A Comprehensive Digital Forensic Investigation Model and Guidelines for Establishing Admissible Digital Evidence

MPhil Thesis

https://repository.uel.ac.uk/item/85xwz

Log in to edit

Download files

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Advertisement

Advertisement

An Insightful Analysis of Digital Forensics Effects on Networks and Multimedia Applications

  • Review Article
  • Published: 31 January 2023
  • Volume 4 , article number  186 , ( 2023 )

Cite this article

dissertations on digital forensics

  • Aishwarya Rajeev   ORCID: orcid.org/0000-0003-1938-3964 1 , 2 &
  • P. Raviraj 3  

204 Accesses

3 Citations

Explore all metrics

Humans have benefited greatly from technology, which has helped to raise standards of living and make important discoveries. But there are a lot of hazards associated with using it. The prevalence of digital video through mobile smartphone applications like WhatsApp and YouTube as well as web-based multimedia platforms are likewise gaining in importance as crucial. But there are also global security issues that are arising. These difficulties could cause significant issues, especially in cases where multimedia is a crucial factor in criminal decision-making, such as in child pornography and movie piracy. Consequently, copyright protection and video authentication are required in order to strengthen the reliability of using digital video in daily life. A tampered film may contain the relevant evidence in a legal dispute to convict someone of a violation or clear a guilty party of wrongdoing. Hence, to develop it is crucial to have reliable forensic techniques that would enhance the justice administration systems and enable them to reach just verdicts. This article discusses numerous forensic analysis fields, including network forensics, audio forensics, and video forensics. In this study, many algorithms such as Random Forest, Multilayer Perceptron (MLP), and Convolutional Recurrent Neural Networks (CRNN) are used for implementing different types of forensic analysis. Also, image fusion is used which can provide more information than a single image and extract features from the original images. This study came to the conclusion that the random forest provides the finest results for network forensic analysis with an accuracy of 98.02 percent. A lot of work has been done during the past years, through an analysis of current methods and machine learning strategies in the field of video source authentication and the study aims to provide a thorough summary of that work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

dissertations on digital forensics

Similar content being viewed by others

dissertations on digital forensics

A comprehensive taxonomy on multimedia video forgery detection techniques: challenges and novel trends

dissertations on digital forensics

ENCVIDC: an innovative approach for encoded video content classification

dissertations on digital forensics

Impact of Media Forensics and Deepfake in Society

Wen CY, Chen JK. Multi-resolution image fusion technique and its application to forensic science. Forensic Sci Int. 2004;140:217–32.

Article   Google Scholar  

Ali Z, Imran M, Alsulaiman M. An automatic digital audio authentication/forensics system. IEEE Access. 2017. https://doi.org/10.1109/ACCESS.2017.2672681 .

Gangwar A, Fidalgo E, Alegre E, Gonzáles V. Castro, pornography and child sexual abuse detection in image and video: a comparative evaluation, Proceedings of the 8th International Conference on Imaging for Crime Detection and Prevention, ISBN: 978-1-78561-687-7. 2017, pp. 37–42.

Perez M, Avila S, Moreira D, Moraes D, Testoni V, Valle E, Goldenstein S, Rocha A. Video pornography detection through deep learning techniques and motion information. Neurocomputing. 2017;230:279–93.

Slay J. Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques, Mobile networks and management. In: 9th international conference, MONAMI (2017), Melbourne, Australia, December 13–15; 2017. Proceedings. Springer. Vol. 235, p. 30.

Xiao J, Li S and Xu Q. Video Based Evidence analysis and extraction in digital forensics investigation. IEEE Access; 2019.

Hosler B, Mayer O, Bayar B, Zhao X, Chen C, Shackleford JA, Stamm MC. A video camera model identification system using deep learning and Fusion. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE; 2019. pp. 8271–8275.

Chhabra GS, Singh VP, Singh M. Cyber forensics framework for big data analytics in IoT environment using machine learning. Multimed Tools Appl. 2020;79:15881–900.

Orozco ALS, Huamán CQ, Álvarez DP, Villalba LJG. A machine learning forensics technique to detect post-processing in digital videos. Future Gener Computer Syst. 2020;111:199–212.

Qamhan MA, Altaheri H, Meftah AH, Muhammad G, Alotaibi YA. Digital audio forensics: microphone and environment classification using deep learning. IEEE Access. 2021. https://doi.org/10.1109/ACCESS.2021.3073786 .

Sachdeva S, Ali A. Machine learning with digital forensics for attack classification in the cloud network environment. Int J Syst Assur Eng Manag. 2022;13(Suppl 1):S156–65.

Abbasi A, Javed AR, Yasin A, Jalil Z, Kryvinska N, Tariq U. A large-scale benchmark dataset for anomaly detection and rare event classification for audio forensics. IEEE Access. 2022. https://doi.org/10.1109/ACCESS.2022.3166602 .

Akbari Y, Al-Maadeed S, Elharrouss O, Khelifi F, Lawgaly A, Bouridane A. Digital forensic analysis for source video identification: a survey. Forensic Sci Int: Digital Investig. 2022;41:301390.

Google Scholar  

Akbari Y, Al-Maadeed S, Almaadeed N, Al-ali A, Khelifi F, Lawgaly A, et al. A new forensic video database for source smartphone identification: description and analysis. IEEE Access. 2022. https://doi.org/10.1109/ACCESS.2022.3151406 .

Neale C, Kennedy I, Price B, Yijun Yu, Nuseibh B. The case for zero trust digital forensics. Sci Int: Digit Investig. 2022;40:301352.

Download references

This article has not received any funding.

Author information

Authors and affiliations.

GSSSIETW, Affiliated to VTU Belagavi, Mysuru, Karnataka, India

Aishwarya Rajeev

Department of CSE, CIT, Affiliated to VTU Belagavi, Ponnampet, Karnataka, India

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Aishwarya Rajeev .

Ethics declarations

Conflict of interest.

It is stated by the authors that they have no conflicting interest.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Advances in Computational Intelligence for Artificial Intelligence, Machine Learning, Internet of Things and Data Analytics” guest edited by S. Meenakshi Sundaram, Young Lee and Gururaj K S.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Rajeev, A., Raviraj, P. An Insightful Analysis of Digital Forensics Effects on Networks and Multimedia Applications. SN COMPUT. SCI. 4 , 186 (2023). https://doi.org/10.1007/s42979-022-01599-8

Download citation

Received : 07 October 2022

Accepted : 17 December 2022

Published : 31 January 2023

DOI : https://doi.org/10.1007/s42979-022-01599-8

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Web-based multimedia platforms
  • Copyright protection
  • Image fusion
  • Machine learning strategies
  • Find a journal
  • Publish with us
  • Track your research
  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Dissertations / Theses on the topic 'Digital Forensic investigations'

Create a spot-on reference in apa, mla, chicago, harvard, and other styles.

Consult the top 48 dissertations / theses for your research on the topic 'Digital Forensic investigations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

Marziale, Lodovico. "Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1027.

De, Souza Pedro. "A Chain of findings for digital investigations." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/40842.

Hansen, Tone. "A Digital Tool to Improve the Efficiency of IT Forensic Investigations." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40232.

Patterson, Farrah M. "The implications of virtual environments in digital forensic investigations." Master's thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4819.

Liljekvist, Erika, and Oscar Hedlund. "Uncovering Signal : Simplifying Forensic Investigations of the Signal Application." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44835.

Hargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.

Hargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.

Roussel, Bruno. "Les investigations numériques en procédure pénale." Thesis, Bordeaux, 2020. http://www.theses.fr/2020BORD0075.

Montasari, Reza. "The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice." Thesis, University of Derby, 2016. http://hdl.handle.net/10545/620799.

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Etow, Tambue Ramine. "IMPACT OF ANTI-FORENSICS TECHNIQUES ON DIGITAL FORENSICS INVESTIGATION." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97116.

Alqahtany, Saad. "A forensically-enabled IaaS cloud computing architecture." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9508.

Sonnekus, Michael Hendrik. "A comparison of open source and proprietary digital forensic software." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.

Van, Ramesdonk Paul. "Continued forensic development - investigation into current trends and proposed model for digital forensic practitioners." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/20707.

Rule, Samantha Elizabeth. "A Framework for using Open Source intelligence as a Digital Forensic Investigative tool." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017937.

Wang, Mengmeng, and 王萌萌. "Temporal analysis on HFS+ and across file systems in digital forensic investigation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B50900122.

Barbosa, Akio Nogueira. "Método para ranqueamento e triagem de computadores aplicado à perícia de informática." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-14062016-081553/.

Al, Mutawa Noora Ahmad Khurshid. "Integrating behavioural analysis within the digital forensics investigation process." Thesis, University of Central Lancashire, 2018. http://clok.uclan.ac.uk/25412/.

LeRoi, Jack. "A forensic investigation of the electrical properties of digital audio recording." Thesis, University of Colorado at Denver, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1556863.

In media forensics, the devices; e.g. computers, smart phones, still/video cameras, audio recorders, and software; e.g. video, audio, and graphics editors, file and disk utilities, mathematical computation applications, are, for the most part, black boxes. The design specifications are usually proprietary and the operating specifications may be incomplete, inaccurate, or unavailable. This makes it difficult to validate the technology, but using it without validation could discredit a practitioner's findings or testimony. The alternative is to test the device or program to determine relevant characteristics of its performance.

An important and common device in media forensics is the portable digital audio recorder used to record surveillance and interviews. This type can also be used to record the alternating current (AC) waveform from the mains power. While small variations in the AC frequency (ENF) can be forensically important, distortion in the recording can affect its value in adjudication or investigation. A method is presented to evaluate aspects of a recorder's operation that can cause distortion. Specifically, the method measures the noise generated by the recorder's electronics in its input and amplifier circuits. The method includes a procedure to isolate the recorder from environmental sources of noise. The method analyzes the broadband noise floor produced by the range of recording conditions and recorder settings. It also analyzes the noise amplitude for the harmonics for the mains frequency.

Ademu, Inikpi. "A comprehensive digital forensics investigation model and guidelines for establishing admissible digital evidence." Thesis, University of East London, 2013. http://roar.uel.ac.uk/3992/.

Homem, Irvin. "Towards Automation in Digital Investigations : Seeking Efficiency in Digital Forensics in Mobile and Cloud Environments." Licentiate thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-130742.

Al-Morjan, Abdulrazaq Abdulaziz. "An investigation into a digital forensic model to distinguish between 'insider' and 'outsider'." Thesis, De Montfort University, 2010. http://hdl.handle.net/2086/4402.

Nikooazm, Elina. "Validation des logiciels d'expertise judiciaire de preuves informatiques." Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020021.

Mankantshu, Mninawe Albert. "Investigating the factors that influence digital forensic readiness in a South African organisation." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8504.

AlMarri, Saeed. "A structured approach to malware detection and analysis in digital forensics investigation." Thesis, University of Bedfordshire, 2017. http://hdl.handle.net/10547/622529.

Hewling, Moniphia Orlease. "Digital forensics : an integrated approach for the investigation of cyber/computer related crimes." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/326231.

Waltereit, Marian [Verfasser], and Torben [Akademischer Betreuer] Weis. "On the Digital Forensic Investigation of Hit-And-Run Accidents / Marian Waltereit ; Betreuer: Torben Weis." Duisburg, 2021. http://d-nb.info/1236539818/34.

Nordin, Anton, and Felix Liffner. "Forensiska Artefakter hos Mobila Applikationer : Utvinning och Analys av Applikationen Snapchat." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40207.

Federici, Corrado <1965&gt. "The twofold role of Cloud Computing in Digital Forensics: target of investigations and helping hand to evidence analysis." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amsdottorato.unibo.it/6694/.

Jones, Eric Douglas. "Forensic Investigation of Stamped Markings Using a Large-Chamber Scanning Electron Microscope and Computer Analysis for Depth Determination." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1237.

Homem, Irvin. "LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902.

Breitinger, Frank [Verfasser], Stefan [Akademischer Betreuer] Katzenbeisser, Harald [Akademischer Betreuer] Baier, and Felix [Akademischer Betreuer] Freiling. "On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations / Frank Breitinger. Betreuer: Stefan Katzenbeisser ; Harald Baier ; Felix Freiling." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2014. http://d-nb.info/1110901852/34.

Bouchaud, François. "Analyse forensique des écosystèmes intelligents communicants de l'internet des objets." Thesis, Lille, 2021. http://www.theses.fr/2021LILUI014.

Lalanne, Vincent. "Gestion des risques appliquée aux systèmes d’information distribués." Thesis, Pau, 2013. http://www.theses.fr/2013PAUU3052/document.

Arthur, Kweku Kwakye. "Considerations towards the development of a forensic evidence management system." Diss., 2010. http://hdl.handle.net/2263/26567.

Alharbi, Soltan Abed. "Proactive System for Digital Forensic Investigation." Thesis, 2014. http://hdl.handle.net/1828/5237.

Grobler, Cornelia Petronella. "DFMF : a digital forensic management framework." Thesis, 2012. http://hdl.handle.net/10210/6365.

Adedayo, Oluwasola Mary. "Reconstruction in Database Forensics." Thesis, 2015. http://hdl.handle.net/2263/43777.

Fei, B. K. L. (Bennie Kar Leung). "Data visualisation in digital forensics." Diss., 2007. http://hdl.handle.net/2263/22996.

Delgado, Manuel. "Combater o crime económico com armas digitais: o papel do open-source." Master's thesis, 2012. http://hdl.handle.net/10071/8063.

Valjarevic, Aleksandar. "A comprehensive and harmonised digital forensic investigation process model." Thesis, 2015. http://hdl.handle.net/2263/50812.

Pooe, El Antonio. "Developing a multidisciplinary digital forensic readiness model for evidentiary data handling." Thesis, 2018. http://hdl.handle.net/10500/25316.

張緹柔. "A Study on Investigation and Digital Forensic for Wireless Cyber Crime." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/k5896p.

Ndara, Vuyani. "Computer seizure as technique in forensic investigation." Diss., 2014. http://hdl.handle.net/10500/13277.

Bernardo, Bruno Miguel Vital. "Toolbox application to support and enhance the mobile device forensics investigation process - breaking through the techniques available." Master's thesis, 2021. http://hdl.handle.net/10362/113177.

Joshi, Abhishek Shriram. "Image Processing and Super Resolution Methods for a Linear 3D Range Image Scanning Device for Forensic Imaging." 2013. http://hdl.handle.net/1805/3414.

Breitinger, Frank. "On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations." Phd thesis, 2014. https://tuprints.ulb.tu-darmstadt.de/4055/1/20140717_Dissertation_Breitinger_final.pdf.

Lochner, Hendrik Thomas. "Kartering van selfoontegnologie." Diss., 2007. http://hdl.handle.net/10500/554.

AIP Publishing Logo

Data privacy preservation in digital forensics investigation

  • Article contents
  • Figures & tables
  • Supplementary Data
  • Peer Review
  • Reprints and Permissions
  • Cite Icon Cite
  • Search Site

Ayush Kumar Verma , Krishnan Ramanathan; Data privacy preservation in digital forensics investigation. AIP Conf. Proc. 3 October 2022; 2519 (1): 030051. https://doi.org/10.1063/5.0109813

Download citation file:

  • Ris (Zotero)
  • Reference Manager

As we know, in a digital forensic investigation, the investigators extract evidence from different types of digital media. However, the extraction method itself unlocks the way for digital forensic investigators to encroach the privacy of the individual. To detect fraud, an investigator collects and analyzes the digital evidence connected to the fraud that has taken place and presents it in court to prove convict. There are no legal or technical structures in place that can keep a check on the investigation procedures to prevent this breach of privacy. Privacy of personal data of a user is stated in the United Nations Declaration of Human Rights. In this ever-changing world, the increasing use of computing devices creates vast volumes of personal data, and correspondingly, in digital investigation, there is an increased presumption of accountability and protection for the rights of a user governing data privacy. So, in this research study, we have tried to respond to this concern by analyzing the perceptions about data privacy preservation and issues related to digital forensics investigation from three perspectives, i.e., user, forensic investigator, and technology, and put forward a framework that respects user privacy as well as ensures a forensically sound digital investigation.

Sign in via your Institution

Citing articles via, publish with us - request a quote.

dissertations on digital forensics

Sign up for alerts

  • Online ISSN 1551-7616
  • Print ISSN 0094-243X
  • For Researchers
  • For Librarians
  • For Advertisers
  • Our Publishing Partners  
  • Physics Today
  • Conference Proceedings
  • Special Topics

pubs.aip.org

  • Privacy Policy
  • Terms of Use

Connect with AIP Publishing

This feature is available to subscribers only.

Sign In or Create an Account

  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Forensics Digest

All about Forensics

Recent Dissertation Topics in Forensic Science

This article serves as a compass, guiding readers through a diverse array of recent dissertation topics that encapsulate the multifaceted nature of forensic research. From digital forensics to forensic psychology, the chosen dissertation topics reflect the evolving challenges and advancements in solving complex legal puzzles.

Forensic DNA Analysis:

  • “Next-Generation Sequencing (NGS) in Forensic DNA Profiling: Opportunities and Challenges”
  • “The Impact of DNA Transfer and Secondary DNA Transfer in Forensic Investigations”
  • “Ethical Implications of DNA Phenotyping: A Critical Analysis”

Digital Forensics:

  • “Artificial Intelligence in Digital Forensic Analysis: A Comprehensive Review”
  • “Cloud Forensics: Investigating Digital Crimes in Cloud Computing Environments”
  • “Deepfake Detection Techniques: Safeguarding Digital Evidence Integrity”

Forensic Anthropology:

  • “Facial Approximation in Forensic Anthropology: Integrating 3D Modeling Techniques”
  • “The Role of Forensic Anthropologists in Mass Graves Investigations”
  • “Advancements in Skeletal Trauma Analysis for Forensic Purposes”

Forensic Toxicology:

  • “Metabolomics in Forensic Toxicology: Profiling Endogenous and Exogenous Compounds”
  • “Designer Drugs: Analytical Approaches for the Detection of Novel Psychoactive Substances”
  • “Forensic Challenges in Analyzing Postmortem Fluids for Toxicological Investigations”

Forensic Psychology:

  • “The Impact of Jury Bias on Forensic Psychologists’ Testimonies: A Case Study Analysis”
  • “Virtual Reality Applications in Forensic Psychology Training: Enhancing Investigative Skills”
  • “Exploring the Ethical Dilemmas in Forensic Psychological Assessments”

Forensic Pathology:

  • “Cardiac Biomarkers in Forensic Pathology: Exploring their Role in Cause of Death Determination”
  • “The Use of Postmortem Imaging in Forensic Pathology: A Comparative Analysis”
  • “Forensic Aspects of Pediatric Traumatic Brain Injuries: Patterns and Challenges”

Forensic Odontology:

  • “Age Estimation in Subadults: Integrating Dental and Skeletal Methods in Forensic Odontology”
  • “Digital Methods in Bite Mark Analysis: Enhancing Accuracy and Reliability”
  • “Role of Dental Records in Disaster Victim Identification: A Global Perspective”

Forensic Entomology:

  • “Forensic Entomogenomics: Unraveling New Dimensions in Time of Death Estimation”
  • “Environmental Factors Influencing Insect Colonization on Decomposing Remains: A Forensic Study”
  • “The Use of Entomotoxicology in Forensic Investigations: Current Trends and Applications”

Share this post:

Reader interactions.

' data-src=

January 7, 2024 at 2:22 am

thank you for this post. I needed to submit a topic for my dissertation on Monday and you guys saved me big time

Leave a Reply Cancel reply

e-mail address: [email protected]

Tel 7639361621

DEFENDER

Digital forensics assists in the analysis, inspection, identification, and preservation of evidence (digital) collected on a wide variety of devices. It’s the professional domain of studying, identifying, conserving, protecting, extracting, documenting, and creating digital information in different ways. The goal is to evaluate the information as part of the civil or criminal investigation once it has been turned into contextual information using appropriate kinds of rationale . In digital forensics, the tasks below must be completed.

  • Analysis of text, images and videos
  • Cracking passwords
  • Clustering files
  • Searching data
  • Executable analysis

Through this article, we will provide you with expert analysis on various digital forensics project topics and doing research on them. We claim to be one of the best project supporters in the world mainly due to the following reasons.

As we are in the field of guiding research projects in topics related to digital forensics for more than 15 years we have gained huge expertise and ample field knowledge to aid and assist you throughout your research. We are ready to offer you the following

What we support for digital forensics projects? 

  • Comparative study on different digital forensic project topics through case studies
  • The mechanisms, process model and methodologies followed in digital forensics
  • Tools including the testing tools, new algorithms, techniques and process of validation involved in digital forensics
  • Acknowledgement and standardization methods used

In this regard, you can get complete technical support along with ultimate assistance in collecting resources, conducting surveys for data collection, making Crisp algorithms and codes implementation in real-time, project simulation, writing thesis and paper publication , and many more. So you can approach us with huge confidence. Let us now have an overview of digital forensics. 

Top 10 Digital Forensics Thesis Topics

Overview of Digital Forensics 

Read the overview here. We provide you with the research agenda consisting of some basic categories that are important in any digital forensics project topics below

  • Modelling the cases
  • Modelling the process of investigation
  • SAN and NAS
  • IDS based automatic data collection
  • Investigating the server and non-work station
  • Tools for simultaneous working on evidence and images
  • Providing the timeline of user history
  • Generating traffic
  • Carving and imaging in parallel
  • Analysis of RAM
  • Legal implications
  • Interrupting execution for real-time acquisition
  • Collecting evidence without permanent memory
  • Honeypots in control and investigation mechanism
  • Capture devices in network audit attempts based on hardware
  • Control systems based on IDS
  • Radio frequency forensics at 900 MHz

Recent advancements in science and technology have taken these basic processes of digital forensics given above to the next level. Huge scope of research and development can be observed in digital forensics project topics . So we suggest you take up research in any digital forensic project topics which are sure to give you a promising career. Let us now have a look at the major steps involved in digital forensics,

What are the important steps in digital forensics? 

As we stated before, digital forensics involves identifying evidence, acquiring and analyzing them, and finally presenting the most needed interpretations for further study. In this aspect let us now look into these significant processes in detail.

  • The first step in the process of digital forensic investigation is identifying the evidences
  • Evidences are different for different scenarios and you should be able to look into to the situations promptly
  • In case of illegal graphic images you shall see the web history and various image files
  • For intrusions look into rootkits, logs and hidden files
  • In case of intelligence see the documents and emails
  • After identifying the evidences the second step involved is acquiring them
  • First of all the state of computer should be prevented from getting altered
  • Bitwise copying of hard disc and copying memory before the system gets turned off is recommended
  • The network connection States have to be saved and connection with the network have to be terminated
  • While copying hard disk you should boot it in reliable media like Linux live CD and DOS floppy
  • Be sure to detach the hard disc and place it in any trusted systems
  • Evidence analysis is primarily based on the skill sets of an analyst and the nature of evidence collected
  • Higher importance have to be given to aggregation of evidences, correlating them, filtering, transforming and generating metadata
  • In pre analysis period or during acquisition you shall give priority 2 aggregation and transformation of evidence using data recovery and unification processes
  • Also while generating metadata be sure to categorise, index and hash them
  • Understanding the difference between evidence and data plays a key role in utilisation of information for evidence mapping, contextualization and isolation
  • The final step in the digital forensic processes is the presentation of information
  • While presenting information be sure to create reports on trusted evidences
  • It is also the duty of a digital forensic analyst to present the role played by a given evidence in the case being investigated

Usually, these are the four steps involved in digital forensics. The analysts train themselves by handling various cases and having deep analysis over them. In order to get the perspective of experienced analysts and Research experts , you shall reach out to us at any time. We are here to support you in every aspect of your project. Let us now see the challenges and issues in digital forensics.

Despite the advancement of digital information forensics , a variety of difficulties persist. Let us see some of the important digital forensics issues faced these days. 

Challenges in digital forensics 

  • Establishing approaches that adapt well over unexpected and previous unforeseen digital threats
  • Building approaches that extend well enough to large amounts of biometric information among different population groupings
  • Quantifying patterns in electronically altered information to verify the abuser of an attack
  • Providing security of biometrics information and making it threat resistant
  • Providing anonymity and confidential details in social media could reveal critical personal information

As we have handled ample projects in digital forensics , we are highly qualified and able to solve any kind of issues associated with them. Now let us look into different digital forensics datasets. What are the existing data sets for digital forensics projects?

Available Datasets for Digital Forensics

  • It consists of 11530 images
  • 27450 ROI annotated objects
  • 6929 segments
  • These are available in 20 classes
  • It contains 9963 images
  • 24640 annotated objects in more than 20 different classes

You can get a more detailed description of these datasets, their usage, source, and discovery once you reach out to us. We are here to give you practical descriptions and simple explanations to help you in using such datasets . Let us now talk about various methodologies in digital forensics

What are the methods for digital forensics? 

  • Outgoing firewalls can be used for inspecting the outbound communications
  • Encrypted communications can be intercepted using man in the middle attack
  • Intruder targets for the system or set and activities of the intruders are monitored
  • It also aims in identifying the intruder
  • System and log files integrity has to be monitored
  • Sensitive file alterations must be alerted to the administrator
  • Examination and identification of hosts for guarding against unauthorized access
  • Determination of hosts and their respective services along with the purpose

For algorithms, codes, and programming languages used in these methodologies, you can contact our technical support team.  Does digital forensics need coding?  Of course yes. So let us now talk about the best programming languages for all digital forensic project topics

Best Programming Languages for Digital Forensics Projects 

  • C++ is commonly characterized as C’s brother
  • It consists of some mixes of advanced math which are like meth and steroids
  • C++ is a superb programming language that is mainly dependent on the source code of C
  • Many operating systems are built on the C programming language
  • It’s a lightweight, adaptable, and effective programming language which can handle a wide range of functions like cryptographic, image analysis, and sockets network
  • SQL is extensively utilized for data maintenance and retrieval as a result of recent proliferation of data storage devices
  • Attackers are also progressively influencing the language in order to destroy or steal information
  • SQL injections, for instance, make use of SQL deficiencies to extract or change information stored on computers
  • This is a programming language for building web pages on the web server
  • Since PHP is used to develop the majority of websites, knowing how to defend against attackers is a must
  • DDoS (denial-of-service) cyber-attacks, for instance, are designed to render web programs inaccessible to the authorized consumers
  • You could create powerful alternatives to safeguard online applications using PHP programming experience along with abilities in all other languages including JavaScript
  • The Java programming language provides numerous applications in different fields of cyber security
  • For illustration, digital attackers utilize it to invert copyrighted software programs in order to find and expose weak points
  • When it comes to payloads management, penetration testers frequently utilize Java to configure high-scaling hosts
  • Mastering Java enables pen testing simpler, which is among the most important jobs of a cyber-security practitioner
  • Java coding is used by professional ethical hackers to demonstrate effective, ethical systems
  • Java is a great suggestion for cyber specialists since it is more dynamic than languages such as C++
  • Ethical hackers can use Java to design vulnerability testing applications that can run on a variety of systems
  • JavaScript is an advanced programming language that is known as the web’s “lingua franca” 
  • The Internet runs on JavaScript, which is its fundamental technology
  • The language is what gives websites their interaction
  • Cross-site scripting, for instance, is an attack based on JavaScript where the attacker injects malware into a website
  • If you’d like to grab cookies, target event controllers, and perform cross-site scripting, JavaScript is the way to go
  • JavaScript libraries include NodeJS, jQuery and ReactJS
  • As a consequence of the language’s extensive use, programs and infrastructure that employ it are prime target

The list of excellent computer languages for forensic science presented here is by no means comprehensive. You might discover one language better suited to any particular function than most others, depending on your individual utilization. 

How about using python for digital forensics?

  • Python is a powerful programming language which is gaining in popularity amongst cyber security professionals
  • It’s getting more popular thanks to its emphasis on readability of coding, precise and uncomplicated syntax, and a large variety of libraries
  • You would use the language to transmit TCP packets to systems, analyse viruses, and build intrusion detection mechanisms without relying on third-party utilities

In these ways, every programming language has its own advantages and limitations with respect to digital forensics . We have been using python in projects of digital forensics for many years and so we are very well experienced in using python libraries and tools for these projects . Now we will provide you some more insight into using python for digital forensics research. 

Why Python for Digital forensics projects? 

The following are some of the distinctive aspects of the Python programming language which makes it an excellent choice for digital forensics project management

  • Numerous pre-installed modules – Python’s extensive built-in modules are a fantastic tool for conducting a full digital forensic examination
  • Syntax Simplicity – Python’s syntax is clear in comparison to many other languages, making it much easier to understand and utilize during digital forensics
  • Support and Help – As Python is an open source software, it has a large development and users to support it

Also, you can get advice from the experts who have been handling python projects since their inception into the digital field. We will also give you tips regarding code implementation and algorithm writing. Let us now talk about python programming especially in digital forensics

Implementing Digital forensics Thesis Topics for students with source code

Digital forensics using Python programming

  • Once it comes to digital forensic, network security, and penetration testing, experts typically rely on a variety of programming languages, tools and software platforms
  • In digital forensics, Parrot Security OS, Kali Linux, MetaSploit, and a range of additional technologies are utilized
  • These tools include pre-installed programs that consumers can utilize regardless of understanding the internal design, algorithms or computational strategy for execution

Python is thus a popular programming language for tasks such as cyber defense, penetration testing, and digital forensics . All of the below tasks can indeed be accomplished without the need for a third-party solution and utilizing Python’s basic programming

  • Simulation of attacks and Port scanning
  • Web browser fingerprints and cloned websites
  • Website load creation and testing
  • Scanning of wireless networks and mail server access
  • Developing methods for detecting and preventing intrusions
  • Traffic transmission in the network

Interact with our technical experts to have much more ideas on the successful digital forensics project implemented using python in real-time . You can get our engineers deep insights into python forensic tools. Let us now look into the digital forensics python libraries

Python Libraries for Digital Forensics 

  • A Python-based internet traffic analysis and manipulation program
  • Scapy allows researchers to investigate packet manipulations
  • In addition, you could decode and collect packets from a variety of protocols
  • In contrast to Dshell, it gives a researcher comprehensive analysis on internet traffic
  • It also can map mostly with services of a third party software or OS fingerprinting.
  • This is a Python-based network forensic investigation toolset
  • It was created by the US Military Research Lab and made open-source in the year 2014
  • The use of this toolbox simplifies forensic inquiry
  • dns – Extract DNS-related queries with dns
  • large-flows – Compile a list of netflows
  • protocols – Non-standard protocols should be identified
  • ReservedIPs – Looks for solutions to DNS issues
  • rip-http – tool for extracting files from HTTP transmission

These are the python libraries used in digital forensic projects . There are also additional, open-source, and free libraries for python programming which are of immense importance in digital forensics. In this respect, let us have a look at the python-imaging library below.

Python Imaging Library

  • Data is stored in both basic and complicated data structures, such as databases and JPEG images
  • Simple desktop programs can be used to access them, and advanced analysis tools could be used to acquire the complicated operations
  • Users can use the Python language to develop techniques with the python imaging library
  • It can handle a wide range of file types

What is python forensic? You can get expert solutions to such frequently asked questions from us. In this regard, the Python Imaging Library or PIL operation is described here

  • The first step in python imaging library operation is the forensic image import
  • Then the imported images are used along with PIL for data extraction
  • Then the data is represented in the form of arrays
  • Data organisation for analysing forensic evidences is the final step

Usually, we provide complete descriptions of all python libraries and tools suitable for digital forensics to our customers. For your doubts on the installation of the python imaging library, network project topics you shall readily contact us. Our technical support team is happy to guide you. Let us now talk about recent digital forensics project topics

Latest Digital Forensics Project Topics

  • Safeguarding of vital infrastructure and cyber warfare
  • Reaction to an emergency and real-time analysis
  • Methodologies for event redevelopment
  • Key Infrastructure Security and data Warfare
  • Traffic flow evaluation, attribution and traceback
  • Portable and small-scale electronics and large scale research
  • Analysis of the system files and storage
  • Retention and conservation of forensic evidence
  • “File carving” is the process of extracting files from data chunks
  • Data exploration, mining, concealment and retrieval

Do you have any problems with your digital forensics project Topics ? Our experts are here to offer you answer to all of your research questions so that you can improve the performance of your design. We can help you with research on any of the above areas. With our knowledge, we have the ability to develop your research in any digital forensic project area .

U.S. flag

An official website of the United States government

Here's how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

  • The Attorney General
  • Organizational Chart
  • Budget & Performance
  • Privacy Program
  • Press Releases
  • Photo Galleries
  • Guidance Documents
  • Publications
  • Information for Victims in Large Cases
  • Justice Manual
  • Business and Contracts
  • Why Justice ?
  • DOJ Vacancies
  • Legal Careers at DOJ
  • Our Offices

Nepal: ICITAP Conducts Training and Operational Support in Conjunction with Nepal Digital Forensics Lab Leading to Several Operational Improvements

From March 1 to March 20, ICITAP provided training to the Nepal Digital Forensics Lab (DFL). Sixteen attendees successfully completed this training on analyzing iOS devices from a basic to advanced level along with advanced SQLite training. During this training, ICITAP created an evidence intake workflow in alignment with industry best practices. During the visit the new workflow was mapped out, presented, and approved by DFL management. ICITAP also redesigned the evidence room and the changes were approved by DFL management. Procurement of evidence room materials underway. ICITAP implemented security controls to track unauthorized personnel entering the building. A serious gap identified during a previous initial assessment. Subsequent evidence room personnel tracking in progress. ICITAP created and provided mechanisms for both. ICITAP supplied an electronic case/evidence tracking system, which provides a mechanism for case assignment, device tracking in the evidence room, and tracking of turn-around-time per device and examiner. This will help demonstrate the improved ability of the Lab thanks to ICITAPs influence, further our completion of our IAA obligations. ICITAP finalized a vase prioritization and case acceptance memo created and under review by DFL management for distribution to Nepal Police utilizing the DFL. Finally, ICITAP created an evidence consent memo created for acceptance by any unit submitting evidence to the DFL. This is necessary as the legal authority to perform analysis does not cover damage or destruction of digital device in the analysis process. This is an issue for the DFL; this consent memo must be accepted by unit submitting evidence to the DFL. The memo is currently under review by the DFL management for distribution to all Nepal Police Headquarters. ICITAP-Nepal is grateful for the support of the U.S. Department of State’s Bureau of International Narcotics and Law Enforcement Affairs (INL).

Related Content

A Missouri man pleaded guilty today to racketeering conspiracy in connection with his involvement in serious financial misconduct at an international labor organization.

WASHINGTON – A Texas man was sentenced today to 22 years and six months in prison for conspiracy to commit sex trafficking by force, fraud, or coercion.

A Texas man was sentenced today to 22 years and six months in prison for conspiracy to commit sex trafficking by force, fraud, or coercion.

Information for...   -->

  • Admitted Students
  • Current Students
  • Prospective & Future Students
  • Faculty & Staff
  • School Counselors
  • Admitted Student Site
  • Career Outcomes
  • Contact Admissions
  • Connect with Other Admitted Students
  • Deposit Now
  • Office Directory
  • Office of Financial Aid
  • Visit Campus

Visit Admitted Student Central for more resources & info…

Resources for Online Students

  • Academic Support / SMART Space
  • Campus Public Safety
  • Cash Card/ID
  • Champ Support
  • College Catalog
  • Compass Student Services
  • Dates & Deadlines
  • School Dude (facilities request)
  • Self-Service
  • Shuttle Bus Locator
  • Student Affairs, Diversity & Inclusion

Visit Current Student Central for more resources & info…

  • Admissions & Aid
  • Open House Events
  • How to Apply
  • Majors & Programs
  • Financial Aid
  • Request Information

Visit Prospective & Future Student Central for more resources & info…

  • Office of Alumni Relations
  • Update Your Info
  • Make a Gift
  • Champlain Weekend
  • Desktop Calendar
  • Office & People Directory

Visit  Alumni Central for more resources & info…

  • Academic Affairs
  • News: The View
  • People Center
  • Reserve a Room (EMS)
  • Self Service

Visit Faculty & Staff Center for more resources & info…

  • Prospective Parents
  • Visit & Events
  • Career Success Statistics
  • Tuition & Cost
  • Parent & Family Relations
  • Student Health Center
  • Add Funds to Cash Card
  • Billing & Payment Options

Visit  Parent Central for more resources & info…

  • School Counselors Admissions Page
  • Arrange a Group Tour
  • Meet the Admissions & Aid Team
  • Types of Aid
  • Tuition & Cost of Attendance

Visit  School Counselor Central for more resources & info…

Are you looking for...

  • Academic Calendar
  • Office & People Directory

2023 Career Outcomes

  • On Campus Undergraduate
  • Online Undergraduate & Graduate
  • About Us Our Story, Facts & More

Different by Design

  • Career-Focused Academics
  • Schools & Divisions
  • Study Abroad
  • Academic Support Resources
  • Graduate School Partnerships & Partner Programs
  • Our Faculty
  • Why Champlain?
  • Meet the Team
  • Our Community
  • Housing & Dining
  • Get Involved
  • Burlington, VT
  • Student Services
  • On-Campus Student Employment
  • Places & Spaces
  • Career Ready
  • Experiential Learning
  • Career Pathways
  • Career Collaborative
  • Office & People Directory

Champlain College Online offers 100% online undergraduate and graduate degrees and certificates.

  • Online Degrees & Certificates
  • Online Tuition & Aid
  • Online Admissions
  • Apply to Champlain College Online
  • Request Info
  • This is Champlain College
  • Quick Facts
  • Academics & Competencies
  • Diversity, Equity & Inclusion
  • Global Impact
  • Professional Services
  • Work with Us

Computer Networking & Cybersecurity

For our digital future to be secure, information must be safe. Earn real-world experience in computer networking and cybersecurity at Champlain College, and prepare yourself for a vital role protecting society from cyber threats.

  • Champlain App
  • Common App for Transfers

A group of computer science students and a professor looking at a wall of TVs with statistics and information displayed on them

National Recognition

Champlain College is a designated National Center of Academic Excellence in Cybersecurity (NCAE-C) by the National Security Agency (NSA).

Safeguard the Future.

The digital technology explosion has reshaped our society, and we need experts to make sure its benefits outweigh its risks. With data breaches and security threats on the rise, there’s a growing need for professionals who can protect against cyber attacks. If you’re interested in safeguarding systems and being at the forefront of this vital field, Champlain’s Computer Networking & Cybersecurity program could be for you. Read More

What Is Computer & Digital Forensics?

Computer Networking & Cybersecurity is a field that focuses on protecting computer systems, networks, and data from unauthorized access, attacks, and potential threats. It involves understanding how computer networks work, designing secure systems, implementing protective measures, and detecting/responding to security incidents. With increasing reliance on technology and the Internet, cybersecurity has become critical to protecting sensitive information and ensuring the smooth operation of businesses and organizations. Exploring this field can open up exciting opportunities to help protect digital infrastructure and make a meaningful impact in the world of technology.

Why Study it at Champlain?

Champlain College’s Computer Networking & Cybersecurity program equips you with cutting-edge skills to protect the Internet and the digital realm. Our labs and virtual infrastructure provide hands-on experience in securing sensitive data for individuals and government agencies. You’ll learn to identify network vulnerabilities, implement robust security measures, and defend against cyberattacks.

Our Upside-Down Curriculum allows you to begin taking networking and cybersecurity courses in your first semester, and gain in-depth knowledge over the course of four years. Through projects, internships, and experiential learning, you’ll immerse yourself in the profession and develop skills in designing, building, and securing enterprise networks.

Highlights of our program include extensive training in server software, systems administration, networking, and protocols, all in small-sized classes to ensure a rich and personalized educational experience. Located in a city with ample job opportunities, our program sets you up for success in the field during and after college.

Senator Patrick Leahy Center for Digital Forensics & Cybersecurity

At the Senator Patrick Leahy Center for Digital Forensics & Cybersecurity, you’ll work on network security, cyber threat response, and critical cybersecurity research. In this leading digital lab, you’ll participate in groundbreaking research and support the cybersecurity needs of government agencies and organizations. You’ll play a critical role in developing training protocols for law enforcement and examining the network security of emerging technologies. Through hands-on work at the Leahy Center, you’ll hone your skills as a Champlain cybersecurity student, contribute to the field, and graduate as a cybersecurity professional with real-world experience.

computer & digital forensics student writing code on a computer; threat assessment software running on an overhead monitor

Leading the Way

Our program is nationally recognized and was one of the first programs in the country designated as a Center of Academic Excellence by the National Security Agency and the Department of Homeland Security.

Specialized Cybersecurity Education

With a focus on adapting to the ever-changing landscape and new technologies in the field, our cybersecurity program was built from the ground up as a specialized degree designed specifically for the purpose of cybersecurity education.

Our program was ranked No. 1 by industry experts in SC Magazine’s list of top cybersecurity college programs.

  • SC Magazine

Hands-On Experiences

Beginning in your first year, you’ll gain hands-on experience through projects, internships, service to local nonprofits and organizations, and partnerships with industry experts at the Leahy Center.

Facts & Stats

of Computer Networking & Cybersecurity majors in the Class of 2023 achieved career success within six months of graduation. That’s success you can see.

The median yearly pay for networking professionals according to the U.S. Bureau of Labor Statistics .

Cybersecurity students competed against a team of professional hackers in a two-day cyber defense competition during the annual Northeast Collegiate Cyber Defense Competition (NECCDC) taking 2nd place overall.

Sample Courses in the Computer Networking & Cybersecurity Major

Check out some of the engaging and hands-on courses in the program. Our Upside-Down Curriculum puts you in your major right away.

Second Year

Fourth year.

See the Learning Outcomes for the Computer Networking & Cybersecurity major.

SYS 140 Systems Fundamentals

This course will introduce students to operating system concepts and other forms of systems software. Students will learn about standard operating systems functional components such as memory, process/thread, file system, input/output, storage and device management. Additional topics include data representation, imaging, virtualization, and the history/future of systems software. Hands-on experiential learning will be used to reinforce concepts.

SEC 250 Computer & Network Security

This course provides an introduction to computer and data network security. Students will examine the rationale and necessity for securing computer systems and data networks, as well as methodologies for implementing security, security policies, best current practices, testing security, and incident response.

NET 215 Network Protocols

This course is a thorough review of the foundational protocols used on the Internet and modern enterprise networks. With a focus on protocols aligned with the Transmission Control Protocol/Internet Protocol (TCP/IP) and OSI models, students will explore the development and structure of protocols, their role in data communications, and integration within network-based applications. Students will engage in hands-on activities aimed at protocol analysis, network troubleshooting, and protocol-related security concerns.

SYS 265 System Admin. & Network Services II

This project-oriented course focuses on the tasks and issues involved in the administration of distributed computing environments. Authentication, Authorization, and Accounting (AAA) systems are covered, with emphasis on using cross-platform authentication. Network services including host based firewalls, DHCP, DNS, Mail, and Web services are covered. Content includes Enterprise File Services, Distributed administration of multiple systems, and network monitoring and management tools. Hands-on experience will include projects based upon representative technology from each of these areas.

SYS 320 Automation and Scripting

Students will learn how to integrate programming into operating system management. They will learn how to automate systems administration functions and connectivity testing. Powershell and Linux shell scripting will be explored to manage and monitor operating system processes and functions. Students will create programs that can be reused in production networks.

SEC 350 Enterprise and Network Security Controls

Students will examine network-based threats, whether originating from the Internet or the local LAN, and learn about ways to protect, detect, and defend the enterprise network from such attacks. The relationship between user network policy and securing the network will also be explored. Students will participate in hands-on experiments and demonstrate their understanding of subject matter via labs, projects and presentations

CRJ 225 The Law of Searching, Seizing and Using Digital Evidence

Computer evidence (digital evidence) is being used every day in our country to convict criminals of crimes ranging from possession of child pornography to embezzlement to murder. Every competent, modern law enforcement officer understands the significance of digital evidence in every case submitted for prosecution. Students will be required to learn, and apply, legal principles that govern how this vital evidence is recovered (and used) to insure that it will be legally admissible in court.

CSI 320 Global IT & Ethics

Students look at the positive and negative effects of changes and advancements in technology, with particular attention given to the relationships between technology, ethics, culture, and humanity. Through readings, discussions, debates, presentations and other learning methods, students will explore the evolution of technology and ethics. Students will investigate the ways technology is used and how information affects, and is affected by, society and the global community.

You might also be interested in these…

Based on your interest in the Computer Networking & Cybersecurity major, we thought you also might like to check out these other academic programs and opportunities

Digital Forensics  

Release your digital investigation skills. Adopt the investigator’s mindset, solve mysteries, and master artifact discovery with Digital Forensics at Champlain College.

Computer Science & Innovation  

Help create the digital future. Free your creativity, do real work right away, and fuel your passion for technology and innovation.

Applied Mathematics  

Use math to tell stories, crack real-world issues, explore diverse applications, and gain problem-solving skills for future success in many industries.

Criminology & Criminal Justice  

Build a better system. Be an agent of organizational change.

Study law as an undergraduate at Champlain College and start your legal education right away, during your first semester. Go on to law school afterward or choose a different path; either way, you’ll be ready.

Computer & Digital Forensics Minor  

Analyze digital information, navigate the realm of digital security, and form a strong foundation working with computers in the Computer & Digital Forensics minor.

Computer Science Minor  

Analyze problems, develop software systems, and use a variety of tools to evaluate computer programs and bring your innovations to realization in the Computer Science minor.

Information Technology Minor  

Identify core computer networking and infrastructure components and the roles they serve to supplement business, finance, creative, and other professional pursuits.

Law Minor  

A strong base understanding of law and the legal system is a valuable asset to any résumé. Tailor your classes to focus on the specific kind of law that applies to your chosen career and get ahead.

Criminal Justice Minor  

Justice at all levels is a keystone of a functional society. Learn the criminal justice process at multiple levels and how your knowledge of this system can benefit your career.

Cybersecurity, Computer Science & Digital Technology  

Solve everyday problems to build a better future.

Law & Society  

Uphold a system of justice through meaningful public service.

Individualized Studies & Undeclared  

Learn what you love, and love what you learn.

Business & Data Analytics  

Drive change at the intersection of information and impact.

National Security Agency logo and National Center of Academic Excellence logo

Since 2007, Champlain College has proudly held a Cyber Defense (CAE-CD) designation, which is renewed periodically. Our cybersecurity curriculum meets the rigorous criteria set by the NSA, FBI, and Department of Defense, helping to strengthen the nation’s information infrastructure. As an active participant in the NCAE program, we set a high standard for cybersecurity education, producing confident professionals with extensive cyber defense expertise.

  • Visit the NSA’s Website  
  • Visit the CAE Community Website  

students working at computers

Cybersecurity Advisory Board: Leading education with industry engagement

Composed of external experts, this group provides Champlain with guidance on educational objectives, learning outcomes, and preparing students for the evolving cybersecurity workforce. The board also evaluates the quality of experiential learning and internship opportunities, with members representing various industry sectors.

student confidently working on computer

Seamless Transition to Grad School

Are you thinking about going to graduate school? Through Champlain College Online, you can seamlessly go from undergraduate to graduate student, enhancing your skills and career opportunities.

Sign Up To Get Stickers + Helpful Info

Laptop on a bed, the laptop is decorated with exciting stickers from a champlain college graduate

Ready to be inspired? Fill out the form and sign up to receive helpful information about Champlain College—plus, we’ll send you a full sheet of high quality stickers designed by one of our Graphic Design & Visual Communication graduates.

Career Success

The Computer Networking & Cybersecurity program prepares graduates for the workplace. 97% of CNCS majors in the Class of 2023 were employed within six months of graduation.

  • Internships  
  • On-Campus Employment Opportunities  
  • Study Abroad  

woman looks over the cubicle wall to take part in a discussion at a computer

Your Career Outlook

Learn more about our career-focused education

By the time you graduate, you will…

  • Have a solid grasp of cybersecurity fundamentals and be able to analyze architectures, identify vulnerabilities, and recommend controls to mitigate threats.
  • Have hands-on experience configuring and managing security controls, such as configuring host firewalls, user access controls, intrusion detection and prevention systems, and encryption mechanisms at various levels.
  • Have a deep understanding of networking protocols, such as Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP), and how they facilitate communication between networked hosts and applications. Be able to design and implement network solutions based on business requirements.
  • Understand the components and roles of computer systems, including CPUs, memory, storage, and networking. You will be able to manage operating systems, network services, and security controls to troubleshoot problems and ensure optimal performance.
  • Develop strong teamwork and communication skills. You will actively collaborate with others as a member or leader of project-based teams and learn how to effectively communicate technical information through formal documentation, presentations, and interpersonal interactions.

You’ll Find a Career In…

  • Network Engineering
  • IT Security and Cybersecurity
  • Cybersecurity Consulting
  • Security Operations and Incident Response
  • Systems Architecture
  • Digital Forensics
  • Cloud Security Engineering

Latest News from The View

students at various cubicles

Cybersecurity Partnership Gives Students A Unique Opportunity

a large group of female cybersecurity students posing behind a "women in cybersecurity" sign at an event

Women in Cybersecurity Conference: If They Can Do It, So Can I

students look at large screens showing data

Champlain College Named Best Cybersecurity Higher Education Program

Senator Leahy speaks with a woman

Senator Leahy Tours The Leahy Center for Digital Forensics & Cybersecurity

More inside computer networking & cybersecurity, overview  , curriculum  .

With our Upside-Down Curriculum, you'll get hands-on learning in web technology, networking, and security, as well as valuable experience through internships.

Faculty  

Our Computer Networking and Cybersecurity faculty go above and beyond to inspire your curiosity, learning, and growth. Small class sizes foster personal connections and mastery.

Idaho Falls news, Rexburg news, Pocatello news, East Idaho news, Idaho news, education news, crime news, good news, business news, entertainment news, Feel Good Friday and more.

fronteir credit union

LIVE UPDATES | Forensics analyst, DNA expert testify on day 28 of Chad Daybell trial

Nate Eaton

Nate Eaton, EastIdahoNews.com

daybell hear 080320 161

LIVE UPDATES FROM THE CHAD DAYBELL TRIAL

CLICK HERE TO WATCH THE TRIAL LIVE Please excuse the typos. These are live updates from the courtroom.

2:51 p.m. Just had a chance to listen to the first part of the afternoon hearing that I missed. The judge called it somewhat suddenly and public was not allowed in due to security and time restraints. Boyce previously determined that a statement made by Janice Olson, Tammy’s co-worker, about changing Tammy’s life insurance policy could not be admitted. Because Emma Daybell brought up the issue during her testimony, the state wants to be able to bring in the statement. Prior objects to it but Boyce will not allow it.

2:45 p.m. Boyce says same applies to Colter Cannon. He can come back to testify as a rebuttal witness and Prior can object if he wishes. Tomorrow at 8:30 a.m. we are back in the courtroom where a proposed schedule will be presented to the court. Ok – now I think we really are done for the day.

2:44 p.m. Wixom says all rebuttal witnesses will be focused on what the defense said – nothing outside of that. Boyce says if Hermosillo is called, Prior can object and Boyce can hear the argument at that time. The other witness the state wants to ask about is Colter Cannon.

2:42 p.m. Prior stresses he does not want Hermosillo back in. Boyce says Hermosillo will be placed under oath like other witnesses so he will need to tell the truth about whether or not he watched the trial or discussed it with others. Wixom reminds the court that Hermosillo was the chief officer for the Vallow case so he has heard most of the testimony and seen most of the evidence. Wixom says the rebuttal case will take 1.5-2 days and the questioning will be narrow and focused.

2:40 p.m. Prior is concerned that Hermosillo is a law enforcement officer involved heavily in the case. “I am extremely skeptical that Officer Hermosillo did not discuss the case with any other officers involved,” Prior says. Prior does not want him recalled. Prior says after he’s preparing to close his case, the state is bringing Hermosillo back to open the doors to a number of issues that can’t be addresses through cross-examination.

2:38 p.m. Boyce says there are two other potential witness issues relating to Det. Ray Hermosillo and Dep. Colter Cannon. Wixom says Hermosillo was released from his subpoena and has been hyper vigilante at not watching any part of the trial but the state wants to recall him as a rebuttal witness.

2:29 p.m. The state has a problem with the statement Emma says that “we did not consult with our husbands” when they signed the life insurance forms. Boyce will allow the state to question Emma about the statement when rebuttal witnesses are called.

2:28 p.m. Suddenly we are on the record again. Everyone left the courtroom and the livestream started again. Joined in late but there is discussion about Emma Daybell’s testimony on the life insurance form Tammy Daybell filled out.

1:40 p.m. Boyce is excusing the public from the courtroom. There is nothing further today. The jury will remain in the courtroom with the attorneys and judge to discuss scheduling. Join me tonight for ‘Courtroom Insider’ at 6:30 MDT.

1:34 p.m. Hampikian is done testifying and Prior asks for a sidebar.

1:32 p.m. Wood has nothing further. Prior has re-direct questions. He asks about the samples found on the ax and shovel. Hampikian confirms Tylee’s DNA was on the ax and shovel. Prior asks if there is an accurate way to determine how the samples got on there. Hampikian says not by anything he can do with DNA.

1:30 p.m. Wood asks Hampikian if he reviewed reports and testing about Tylee and JJ’s remains. Hampikian says yes. He also reviewed the hair sent to Bode Technology that matched to Lori Vallow.

1:29 p.m. Wood asks if Hampikian’s lab at BSU is accredited for forensic testing. Hampikian says it’s an academic lab so they never applied for the same accreditation as other private labs have.

1:27 p.m. Boyce says there is a question about an exhibit. He is allowing re-opening of direct examination and Prior asks to exhibit the Bode Technology DNA report. Wood is back at the podium.

1:24 p.m. Prior has nothing else. Wood will now cross-examine.

1:25 p.m. Boyce asks for a quick sidebar with counsel.

1:23 p.m. Hampikian says the smallest amounts of DNA were searched for – just a few cells (maybe 20-40). Hampikian says there was no indication there were problems testing the DNA or that the labs did anything wrong during testing.

1:19 p.m. Hampikian says when the hairs are being tested, they are testing a hypothesis: Was this Lori Vallow’s hair? Was it Chad Daybell’s hair? Was it JJ Vallow’s hair? The four hairs showed it belonged to none of them.

1:15 p.m. Hampikian says he found no evidence that Chad Daybell’s DNA was present on anything that was tested.

1:14 p.m. Three references were sent to Astrea to compare the hairs – Chad, Lori and JJ. “They determined that two of the hairs came from possibly the same person,” Hampikian says, but none of the three people – Chad, Lori and JJ – matched the four hairs.

1:12 p.m. Prior asks if it’s possible to obtain DNA on hairs without roots. Hampikian says it is as of about 3-4 years ago – private companies can test hairs without roots and try to determine DNA. Four hairs from this case were sent to Astrea Forensics for testing.

1:11 p.m. Hampikian is most interested in the biological evidence – that’s what catches his attention. There were more than a dozen hairs on an adhesive. Some of the hairs were brown, some were every short dark hair, one was a blonde hair.

1:10 p.m. Hampikian was supplied with a number of documents and electronic files containing DNA data. The files are important as he has his own software to analyze the DNA. He also received a list of evidence that was never tested.

1:05 p.m. We are back in the courtroom. Attorneys are at their tables and Hampikian is on the stand.

11:58 a.m. Lunch break. Back in an hour.

11:53 a.m. Prior asks if DNA can be transferred through breath. Hampikian says a certain amount of DNA is transferred in the air and it’s being studied right now.

11:55 a.m. Prior lists a variety of ways in which DNA can accumulate on objects – fluid, air, hair, touch. Prior asks if there are any he’s missing. Hampikian says there are more – the bite of a sandwich, bodies submerged in water for days, etc.

11:51 a.m. Prior says as humans, we are constantly shedding cells and transferring DNA. Hampikian says that’s true.

11:50 a.m. Prior ask what a single cell is. “It’s very small. You can’t see unless it’s a human egg cell. The type of cells we’re talking about, you have to have a microscope to see,” Hampikian says.

11:48 a.m. Hampikian says DNA can be transferred a variety of ways. Prior asks if you were to have any type of contact with an item, would DNA be transferred? Hampikian says there are many levels to that question. It depends – did you just wash your hand? Did you shed skin or have dandruff? How long was the touch? Etc.

11:46 a.m. My colleague Kaitlyn Hart interviewed Hampikian about the history of the death penalty in Idaho. You can read her story here.

11:44 a.m. Prior asks Hampikian about transferring DNA. Hampikian says it’s very hard to transfer someone’s thumb print from a glass to a gun or something like that. Hampikian says DNA is really good at telling us who may have contributed but not how it got there.

11:38 a.m. Prior asks if Hampikian has trained and worked with judges concerning DNA. He has. Hampikian has also helped exonerate wrongfully convicted inmates including Chris Tapp in Idaho Falls. You can see all our extensive coverage on the Tapp case here.

11:35 a.m. Hampikian worked on the Amanda Knox case for several years with the defense until she was exonerated. Hampikian has been doing forensic DNA work since 1989 and has worked on hundreds of cases.

11:33 a.m. Hampikian has worked with the French police and published an article on familial DNA. He also worked with a Taiwan forensic lab on a case concerning a man who was wrongfully convicted.

11:31 a.m. Hampikian explains his professional and educational background. He has worked on many cases doing DNA analysis.

11:29 a.m. Prior asks Hampikian about his profession. He has a lab at Boise State where he works on DNA projects, forensics, viruses in the biology department but also works on criminal justice projects. He is also an adjunct professor at the University of Idaho College of Law.

11:24 a.m. The next witness is Dr. Greg Hampikian. He is the Director of the Forensic Justice Project at Boise State University and the Co-Director of the Idaho Innocence Project.

hampikian

11:21 a.m. Wood has nothing further. Prior follows up about the call between Chad and Alex at 8:11 a.m. Prior asks if there is any data of any kind to suggest Chad’s device was on the property at the same exact time as Alex’s on those key dates. Eller says no. Prior has nothing further.

11:18 a.m. Wood asks Eller if he is aware of Alex Cox’s relationship with Chad Daybell. Eller says he’s his brother-in-law.

11:15 a.m. Wood asks if Eller is aware Alex Cox’s account went to a Sportman’s Warehouse. Eller is aware.

11:07 a.m. Wood shows some different places where Alex’s device was tracked on Sept. 23. He also asks about Sept. 9 and how, on both dates, the homerjmaximus was located close to locations where the bodies were found. Eller says yes. Data from Alex’s device were tracked to the property after he spoke with Chad.

11:05 a.m. Wood asks the significance of Sept. 23. It’s the day after JJ was last seen alive. Wood shows another map on the screen.

11:03 a.m. Wood shows a chart showing Chad’s device called Alex’s device at 9:25 a.m. on Sept. 23. Alex’s device first showed up at Chad’s house on 9:55 a.m. that morning.

11:02 a.m. Wood asks if he is aware that combining the raccoon text message and the data on the screen was how law enforcement found Tylee Ryan. Eller says no – he is not aware.

11 a.m. Eller says he spent a lot of late night over Christmas going through 10TB of data that was turned over. Wood asks Eller if he reviewed a cell phone belonging to Tammy Daybell. Eller doesn’t remember. Wood asks Eller if he is aware that Chad sent a text to his wife about burning limbs and shooting a raccoon. Eller says he is aware – but it doesn’t place Chad at the property.

10:58 a.m. Wood stresses that Chad made a call to Alex at 8:11 a.m. and around an hour later, Alex showed up at Chad’s house. Many of the data points for Alex Cox’s device recorded near the burial sites for JJ and Tylee.

10:54 a.m. Wood shows a record showing a phone call was made at 8:11 a.m. from Chad Daybell’s device to Alex Cox’s device on Sept. 9. Eller says Alex Cox’s device showed up at Chad Daybell’s property at 9:21 a.m. Wood clarifies that the CAST report used a 100 meter margin of error while Eller used a 500 meter margin of error.

10:51 a.m. Wood plays a video from the exhibit. He asks Eller about a specific wifi data point from either Lori Vallow or Alex Cox’s apartment. Wood asks Eller if he found any data from Alex Cox’s device during the early morning hours of Sept. 9 that went from apt. 107 to apt. 175 – Alex to Lori’s apartment. Eller says that’s correct.

10:48 a.m. Wood begins by publishing an exhibit. It’s a slideshow showing data he collected from Sept. 9. The first slide shows locations related to the homerjmaximus Google account.

10:43 a.m. Prior has nothing further. Wood will now conduct cross-examination.

10:42 a.m. Prior shows a document that says there were 138 text messages and 50 voice calls between Sept. 1 – Oct. 31, 2019 associated to Alex Cox’s device while it was at or near the Daybell residence.

10:39 a.m. Eller says you can take their data and map it using other tools but it doesn’t necessarily mean it will match because you aren’t testing it with the same tool.

10:38 a.m. Prior asks about Gladiator Forensics and if Eller looked into the availability of his company or the public using it. Eller says he did but Gladiator told him their testing is only for law enforcement.

10:37 a.m. Prior asks if drive testing is considered a scientific test. Eller says it’s used by the cell phone companies to determine signal. The drive test itself can’t locate a device, it only shows tower coverage.

10:34 a.m. Prior asks about drive testing. Eller says the drive testing done in the case showed the coverage area for multiple towers surrounding Chad’s house. Eller was concerned that there was a five degree difference in the cell tower coverage area between 2019 and 2020.

10:33 a.m. On Oct. 19, 2019, the day Tammy died, there was no indication that Alex’s device was within 1.4 miles of Chad’s property.

10:31 a.m. On Sept. 25, 2019, there are records showing Alex Cox’s device at or near Chad’s property between 10:05 a.m. through 10:24 a.m. On Oct. 9, 2019, the day of the paintball incident, Alex’s device was at the property at 4:50 p.m., 4:51 p.m. and 5:01 p.m.

10:30 a.m. Alex’s device was on the property on Sept. 23 from 9:55 a.m. through 10:12 a.m. There is no evidence Eller reviewed that could place Chad Daybell at the residence on the morning of Sept. 23.

10:26 a.m. Prior reviews the times and locations of where Alex’s device pinged on the property. He also presents a list showing activity from Sunday, Sept. 22, 2019 showing Alex was at or near the Daybell property starting around 2:30 p.m.

10:23 a.m. There was no information suggestion Chad was at the residence on Sept. 6. On Sept. 9, there are multiple data points showing Alex Cox’s device was at or near Chad’s property between 9:15 a.m. and 11:45 a.m.

10:20 a.m. Eller reviewed data associated to the [email protected] account. Prior shows a document on the screen showing information from Sept. 6, 2019. It shows data returned from Google from the [email protected] account – Alex Cox. On Sept. 6, 2019, a location point for that account was at or near Chad’s house at 12:42 p.m., 12:44 p.m., 12:51 p.m., 12:53 p.m. and 12:55 p.m.

10:19 a.m. Prior begins by reminding the jurors that there was no device associated to Chad Daybell on his property on Sept. 9 and Sept. 23. Eller says that’s correct. Eller says he reviewed 10 TB of data. “If you were to take the Library of Congress, if it was all printed, just 1TB would fill it.”

10:18 a.m. Back in the courtroom after a long break. Lindsey Blake has joined the prosecutors at the prosecution table. Prior will continue to question Eller.

9:39 a.m. Prior wants to admit an exhibit and there needs to be some redactions. Boyce says we will take a recess while the redactions happen. Be back soon.

9:35 a.m. Boyce asks for a sidebar.

9:32 a.m. Eller says there were 16 devices at or near the Daybell property on Sept. 23 not associated with Alex Cox. Alex’s device made it 17 devices. Once you exclude devices outside a 30 feet radius, there were four devices left. Eller says information on those four devices were not obtained by police.

9:30 a.m. Eller says this chart should be the complete list of records provided by Google at that time. He explains there were ten devices that were not included in the Google data request.

9:28 a.m. The chart shows information returned by Google for the geofence warrant based on a location at the Daybell for Sept. 23. This is the non-filtered radius version and there are several lines highlighted in yellow and other lines highlighted in green. The yellow lines are Alex Cox’s device on the Daybell property. The green lines are device IDs submitted to Google for subscriber information.

9:27 a.m. Prior brings up another exhibit on the screen showing devices on or around the property on Sept. 23.

9:22 a.m. The information requested from Google started at 9 a.m. Prior asks if it would be helpful to have requested records from earlier in the day. Eller says yes – it could have assisted in the investigation. Prior stresses again that there was no device associated to Chad Daybell on the property that morning.

9:21 a.m. Eller says he would have asked for the identifying information for all of the devices to identify everyone within the proximity of the property – not just the ten devices that Stubbs requested.

9:17 a.m. Eller does not know the phone numbers of the 19 devices. Stubbs pursued further information on 12 of the devices. Eller explains that Stubbs testified Google told him it was too many devices and to remove some devices from the list. Ten devices were ultimately looked at.

9:13 a.m. Eller identified 19 devices from the Google records that would have been within 250 meters from a spot in the backyard of the Daybell home.

9:11 a.m. There was no location showing a device belonging to Chad Daybell was on his property on Sept. 9 from 9:19 a.m. through 12:10 p.m., Eller testifies. Eller says it can be difficult to disable all the data Google collects on a device unless you simply turn the device off.

9:09 a.m. Eller went through and organized the data from Google. Prior asks Eller if there was any information to suggest Chad Daybell’s device was part of the location data on Sept. 9, 2019. Eller says the results of the Google search showed the only device they were able to put at the residence was Alex Cox’s device.

9:06 a.m. Prior asks the process for obtaining IDs other than turning off location device on a phone. Eller says if you were to connect to wifi from a device, you would generate a record with Google. The list of devices and information from Google was returned in a spreadsheet format and organized by time and date.

9:04 a.m. Eller says the data was being collected for devices at the Daybell residence. “There was a lot of other devices -there are more records than what you see here.” Prior says there were several IDs of phones within the proximity of the Daybell property. Eller says the list includes the devices the police were asking to be identified.

9 a.m. Eller says it appears Rexburg police were trying to find information on devices that would have been in multiple places. Prior shows document that lists device IDs with times and dates of when the device IDs were seen inside the radius of the geofence. The latitude and longitude is also on the list and the source of the data – Wifi, GPS, etc.) is also on the list.

8:57 a.m. On the screen, Prior shows the search warrant Stubbs submitted to Google to provide information about individual device IDs. Eller says when you submit a geofence to Google, they provide a list of numbers associated with the geofence. You then need to submit another warrant to get information about the numbers. Stubbs submitted a warrant to Google for information on 11 IDs.

8:55 a.m. Eller listened to the testimony of Rexburg Det. David Stubbs and FBI Agent Nicholas Balance. Prior asks Eller to talk about their testimony in relation to Alex Cox’s phone. Eller says in listening to the testimony about how the geofence was done and what was returned in the search warrant from Google, he found there were more devices than what were actually requested to be identified.

8:54 a.m. Eller reviewed a lot of data from this case from Google, Apple and other sources. Prior asks Eller if he reviewed Geofence evidence. Eller did. Prior asks what Geofence evidence is. “It’s not something Google intended to be used in this manner but Geofence allows you to take a location, put a radius around it and submit a search warrant in order to gain information about devices that would have passed through that Geofence,” he says.

8:53 a.m. Prior asks about disabling a device. Can you just pull it off and go into settings to turn off location services? Eller says that’s one way but you could also go into your Google account and change the settings. You could just turn the device off to stop sharing information too.

8:52 a.m. Eller says if you have an Android phone, you would need to have a Gmail account to use the device. Google would have information about you registering the device, what services you’re enabled and what you are allowing to be stored.

8:50 a.m. Eller says the best source to get information about data on a phone is the actual device itself. He calls it “native location data” – data directly from the phone. You can also use information captured by the phone manufacturer or the operating system on the phone -iOS or Google.

8:48 a.m. Prior asks what metadata is. Eller says it’s data about data. When you see a photo, the metadata is all the information that created the photo. If it’s been filtered, cropped, the date, etc. – everything about the picture.

8:47 a.m. Eller compares the amount of data people use daily to an iceberg – the 10% you see of the iceberg above the water is what people use day to day. His company focuses on the 90% of data “below the surface” – the in-depth stuff.

8:45 a.m. The last seven years Eller was in the Army, he helped build out the digital forensics program at Quantico and it was spread across the globe. Eller’s company does 25-30 classes a year for legal entities and law enforcement agencies.

8:43 a.m. Prior asks Eller about his education and training. He has been a police officer, served in the Army and was the command digital forensic examiner for the US Army Criminal Investigation program. Here’s a picture of Eller from his company website:

eller

8:42 a.m. Metadata Forensics is a consulting and training firm that does digital forensics on devices, expert testimony, training for law enforcement, attorneys, victim advocates. “We examine any device that contains data or any data that’s turned over to us,” Eller says.

8:38 a.m. Prior calls Patrick Eller as a witness. He is the CEO of Metadata Forensics and a digital forensics examiner.

8:37 a.m. Correction: Lindsey Blake is not in the courtroom this morning. Boyce is on the bench and jurors are in their seats.

8:29 a.m. Chad Daybell is sitting at the defense table with John Prior. At the prosecution table: Madison Co. Prosecutor Rob Wood, Fremont Co. Prosecutor Lindsey Blake, Fremont Co. Deputy Prosecutor Rocky Wixom and Special Prosecutor Ingrid Batey.

8:27 a.m. We are back in the courtroom. The bailiff reminds everyone that recording and taking photos in the hallway of the courthouse is not allowed. Three people in line were apparently recording or take selfies this morning. The bailiff says this goes against the guidelines in the courthouse administrative order and anyone doing this is in contempt of court. He reminds everyone to turn their phones off and not whisper during the trial today.

Daybell trial coverage

SUBMIT A CORRECTION

  • Skip to main content
  • Skip to footer

AgriLife Today

Texas A&M AgriLife's digital magazine and newsroom

At the intersection of science and mystery

Olivia henry '24 explores a career in the forensic sciences.

May 7, 2024 - by Susan Himes

A childhood love of the Nancy Drew book series helped lead Olivia Henry from a small town in Northern California to College Station to study forensics. Her passion for mysteries, puzzles and problem solving combined with having two parents working in STEM fields nurtured an early interest in the sciences.

During summer breaks from school, she spent “probably half of my time at a little science museum” near her home in Danville. In middle school, she had a science teacher who introduced the class to forensics.

Photo of a woman, Olivia Henry. She has long brown hair and she is wearing a maroon collared short with writing on her left side.

“I thought, this is really cool and kind of a combination of science and problem solving and mysteries,” Henry recalled. “I knew it was perfect for me.”

Henry will graduate in May from the Texas A&M College of Agriculture and Life Sciences Department of Entomology as a forensic and investigative sciences, FIVS, major with a science emphasis and a minor in cybersecurity. She is a University, College and FIVS program honors student.

The first-generation Aggie made sure to make the most of her time at Texas A&M by not only learning to step outside her comfort zone and embracing Aggie traditions but also helping other students as a peer mentor for the Introduction to Academic Success in Forensic and Investigative Sciences and Continuing Academic Success in Forensic and Investigative Sciences classes and the Hullabaloo U Course .

She has also been a College of Agriculture and Life Science Ambassador for three years and has served on the executive cabinet for the Class of 2024 Student Council for the past two years. In addition, she serves on the College’s Student Council, is a Townsend Leadership Fellow , and is a Scholarship for Service recipient.

“There are always open doors in front of you, but you have to walk through them to give yourself the opportunity,” Henry said. “I try to take every opportunity.”

Henry reflected on her time and experiences at Texas A&M.

What initially brought you to Texas A&M?

I decided to come to Texas A&M because they had the No. 1-ranked forensic science program . I, like many students, was also attracted to the spirit of the students and the rich traditions of the school.

Coming from a little town more than 1,500 miles away and going to a state where I knew no one to attend such a huge university felt overwhelming at first. But, within two weeks, I had made so many friends. And although Texas A&M is huge, the College and departments seem smaller as you’ll see the same faces around your classes and building. Texas A&M is unique in that I feel like it really has something for everyone. I think all students can find a home here.

A young woman stands between an older man and older woman with a Texas A&M backdrop behind them. She is holding a plaque she was awarded for leadership.

What opportunities has attending Texas A&M provided for you?

I’ve been very blessed with the opportunities. My first internship was working crime scenes, and that came about because a former Aggie from the program reached out hoping to have an Aggie intern. I spent the summer of 2022 interning with Jeremy Arnold ’18 with the Carrollton Police Department Crime Scene Unit.

It was also during that internship that I got to experience the digital side of evidence. I had grown up with a dad in information technology and had sworn up and down that I would never, ever, ever do anything with tech because I thought it was so boring. But when I was exposed to how it is involved in solving crimes, like using an Apple watch on a victim to determine the time of death or dumping phone data for evidence, I added a minor in cybersecurity.

What is one of your favorite memories of attending Texas A&M?

I worked as a student ambassador for the College and one Saturday I met with a prospective student and her mother on campus. The mother asked me question after question, and I was worried when I couldn’t answer all of them, but I spent a lot of time with them and shared my passion and enthusiasm for the College and my major.

Later that day, they came by again and the daughter told me she’d committed to A&M because, by answering their questions and really speaking with them, I’d convinced her and her mom that this was the right place for her to be. That was so exciting to know I had made such an impact on someone and their academic trajectory. I’ve also traveled around with other college students to visit high schools across Texas to talk about being an Aggie. Those will always be some of my favorite memories.

Was there a class or professor that really impacted or influenced your career path?

Dr. Ashleigh Faris is no longer here at Texas A&M, but she was one of those professors who really, really cared about her students and wanted them to succeed. I could call her at any time and she would be there for me. Having a professor like that was super meaningful in my degree because I always knew I had someone in my corner.

Once she left, it was Dr. Craig Coates who kept me on track and helped me finish my capstone. He was instrumental to my success and was always there for me. He also taught one of my favorite courses, Biotechnology and Forensics, which was discussion-based with no power point — which was unlike any class I’d had before.

What are your plans after graduation?

I was fortunate enough to receive an offer from a federal agency, so I will be moving to Washington, D.C., and working there when I graduate. Essentially I will be doing forensics and crime scene investigations at the federal level.

Advice to younger self

I would tell myself you are more capable than you think you are. I would also tell myself to stand firm in who I am and not to doubt myself.

For example, when the first round of applications to be an ambassador came out, I didn’t apply because I didn’t feel I was qualified enough. I thought, they’re not going to want me, I have no ag background. But I ended up getting the ambassador position when they opened the second round of applications – because I actually applied. There’s always an opportunity, but you can’t seize the opportunity if you don’t go out for it.

Advice to future students interested in studying forensics

The broad definition of forensic science to me is the application of scientific principles and methods to assist in criminal investigations and then in a court of law as well. It’s using science and technology – research and the scientific knowledge you have — and then applying that to problems or mysteries you have to figure out. It is really important that you have a complete understanding of all sciences because you never know when you’re going to need chemistry, biology, physics, etc. — all things that can come up at a crime scene.

Print Friendly, PDF & Email

Media Inquiries

Laura Muntean , media relations coordinator [email protected] 601.248.1891

Are you interested in this content, need high resolution photos or assistance getting connected with an expert to learn more? Please contact our media relations team at [email protected] .

You May Also Like

Blending a passion for rural communities, medicine and agriculture

Blending a passion for rural communities, medicine and agriculture

New horizons with the Department of Nutrition

New horizons with the Department of Nutrition

Two College of Agriculture and Life Sciences students earn prestigious Brown-Rudder Award

Two College of Agriculture and Life Sciences students earn prestigious Brown-Rudder Award

A member of Texas A&M AgriLife

Texas A&M AgriLife Extension Service | Texas A&M AgriLife Research | Texas A&M Forest Service | Texas A&M Veterinary Medical Diagnostic Lab | College of Agriculture & Life Sciences

Texas A&M AgriLife

Phone: (979) 803-1287 [email protected]

More Information

  • Resources for Press and Media
  • Story Suggestion

Find Us on Social Media

About texas a&m university.

IMAGES

  1. What is Digital Forensics? Tools, Types, Phases & History

    dissertations on digital forensics

  2. Practical Guide to Digital Forensics Investigations, A, 2nd Edition

    dissertations on digital forensics

  3. The Growing Role of Digital Forensics

    dissertations on digital forensics

  4. The Phases of the Digital Forensics Investigation Process

    dissertations on digital forensics

  5. (PDF) Advances in Digital Forensics Frameworks and Tools: A Comparative

    dissertations on digital forensics

  6. Digital Forensics: Phases and Importance

    dissertations on digital forensics

VIDEO

  1. Digital Forensics Case B4DM755 TryHackMe

  2. Miss Forensics (Chapter 29)

  3. Digital Forensics News Round Up, April 10 2024 #dfir #digitalforensics

  4. Friends working on the frontline in digital forensics

  5. Digital Forensics News Round Up, April 24 2024 #digitalforensics #dfir

  6. Digital Crime Scene

COMMENTS

  1. PDF Title: Digital forensics: an integrated approach for the investigation

    Digital forensics has become a predominant field in recent times and courts have had to deal with an influx of related cases over the past decade. As computer/cyber related criminal ... considered when dealing with digital evidence. This thesis addresses issues regarding digital forensics frameworks, methods, methodologies

  2. PDF PhD Thesis Digital Forensics Practices: A Road Map for Building Digital

    PhD Thesis . Digital Forensics Practices: A Road Map for Building Digital Forensics Capability . Ahmed Jasim Almarzooqi . A Doctoral Thesis Submitted in Partial Fulfilment of the Award of Doctor of Philosophy . Faculty of Technology . De Montfort University . Leicester, United Kingdome .

  3. PDF The Development of Current Digital Forensics Katherine Vreeland Snyder

    Thesis directed by Associate Professor Catalin Grigoras ABSTRACT The last few years have shown a rapid technological development in the digital evidence ... Digital Forensics" within the DOJ for training, research, and review of all training programs currently in existence (2). This bill was referred to the Subcommittee on Crime, Terrorism, and

  4. PDF PhD Thesis Alleviating the Digital Forensic Backlog: A Methodology for

    PhD Thesis Alleviating the Digital Forensic Backlog: A Methodology for Automated Digital Evidence Processing Xiaoyu Du A thesis submitted in ful lment of the degree of PhD in Computer Science Supervisor: Dr. Mark Scanlon Head of School: Assoc. Prof. Chris Bleakley UCD School of Computer Science

  5. Research Trends, Challenges, and Emerging Topics in Digital Forensics

    A digital forensics framework, also known as a digital foren- sics process model, is a sequence of steps that, along with the corresponding inputs, outputs and requirements, aim to sup-

  6. Current Challenges and Future Research Areas for Digital Forensic

    Cloud forensics also face a number of challenges associated with traditional digital forensic investigations. Encryption and other antiforensic techniques are commonly used in cloud-based crimes. The limited time for which forensically-important data is available is also an issue with cloud-based systems.

  7. PDF Research Trends, Challenges, and Emerging Topics in Digital Forensics

    As a result, over the last four years, research in the area of digital forensics has slowly but steadily increased. This upward trend re ects the key public and policy impact of digital forensics nowadays. Figure 2 also shows the domain-speci c distribution of the 109 review papers included in our analysis.

  8. The impact of automation and artificial intelligence on digital forensics

    which AI and automation-based digital forensic systems can be developed on a commercial scale. Unless resilient digi-tal forensic systems are designed, it is evident that the size and number of computer-aided crimes will only grow and reach a point of inflicting lasting collateral damage to the industry. It is time to calibrate the impacts of ...

  9. Research Perspective on Digital Forensic Tools and Investigation

    The digital forensic tool plays a crucial role in protecting from share trading fraud, financial fraud, identity theft, and money laundering. Investigators in Digital Forensic analysis have the right to use various forensic tools for investigation. Regretfully, several contemporary digital forensics technologies are lacking in a number of areas.

  10. A Comprehensive Digital Forensic Investigation Model and Guidelines for

    To address the issue of preserving the integrity of digital evidence, this research improves upon other digital forensic investigation model by creating a Comprehensive Digital Forensic Investigation Model (CDFIM), a model that results in an improvement in the investigation process, as well as security mechanism and guidelines during investigation.

  11. Research Trends, Challenges, and Emerging Topics in Digital Forensics

    Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acquisition, which often requires the use of several technologies. To date, researchers have presented many surveys and reviews on the field. However ...

  12. An Insightful Analysis of Digital Forensics Effects on Networks and

    The difficulties and necessities of executing digital forensics with machine learning in numerous sectors were covered in this study. On the chosen feature set, several machine learning methods are used to find different anomalous events. In the paper, numerous techniques for network forensics, audio forensics, and video forensics were ...

  13. Digital forensics and strong AI: A structured literature review

    In the first step we used Google Scholar with search terms AI digital forensics and Artificial Intelligence digital forensics to identify fitting papers. Then, we scrutinized the more than 10,000 results and derived search terms to narrow down the research (Schmid et al., 2022).Thus, we finally combined ("digital forensics" OR "digital forensic") with "AI" as well as "Artificial ...

  14. ROLE AND IMPACT OF DIGITAL FORENSICS IN CYBER CRIME ...

    In 2019, the market is forecast to grow 8.7 percent to $124 billi on. Cybersecurity Ventures also predicts cybercrime w ill cost t he world in e xcess of $6 trillion. annually by 2021, up from $3 ...

  15. Deep learning on image forensics and anti-forensics

    Image forensics protect the authenticity and integrity of digital images. On the contrary, as the countermeasures of digital forensics, anti-forensics is applied to expose the vulnerability of forensics tools. Consequently, forensics researchers could develop forensics tools against possible new attacks. This dissertation investigation demonstrates two image forensics methods based on ...

  16. Digital Forensic Evidence And Artifacts: Recent News And Research

    1st September 2020 by Forensic Focus. This month's academic research reflects two aspects of the changing digital forensics industry: new ways to think not just about digital artifacts, but also about broader investigative processes — including interagency cooperation. This round-up article includes three open-access articles from the in ...

  17. Dissertations / Theses: 'Digital Forensic investigations'

    Video (online) Consult the top 48 dissertations / theses for your research on the topic 'Digital Forensic investigations.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA ...

  18. M.Sc. Cybersecurity and Digital Forensics Thesis Topics

    Dear Albert, As part of the issues of cybersecurity and digital forensics, I propose the following topic for the thesis: Analysis of the impact of the increase in the development of e-commerce, e ...

  19. Data privacy preservation in digital forensics investigation

    As we know, in a digital forensic investigation, the investigators extract evidence from different types of digital media. However, the extraction method itself unlocks the way for digital forensic investigators to encroach the privacy of the individual. To detect fraud, an investigator collects and analyzes the digital evidence connected to ...

  20. Digital Commons @ NJIT

    Digital Commons @ NJIT Dissertations Electronic Theses and Dissertations 5-31-2021 Deep learning on image forensics and anti-forensics ... "Digital Forensics for Recoloring via Convolutional Neural Network," Computers, Materials and Continua, vol. 62, pp 1-16, 2020. Shen Z, Ding F, Shi Y., "Anti-forensics of Image Sharpening Using Generative

  21. Recent Dissertation Topics in Forensic Science

    From digital forensics to forensic psychology, the chosen dissertation topics reflect the evolving challenges and advancements in solving complex legal puzzles. Forensic DNA Analysis: "Next-Generation Sequencing (NGS) in Forensic DNA Profiling: Opportunities and Challenges". "The Impact of DNA Transfer and Secondary DNA Transfer in ...

  22. Interesting Top 10 Digital Forensics Thesis Topics [Innovative Ideas]

    Interesting Top 10 Digital Forensics Thesis Topics [Innovative Ideas] Digital forensics assists in the analysis, inspection, identification, and preservation of evidence (digital) collected on a wide variety of devices. It's the professional domain of studying, identifying, conserving, protecting, extracting, documenting, and creating digital ...

  23. PDF Introductions

    Digital forensics is the collection, analysis and interpretationof digital evidence. Digital Evidence "Any data stored or transmitted using a computer that support or refute a theory of how an offense occurred or that address critical elements of the offense such as intent or an

  24. Criminal Division

    From March 1 to March 20, ICITAP provided training to the Nepal Digital Forensics Lab (DFL). Sixteen attendees successfully completed this training on analyzing iOS devices from a basic to advanced level along with advanced SQLite training. During this training, ICITAP created an evidence intake workflow in alignment with industry best practices.

  25. Computer Networking & Cybersecurity

    What Is Computer & Digital Forensics? Computer Networking & Cybersecurity is a field that focuses on protecting computer systems, networks, and data from unauthorized access, attacks, and potential threats. It involves understanding how computer networks work, designing secure systems, implementing protective measures, and detecting/responding ...

  26. LIVE UPDATES

    8:42 a.m. Metadata Forensics is a consulting and training firm that does digital forensics on devices, expert testimony, training for law enforcement, attorneys, victim advocates. "We examine ...

  27. At the intersection of science and mystery

    The broad definition of forensic science to me is the application of scientific principles and methods to assist in criminal investigations and then in a court of law as well. It's using science and technology - research and the scientific knowledge you have — and then applying that to problems or mysteries you have to figure out.