Digital forensics (sometimes digital forensics) is the branch of forensic science that covers recovery and investigation of materials found on digital devices, often in relation to computer crime. Term was originally used as the synonym for computer forensics but has expanded to cover other devices capable of storing digital data. Discipline evolved in the haphazard manner over decade from 1990 and it was not until 2000s that national policies were created. Investigations usually take one of three ways, forensic analysis (where evidence is retrieved to support or oppose the hypothesis in the criminal court), electronic discovery (the form of discovery related to civil litigation) or investigation of intrusion (which is the specialized research on nature and scope of the network intrusion unauthorized). Science of digital forensics is divided into several sub-branches, computer forensics, network forensics, forensics database and mobile device forensics. In addition to identifying direct evidence of the crime, digital forensics can be used to assign specific evidence suspects, confirming alibis or statements, determining intent, identify sources (for example, in cases of copyright) or authenticate documents . Research is much broader in scope than other areas of forensic analysis (where common objective is to answer the series of simple questions), often with complex timelines or scenarios.
Introduction
Before 1980's computer-related crimes were dealt with using existing laws. First computer crimes were recognized in 1978 Florida Computer Crimes Act, which includes laws against unauthorized modification or deletion of data in the computer system. In coming years, range of computer crimes are committed more, and passed laws to deal with copyright issues, privacy or harassment (e.g., cyber bullying, cyber bullying and online predators) and child pornography. It was not until 1980 federal law that began to incorporate crime. Canada was first country to pass the law in 1983. This was followed by U.S. Federal Computer Fraud and Abuse Act in 1986, amendments to Australia for their crimes acts in 1989 and British Computer Abuse Act in 1990. More recently, concern about cyber warfare and cyber terrorism has become an important issue. THE February 2010 by U.S. Joint Forces Command concluded:
Through cyberspace, enemies will focus on industry, academia, government and military in air, land, sea, and space domains. In same way that air power transformed field battle of Second World War, cyberspace has broken physical barriers that protect the nation from attacks on their trade and communication (Carrier, 2006).
In response to growth of computer crime in years 1980 and 1990 law enforcement agencies began to establish specialized research groups, usually at national level. Throughout 1990's there was great demand for these resources, leading to creation of regional and even local units. During this period, science of digital forensics came from ad-hoc tools and techniques developed by professionals. This is in contrast to other forensic sciences, developed from work by scientific community. Rapid development of discipline as the result of the lack of standardization and training. In his 1995 book, High Technology Crime: Investigating Cases of teams, K Rosenblatt writes: