Page 55 - VERITAS Vol.2 Issue 2
P. 55
A STUDY TO DESIGN A
SOFTWARE MODULE FOR A
FORENSIC SOFTWARE
Veritas Volume: 2, Issue: 2, Pages:46-62
Mr. Varun Gupta
Ms. Sneha R
Mr. Madhukar.K
Mr. Jeasmon Thomas
INTRODUCTION
Technologies are used to perpetrate crimes, and law enforcement in
creasingly employs computer systems to fight crime because of the
rising science of virtual proof forensics. The information recorded or
transferred in digital shape that may be utilised in the courtroom is re-
ferred to as virtual evidence. It may be located on a PC (Personal Com-
puter), fixed disc, or a cellular cell phone. Digital crimes, or e-crimes,
consisting of child pornography or credit card fraud, are often con-
nected with virtual proof. Virtual proof, however, is being employed
within the prosecution of all types of crimes, not solely for e-crimes.
Suspects’ email or cell telephone documents may encompass important
proof about their purpose, whereabouts at the time of the crime, and
relationships with different suspects. For instance, in 2005, a floppy
disk led the government to the BTK (Bind, Torture, Kill) serial assas-
sin, who had prevented police arrest for the reason that 1974 and killed
at least ten people. The medical gathering, evaluation, and renovation
of statistics contained in electronic media that can be used as proof in
a court of regulation are known as virtual forensics. Now police regu-
lation enforcement groups are incorporating virtual forensics into their
infrastructure to combat e-crime and acquire relevant virtual evidence
for all offences.
46
Veritas Volume: 2, Issue: 2