We are independent & ad-supported. We may earn a commission for purchases made through our links.

Advertiser Disclosure

Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.

How We Make Money

We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently from our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What is Computer Forensics?

Deanna Baranyi
By
Updated May 17, 2024
Our promise to you
WiseGeek is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At WiseGeek, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

Computers are a very large part of most people’s daily lives. In fact, the number of homes that have a personal computer has grown exponentially in the past five to ten years. Consequently, computer crime, specifically identity theft and other computer-generated financial crimes, has grown in number and has become an increasingly serious issue.

Many municipal police departments have a computer forensics team. However, in years to come they will become even more widespread. Computer forensics uses special techniques and skills to recover, authenticate, and analyze electronic information and data. It is specifically helpful for police officers and investigators who are attempting to solve a crime where a computer has been used.

A specialist in the field of computer forensics usually has broad working knowledge and specific software that works on the devices that store data. This can include hard drives and other computer media. The computer forensics specialist can determine sources of digital evidence, such as e-mails and other documentation. She also knows how to preserve the digital evidence, analyze it, and present the findings to investigators and, if necessary, before a court of law.

Cybercriminals have become increasingly complex and intelligent in the crimes they commit. Many of the most complicated crimes committed by cybercriminals are successful because the criminals had installed defensive measures on their computers. These countermeasures work to prevent a computer forensics investigation. They can be in the form of computer viruses, electromagnetic damage, or other computerized traps. In fact, if a computer forensics specialist is not careful, the countermeasures may destroy evidence in its entirety and make it irretrievable.

A computer forensics investigation usually starts when a search warrant to seize a suspect’s computer and other digital media is granted. The data on the suspect’s computer is copied and then that data is analyzed using the investigator’s technical equipment and software. The suspect’s computer becomes evidence. Consequently, it must remain in a tight chain of evidence to keep it pristine.

Some investigators specialize in decoding passwords. They are also well aware of the importance of not turning off a computer that is running. If they must turn the machine off, they copy all the data off of the hard drive. Sometimes the data is not even visible to the eye. There may not be a visible file. These hidden files are gems to a computer forensics team.

Electronic mail or e-mail is one of the main methods of communication for most people. Some investigators specialize in preserving, retrieving, and analyzing e-mail files. They can be stored on the hard drive, an external network, or on a removable hard drive, to name just a few. Sophisticated software lets investigators search through thousands of emails – including those which the suspect had deleted from his system.

WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Deanna Baranyi
By Deanna Baranyi , Former Writer
Deanna Baranyi, a freelance writer and editor with a passion for the written word, brings a diverse skill set to her work. With degrees in relevant fields and a keen ability to understand and connect with target audiences, she crafts compelling copy, articles, and content that inform and engage readers.

Discussion Comments

Deanna Baranyi

Deanna Baranyi

Former Writer

Deanna Baranyi, a freelance writer and editor with a passion for the written word, brings a diverse skill set to her...
Learn more
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.