Computers are also a 'witness' in court

In 1993, the saying

Picture 1 of Computers are also a 'witness' in court
In 1993, the phrase " On the Internet, no one knew you were just a dog " became "truth." However, that concept is completely wrong because many specialized software will determine who composes information and what is doing.

A few years ago, Scott Cooper, an expert expert at the Insync consulting firm (USA), was awarded a large sum of money after seeing a 20-page contract of the customer company lost the number "1 ". If not discovered in time, the company will only be considered as a 5% stake (not 15%) in a software group and they must receive payment of 32 million USD instead of 96 million USD.

Cooper used a variety of different monitoring tools, then reconstructed information based on a time frame to determine when, how and how data was intentionally changed. " In theory, you can't completely erase any traces stored in any digital storage device, including mobile phones or TiVo (digital TV receiver) ," said John Colbert. , Managing Director of the company specializing in providing Guidance Software digital data recovery software, affirmed.

Dennis L. Rader, the murderer with the BKT nickname, who once brutally killed 10 people in Kansas (USA) from 1974 to 1991, was arrested after he sent a floppy disk to the police. Using Guidance Software's EnCase inspection program, local police found many files deleted on floppy disks, which contain the name of Rader.

Thanks to EnCase software, investigators gathered enough evidence to confirm that Scott Peterson was the killer of his wife, Laci. During the time of the assassination, Peterson used a computer to access a number of websites announcing the tidal status in San Francisco Bay, where his wife's body was found. " All information is still on the machine even though Peterson has deleted the History folder ," Colbert said. " We can retrieve all data from passwords, photos to account information. Unlike paper documents, digital files are scattered in different locations on the hard drive. Moreover, Microsoft Word programs often create temporary files during editing ".

Therefore, file deletion is only "conceptual". In other words, the system only types that file name out of the database. One file cannot be recovered if it is inserted with a string of 0s and 1s. Yet in the corporate world, many employees are still "impartial" to use internal computers to send them. illegal, then simply delete the file and rest assured that all evidence no longer exists.

Currently, some software is already on the market to support data insertion, the most popular is the Evidence Eliminator program. However, Michael A. Gold, president of Discovery Technology, recommends: " Using specialized software to remove traces only makes inspectors suspect that you are doing something shady . ".

Scott Cooper concluded: " Computer is also a witness ".

Trong Nghia
Update 12 December 2018
« PREV
NEXT »
Category

Technology

Life

Discover science

Medicine - Health

Event

Entertainment