Computers are also a 'witness' in court
In 1993, the saying
In 1993, the phrase " On the Internet, no one knew you were just a dog " became "truth." However, that concept is completely wrong because many specialized software will determine who composes information and what is doing.
A few years ago, Scott Cooper, an expert expert at the Insync consulting firm (USA), was awarded a large sum of money after seeing a 20-page contract of the customer company lost the number "1 ". If not discovered in time, the company will only be considered as a 5% stake (not 15%) in a software group and they must receive payment of 32 million USD instead of 96 million USD.
Cooper used a variety of different monitoring tools, then reconstructed information based on a time frame to determine when, how and how data was intentionally changed. " In theory, you can't completely erase any traces stored in any digital storage device, including mobile phones or TiVo (digital TV receiver) ," said John Colbert. , Managing Director of the company specializing in providing Guidance Software digital data recovery software, affirmed.
Dennis L. Rader, the murderer with the BKT nickname, who once brutally killed 10 people in Kansas (USA) from 1974 to 1991, was arrested after he sent a floppy disk to the police. Using Guidance Software's EnCase inspection program, local police found many files deleted on floppy disks, which contain the name of Rader.
Thanks to EnCase software, investigators gathered enough evidence to confirm that Scott Peterson was the killer of his wife, Laci. During the time of the assassination, Peterson used a computer to access a number of websites announcing the tidal status in San Francisco Bay, where his wife's body was found. " All information is still on the machine even though Peterson has deleted the History folder ," Colbert said. " We can retrieve all data from passwords, photos to account information. Unlike paper documents, digital files are scattered in different locations on the hard drive. Moreover, Microsoft Word programs often create temporary files during editing ".
Currently, some software is already on the market to support data insertion, the most popular is the Evidence Eliminator program. However, Michael A. Gold, president of Discovery Technology, recommends: " Using specialized software to remove traces only makes inspectors suspect that you are doing something shady . ".
Scott Cooper concluded: " Computer is also a witness ".
Trong Nghia
- General brains - science or fake?
- Intel was again ... led to court
- How is the mandarin king in the ancient Hue court welcome other Tet people?
- Judge the crime with ... computer software
- For the first time, quantum computers have been proven to be more powerful than classical computers
- The ghost is mysterious in a Mexican court
- February 13: Galileo faces the Church court
- 7 things to avoid when using a computer
- The Dutch court asked Google to submit Gmail user information
- The computer has 5 senses as people are about to come true
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system