Introduction to Computer Forensics



Thousands of years ago in China, fingerprints were used on all business documents in the same way signatures are used today—to provide approval of the document, or authorization to perform any actions that the document outlines. This was the very first application of forensics in the world. Since then, law enforcement around the world has slowly developed the forensic skills and tools to investigate crime scenes, using forensic sciences and methods to learn what happened. An example of this is Song Ci, an outstanding forensics scientist in Ancient China who documented his lifetimes of experience and thoughts on forensic medicine in his book “Washing Away of Wrongs: Forensic Medicine”. These works were the first of their kind in the world (Fig. 1.1).


  1. 1.
  2. 2.
  3. 3.
    S. L. Garfinkel. Carving contiguous and fragmented files with fast object validation. Digital Investigation, vol. 4, pp. 2–12, 2007CrossRefGoogle Scholar
  4. 4.
    Thomas Laurenson. Performance Analysis of File Carving Tools. In Proc. of Security and Privacy Protection in Information Processing Systems, IFIP Advances in Information and Communication Technology, Volume 405, 2013, pp. 419–433Google Scholar
  5. 5.
    NSPCC study finds that cyberbullies target ‘one in five children’.
  6. 6.
    Yuri Gubanov, Oleg Afonin. Why SSD Drives Destroy Court Evidence, and What Can Be Done About It
  7. 7.
    Nasir Memon. Challenges of SSD Forensic Analysis - Digital Assembly.
  8. 8.
  9. 9.
  10. 10.
  11. 11.
    Charter of Fundamental Rights of the European Union 2000 (2000/C364/01), Available: Accessed on 13th Feb 2014
  12. 12.
    European Union (EU), “Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data,” European Community (EU), Tech. Rep., 1995Google Scholar
  13. 13.
  14. 14.
    B.C.M. Fung, K. Wang, R. Chen, P.S. Yu, “Privacy-Preserving Data Publishing: A Survey of Recent Developments,” in ACM Computing Surveys, Vol. 42, No. 4, Article 14, 2010CrossRefGoogle Scholar
  15. 15.
  16. 16.
    X. Lin, C. Zhang, T. Dule. On Achieving Encrypted File Recovery. In: X. Lai, D. Gu, B. Jin, Y. Wang, H. Li (eds) Forensics in Telecommunications, Information, and Multimedia. e-Forensics 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 56. Springer, Berlin, HeidelbergGoogle Scholar
  17. 17.
  18. 18.
  19. 19.
    Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition.
  20. 20.
    A password for the Hawaii emergency agency was hiding in a public photo, written on a Post-it note.
  21. 21.
  22. 22.
  23. 23.
    Casey, Eoghan (2004). Digital Evidence and Computer Crime, Second Edition. Elsevier. ISBN 0-12-163104-4. Archived from the original on 2017-04-10Google Scholar
  24. 24.
    Daniel J. Ryan; Gal Shpantzer. “Legal Aspects of Digital Forensics” (PDF). Archived (PDF) from the original on 15 August 2011. Retrieved 31 August 2010Google Scholar
  25. 25.
    Sarah Mocas (February 2004). “Building theoretical underpinnings for digital forensics research”. Digital Investigation. 1(1): 61–68. ISSN 1742-2876. Scholar
  26. 26.
    US v. Bonallo, 858 F. 2d 1427 (9th Cir. 1988)Google Scholar
  27. 27.
    Federal Rules of Evidence #702. Archived from the original on 19 August 2010. Retrieved 23 August 2010Google Scholar
  28. 28.
    S. McCombie and M. Warren. Computer Forensic: An Issue of Definitions. Proc. the first Australian computer, Network and information forensics, 2003Google Scholar
  29. 29.
    Kruse II, Warren and Jay, G. Heiser. Computer Forensics: Incident Response Essentials. Addison-Wesley, 2002Google Scholar
  30. 30.
    Eoghan Casey. “Digital Evidence and Computer Crime”, ACADEMIC Press, 2009Google Scholar
  31. 31.
    Rodney McKemmish. “What is Forensic Computing?”. Australian Institute of Criminology.
  32. 32.
  33. 33.
  34. 34.
  35. 35.
  36. 36.

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Department of Physics and Computer Science, Faculty of ScienceWilfrid Laurier UniversityWaterlooCanada

Personalised recommendations