SlideShare a Scribd company logo
1 of 1
Download to read offline
Technology is advancing at an alarming rate. We now have more methods of interaction than
ever before: phone, text, instant messenger, GPS, Skype, etc. Businesses today must be
connected at multiple levels via multiple media in order to be competitive. Ponder and develop a
strategy for future forensic applications in an increasingly digitalized and connected world.
Discuss the challenges that these new media and technologies present to the forensic analyst and
begin to frame some solutions.
Solution
Computer forensics is the practice of collecting, analysing and reporting on digital data in a way
that is legally admissible. It can be used in the detection and prevention of crime and in any
dispute where evidence is stored digitally. Computer forensics follows a similar process to other
forensic disciplines, and faces similar issues.
The phrase “digital forensics” invokes an image of law enforcement officers conducting criminal
investigations. The breadth of digital forensics practices goes far beyond this narrow definition.
Civil cases use forensic analysis. Large corporations and organizations use their own forensics
groups to investigate internal issues, compliance, and insider threats that are rarely publicly
released. Governments have forensic resources that are applied in many areas, such as military
intelligence.
Forensic Applications of New Analytical Technologies
Multiply hyphenated techniques, such as gas chromatography/mass spectrometry with retention
time locking (GC/MS/RTL), liquid chromatography/time-of-flight mass spectrometry
(LC/MS/TOF), microfluidic-based capillary electrophoretic analysis of mitochondrial DNA
(mtDNA), and laser ablation inductively coupled plasma mass spectrometry (LA/ICP/MS), are
able to uncover forensically germane information by providing unprecedented levels of
analytical selectivity and sensitivity, extracting genetic signatures from previously overlooked
biological sources, and sequentially microdeconstructing samples so as to map the spatial
variation and concentration of elemental constituents. These new ranges of information and rich
data sets can contribute facts crucial to the reconstruction of events and thereby increase the
probability of an accurate finding in the matters under investigation.

More Related Content

Similar to Technology is advancing at an alarming rate. We now have more method.pdf

Question BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docxQuestion BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docx
makdul
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
todd271
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis Informatics
Lea Shanley
 
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
drennanmicah
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IJARIIT
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Onyebuchi nosiri
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Cameron Brown
 
Data privacy and security
Data privacy and securityData privacy and security
Data privacy and security
toomz32
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
mehek4
 

Similar to Technology is advancing at an alarming rate. We now have more method.pdf (20)

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Question BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docxQuestion BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docx
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis Informatics
 
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrime
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
Text mining on criminal documents
Text mining on criminal documentsText mining on criminal documents
Text mining on criminal documents
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsInspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal Applications
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms Race
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-race
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
Data privacy and security
Data privacy and securityData privacy and security
Data privacy and security
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
 

More from Rahul04August

Which one is the correct answer Which is not a KEY characteristic o.pdf
Which one is the correct answer Which is not a KEY characteristic o.pdfWhich one is the correct answer Which is not a KEY characteristic o.pdf
Which one is the correct answer Which is not a KEY characteristic o.pdf
Rahul04August
 
There is a surge of mergers and acquisitions among television networ.pdf
There is a surge of mergers and acquisitions among television networ.pdfThere is a surge of mergers and acquisitions among television networ.pdf
There is a surge of mergers and acquisitions among television networ.pdf
Rahul04August
 
The purpose of this C++ programming project is to allow the student .pdf
The purpose of this C++ programming project is to allow the student .pdfThe purpose of this C++ programming project is to allow the student .pdf
The purpose of this C++ programming project is to allow the student .pdf
Rahul04August
 
the consistent joining of two specific bases in nucleotides within DN.pdf
the consistent joining of two specific bases in nucleotides within DN.pdfthe consistent joining of two specific bases in nucleotides within DN.pdf
the consistent joining of two specific bases in nucleotides within DN.pdf
Rahul04August
 
Suppose a mutant fruit fly with blue eyes was recently discovered. I.pdf
Suppose a mutant fruit fly with blue eyes was recently discovered. I.pdfSuppose a mutant fruit fly with blue eyes was recently discovered. I.pdf
Suppose a mutant fruit fly with blue eyes was recently discovered. I.pdf
Rahul04August
 
Questions1. Research the Master Boot Record. Write a long paragra.pdf
Questions1. Research the Master Boot Record. Write a long paragra.pdfQuestions1. Research the Master Boot Record. Write a long paragra.pdf
Questions1. Research the Master Boot Record. Write a long paragra.pdf
Rahul04August
 

More from Rahul04August (20)

Why soot formation is only observed in diffusion flames I need deta.pdf
Why soot formation is only observed in diffusion flames I need deta.pdfWhy soot formation is only observed in diffusion flames I need deta.pdf
Why soot formation is only observed in diffusion flames I need deta.pdf
 
Which one is the correct answer Which is not a KEY characteristic o.pdf
Which one is the correct answer Which is not a KEY characteristic o.pdfWhich one is the correct answer Which is not a KEY characteristic o.pdf
Which one is the correct answer Which is not a KEY characteristic o.pdf
 
Which of the following statements about prokaryotes is falsea) Prok.pdf
Which of the following statements about prokaryotes is falsea) Prok.pdfWhich of the following statements about prokaryotes is falsea) Prok.pdf
Which of the following statements about prokaryotes is falsea) Prok.pdf
 
What type of computer would integrate the system unit (chassis and co.pdf
What type of computer would integrate the system unit (chassis and co.pdfWhat type of computer would integrate the system unit (chassis and co.pdf
What type of computer would integrate the system unit (chassis and co.pdf
 
What is the physical meaning of each term in the below equation DM_.pdf
What is the physical meaning of each term in the below equation  DM_.pdfWhat is the physical meaning of each term in the below equation  DM_.pdf
What is the physical meaning of each term in the below equation DM_.pdf
 
What is the difference between a nucleotide sequence and a protein s.pdf
What is the difference between a nucleotide sequence and a protein s.pdfWhat is the difference between a nucleotide sequence and a protein s.pdf
What is the difference between a nucleotide sequence and a protein s.pdf
 
types of becterias and diseases that come from of wrong storing food.pdf
types of becterias and diseases that come from of wrong storing food.pdftypes of becterias and diseases that come from of wrong storing food.pdf
types of becterias and diseases that come from of wrong storing food.pdf
 
Two white mice mate. The male has both a white and black fur-colo.pdf
Two white mice mate. The male has both a white and black fur-colo.pdfTwo white mice mate. The male has both a white and black fur-colo.pdf
Two white mice mate. The male has both a white and black fur-colo.pdf
 
Two chains are available to hold up an object. A student arranges t.pdf
Two chains are available to hold up an object. A student arranges t.pdfTwo chains are available to hold up an object. A student arranges t.pdf
Two chains are available to hold up an object. A student arranges t.pdf
 
This is a modeling problem in Interger programming.We have a probl.pdf
This is a modeling problem in Interger programming.We have a probl.pdfThis is a modeling problem in Interger programming.We have a probl.pdf
This is a modeling problem in Interger programming.We have a probl.pdf
 
There is a surge of mergers and acquisitions among television networ.pdf
There is a surge of mergers and acquisitions among television networ.pdfThere is a surge of mergers and acquisitions among television networ.pdf
There is a surge of mergers and acquisitions among television networ.pdf
 
The purpose of this C++ programming project is to allow the student .pdf
The purpose of this C++ programming project is to allow the student .pdfThe purpose of this C++ programming project is to allow the student .pdf
The purpose of this C++ programming project is to allow the student .pdf
 
the input to a frequency translation system has a bandwidth of 19 to.pdf
the input to a frequency translation system has a bandwidth of 19 to.pdfthe input to a frequency translation system has a bandwidth of 19 to.pdf
the input to a frequency translation system has a bandwidth of 19 to.pdf
 
The First genetic maps used genes as markers becauseplease answer.pdf
The First genetic maps used genes as markers becauseplease answer.pdfThe First genetic maps used genes as markers becauseplease answer.pdf
The First genetic maps used genes as markers becauseplease answer.pdf
 
the consistent joining of two specific bases in nucleotides within DN.pdf
the consistent joining of two specific bases in nucleotides within DN.pdfthe consistent joining of two specific bases in nucleotides within DN.pdf
the consistent joining of two specific bases in nucleotides within DN.pdf
 
Suppose a mutant fruit fly with blue eyes was recently discovered. I.pdf
Suppose a mutant fruit fly with blue eyes was recently discovered. I.pdfSuppose a mutant fruit fly with blue eyes was recently discovered. I.pdf
Suppose a mutant fruit fly with blue eyes was recently discovered. I.pdf
 
Students should research and identify an article on the subject of s.pdf
Students should research and identify an article on the subject of s.pdfStudents should research and identify an article on the subject of s.pdf
Students should research and identify an article on the subject of s.pdf
 
Questions1. Research the Master Boot Record. Write a long paragra.pdf
Questions1. Research the Master Boot Record. Write a long paragra.pdfQuestions1. Research the Master Boot Record. Write a long paragra.pdf
Questions1. Research the Master Boot Record. Write a long paragra.pdf
 
Problem Find the z-transform, in closed form, of the number sequence .pdf
Problem Find the z-transform, in closed form, of the number sequence .pdfProblem Find the z-transform, in closed form, of the number sequence .pdf
Problem Find the z-transform, in closed form, of the number sequence .pdf
 
Please give me as detailed as possible answers! Im really struggli.pdf
Please give me as detailed as possible answers! Im really struggli.pdfPlease give me as detailed as possible answers! Im really struggli.pdf
Please give me as detailed as possible answers! Im really struggli.pdf
 

Recently uploaded

Recently uploaded (20)

diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 

Technology is advancing at an alarming rate. We now have more method.pdf

  • 1. Technology is advancing at an alarming rate. We now have more methods of interaction than ever before: phone, text, instant messenger, GPS, Skype, etc. Businesses today must be connected at multiple levels via multiple media in order to be competitive. Ponder and develop a strategy for future forensic applications in an increasingly digitalized and connected world. Discuss the challenges that these new media and technologies present to the forensic analyst and begin to frame some solutions. Solution Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines, and faces similar issues. The phrase “digital forensics” invokes an image of law enforcement officers conducting criminal investigations. The breadth of digital forensics practices goes far beyond this narrow definition. Civil cases use forensic analysis. Large corporations and organizations use their own forensics groups to investigate internal issues, compliance, and insider threats that are rarely publicly released. Governments have forensic resources that are applied in many areas, such as military intelligence. Forensic Applications of New Analytical Technologies Multiply hyphenated techniques, such as gas chromatography/mass spectrometry with retention time locking (GC/MS/RTL), liquid chromatography/time-of-flight mass spectrometry (LC/MS/TOF), microfluidic-based capillary electrophoretic analysis of mitochondrial DNA (mtDNA), and laser ablation inductively coupled plasma mass spectrometry (LA/ICP/MS), are able to uncover forensically germane information by providing unprecedented levels of analytical selectivity and sensitivity, extracting genetic signatures from previously overlooked biological sources, and sequentially microdeconstructing samples so as to map the spatial variation and concentration of elemental constituents. These new ranges of information and rich data sets can contribute facts crucial to the reconstruction of events and thereby increase the probability of an accurate finding in the matters under investigation.