Discover evidence on electronic devices for criminal cases and trials.
What does a Forensic Computer Examiner do?
A Forensic Computer Examiner takes part in criminal investigations, collecting evidence stored in electronic devices. As a Forensic Computer Examiner, you typically work with computers, cell phones, and personal digital assistants, but can be asked to collect information from CDs, MP3 players, portable USB drives, and computer hardware as well. Your duties range from recovering deleted files to analyzing email metadata to reconstructing hard drives.
As a Forensic Computer Examiner, you have an arsenal of techniques at your disposal to pull information from an electronic device. If criminals think they can simply delete a file to hide it from you, they better think again. You have the nose of a bloodhound combined with the brain of Bill Gates.
Data files like emails or text messages continue to be stored in a system long after they’re deleted. Often, digital files contain information about who wrote, opened, or modified them. Using special software, you can also gain access to encrypted files, which normally cannot be opened because access privileges are limited.
In 2005, the infamous BTK serial killer was captured partly because he sent police digital files on a floppy disc. A Forensic Computer Examiner extracted information about his name and location from the files.
A major part of your job involves presenting your findings during trials. It’s important that you’re able to explain highly technical terminology to jurors who may not be computer-savvy. Testifying in court also requires that you keep meticulous notes when you conduct your investigations. Lawyers will ask you questions about your process, and you must be able to give them detailed answers.