investigator — but the job is always the same. Computer forensic examiners delve … Continue reading