With the rapid development of information technology, computer and networking, it has brought convenience to the whole world, it has changed the way we live our daily life, interactions with people are no longer just face to face, but can be transmitted through the use of internet. With the frequent use of internet technology, Cyber crime became the new threat of our society. Amongst all advance technology, wireless network is the number one threat, with high mobility, no wired required and easy installation, it's the most common way to access the internet these days. Wireless signals travels through air rather than a traditional wired network which can be much more vulnerable for those who has intentions pursuing illegal activities. With the increases growth of internet users and the development of new technologies, current legislations and security has faced difficulties in trying to keep up, hence Cyber crime numbers are increased rapidly. Although wireless Cyber crime is a new threat, but with the detail tracking and investigation effort, ultimately the professional will find some kind of digital evidence, and its often required to identify and preserve in order to be recognized and restoring the truth, hence the establishment of trainings in digital evidence through to forensic requires immediate implementation, with increase of the standards and knowledge it will strength the competence and credibility of the forensics unit's professional ability in assistance to fight again all crime.
[1]
Eoghan Casey,et al.
Network traffic as a source of evidence: tool strengths, weaknesses, and future needs
,
2004,
Digit. Investig..
[2]
Jill Slay,et al.
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis
,
2008,
2008 Third International Conference on Availability, Reliability and Security.
[3]
Eoghan Casey,et al.
Handbook of Digital Forensics and Investigation
,
2009
.
[4]
Jill Slay,et al.
Digital Forensics: Validation and Verification in a Dynamic Work Environment
,
2007,
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[5]
S. Shenoi,et al.
Packet Sniffing for Automated Chat Room Monitoring and Evidence Preservation
,
2001
.
[6]
A. Patel,et al.
The impact of forensic computing on telecommunications
,
2000
.
[7]
Eoghan Casey,et al.
Digital Evidence and Computer Crime
,
2000
.