Digital Forensics and Deoxyribonucleic Acid

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Introduction

The science of forensics encompasses a variety of other sub fields within itself. The field of forensics has a number of disciplines such as computer forensics, forensic DNA, forensic pathology, digital forensics and others. This paper seeks to address the relation between digital forensics and DNA in the prevention of terrorism activities both at home and abroad.

Digital forensics is at best described as the implementation of computer science and actions that are related towards investigation in the course of legal redress. These actions also engage the scrutiny of digital evidence after clear investigations and authority involved. Substantiation is done through mathematical and reporting techniques. The findings are presented in an expert manner. When discussing about DNA forensics, we may term it as the examination of any crime using genetic materials supplied from both living and non living bodies. Evidence is acquired from two sources, the scene where the crime has supposedly been committed and from the suspects. Its beginnings can be traced back to the early eighties when DNA was proposed by a famous pioneer in the field of criminology, Alec Jeffreys. He detailed various forensic techniques such as typing and DNA fingerprinting that was new and modern at the time. DNA sequencing developed into a profession and has assisted many law enforcers in the prosecution of offenders through the presenting evidence in a court of law. Examples of where DNA can be obtained from include, hair, semen and skin samples. This information is stored in large databases and search queries regarding suspects can be found from them. These two fields are fast becoming the modes in which terror cell can be unraveled and terror plots against the state and its citizens unraveled.

Cybercrime terrorism

Terrorists have been known to use existing network resources in the gathering and theft of critical information from key security and other department within the government. Through the use of malwares and botnets, they have been able to gather intelligence on key operations and secret project that touch on military and security forces. This is because they have identified that malwares can go around in an easy and rapid manner within a network to collect and disable computers and key computing resources such as servers and other key data storage devices. Security threats in the cyber world are numerous and could be perpetuated by anyone with an internet line and a computer. With the advent of the World Wide Web, we are seeing terrorist taking advantage of its autonomy in the spread of radical ideas and teachings to potential terrorists. It is hence the work of digital forensics to stop and prevent such individuals from influencing innocent and ignorant minds and hateful messages from being delivered to the masses. The practice of digital forensics involves analysis of data collected computing devices from a particular crime scene. The recovery of information without any authority results in a breach of security and should be punishable under existing laws. The recent relocation of Google offices from the Chinese mainland due to repeated infiltrations into their mail databases just exemplifies the nature and impact of such activities on a big company. One can only imagine what would happen if critical information gained from sensitive departments within the government, is implemented by terrorists. Using a number of software and hardware, security within an organization or an individual basis can be enhanced. Digital forensics is not only confined to computer networks but may involve investigation of call records, flash memory and other digital sources in the provision of evidence in legal actions that may follow there after.

Use of DNA in the prevention of Terrorism

Researchers and scholars have confirmed that there is a definite similarity in the chemical structure of deoxyribonucleic acid in every individual. The difference occurs in the series of base pairs. These differences can be detected through DNA fingerprinting. The process of fingerprinting can prevent terrorism through profiling of suspects and people placed in the most wanted list. The state has a large database that samples frequent crime offenders such as rapists and other violent individuals. Terrorist are people who have a have a history of conducting other crimes. It is through the effort of DNA implemented by local law enforcement agencies, that we can positively identify potential terrorism and prevents any plots that they may be planning against the state.

Conclusion

These two instruments of forensics play a big role in the identification and arrest of suspects involved in activities that may lead to the death of innocent lives in any country. Digital forensics is used in collaboration DNA sampling to positively match individuals. There are times that DNA can be used to match a suspect who has committed electronic fraud. The fraud can be further supported through evidence acquired through Digital forensics.

References

Holt, Cynthia. (2006). Guide to information sources in the forensic sciences. New York: Libraries Unlimited.

Kirshenbaum, Mathew. (2008). Mechanisms: new media and the forensic imagination. Massacheutes: MIT Press.

Wiles, Jack. (2009). The best damn cybercrime and digital forensics book period. California: Syngress.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now