Skip to Main Content
Boston University
  • Bostonia
  • BU Today
  • The Brink
  • University Publications

    • Bostonia
    • BU Today
    • The Brink
  • School & College Publications

    • The Record
Other Publications
BU Today
  • Sections
News, Research, Community

Computer Crime Fighters

ENG student gets hands-on experience with computer forensics

August 28, 2007
  • Nicole Laskowski
Twitter Facebook
Soyup Hahn (ENG’09) uncovered a career in cybersleuthing this summer learning about computer forensics. Photo by Nicole Laskowski

No matter how careful cybercrooks are, like any burglar, they leave behind traces of their wrongdoing, revealing where they’ve been and what they’ve been up to. And like crime scene investigators, computer forensics experts can follow that trail of clues as they try to crack a case.

This summer, Soyup Hahn (ENG’09) got a taste of cybersleuthing as an intern at First Advantage Litigation Consulting in Boston, a company that specializes in litigation support services, including computer forensics.

“I don’t know what I want to do after I graduate,” says Hahn. “I wanted to explore my options by doing an internship, and forensic data recovery just sounded cool.”

Of the investigations that First Advantage conducts, 80 percent involve intellectual property theft. It is a growing problem nationally; the U.S. Department of Justice recorded a 26 percent increase in the number of intellectual property cases between 1994 and 2000.

Sometimes employees try to sell the information, use it at their next place of employment, or even create a competing company. The most common methods of intellectual property theft include e-mailing information to a Web mail account, saving data on a removable storage device like a flash drive, and burning CDs.

The remaining 20 percent of intellectual property cases involves hacking, harassment, installation of pirated software, and illegally downloading music.

A forensics expert begins the process of acquiring data, or the chain of custody, by taking what is called a forensic image — a transmission of every bit of information contained on an electronic device. To do this, the electronic device is hooked up to a “write-block,” a piece of equipment that makes sure the data removed from the original device haven’t been modified. The data are then stored on the forensics expert’s own hard drive.

“This is the most important part of the process,” says Hahn. “If the acquisition is done improperly, it could damage the case.”

The image is taken back to the office, copied, and logged in the evidence room. From there, the expert begins to analyze the copy.

“We can look at all of the documents a user has been interacting with in the last few weeks: what they’re modifying, what they’re deleting, their Web site activity, their recent e-mail activity, any storage devices they’ve plugged into the computer,” says First Advantage northeastern regional director Mark Spencer, who was Hahn’s supervisor.

The forensic image contains more information than a user may suspect, Hahn says. It includes not only files that users can see, but those they can’t, such as deleted space — space marked available because a file has been deleted but, as is often the case, not destroyed — and slack space, or the space between where one file ends and the next begins.

Spencer compares the concept of slack space to a parking space. A compact car parked in a spot big enough for a Hummer can’t fill the entire spot. The same thing happens with documents. A computer forensics expert can access the leftover space to recover remnants of what had been there and to search for evidence of illegal activity such as intellectual property theft.

“I had no idea this type of career even existed before the internship,” says Hahn, who will continue as a part-time employee at First Advantage this fall. “I like the fact that this job requires you to think and to concentrate, and it can be really challenging.”

 

 

Explore Related Topics:

  • Computers
  • Forensic Science
  • Gadgets
  • Share this story

Share

Computer Crime Fighters

Share

  • Twitter
  • Facebook
  • Reddit
  • LinkedIn
  • Email

Latest from BU Today

  • THINGS TO DO

    Make the Most of Spring Break with These Events

  • Politics

    Boston University Scholar, a Former British Ambassador to Cuba, on the Island Country’s Challenges

  • In the City

    Getting to Know Your Neighborhood: Brookline Village

  • History

    Five Phone Calls That Changed History

  • Watch Now

    Video: Leaders Among Us—President Gilliam in Conversation with Maisha Kazi (CAS’26)

  • Film & TV

    BUTV’s Terrier Tonight: BU’s Version of Saturday Night Live

  • Innovation

    BU, Bell, and Celebrating 150 Years of the Invention of the Telephone

  • Faculty

    Alexander Graham Bell: The BU Years

  • Boston Marathon

    Running This Year’s Boston Marathon to Help Others? We’d Like to Hear from You

  • Students

    Life as a Third-Year BU Medical Student

  • Business & Law

    What Might the Fallout Be from SCOTUS Ruling on Tariffs?

  • Arts & Culture

    Boston University Libraries Officially Home to Nikki Giovanni’s Papers

  • Varsity Sports

    BU Track and Field Teams to Host Patriot League Championships This Weekend

  • THINGS TO DO

    This Weekend @ BU: February 26 to March 1

  • University News

    Chris Sedore, BU’s IS&T Leader, Named First Chief Transformation Officer

  • BUTV10

    BUTV Premieres First Black History Month Special, Pulse: The Soul of Boston

  • University News

    Boston University Launches Awards for Staff Whose Work Exemplifies the University’s Values

  • University News

    Boston University to Remain Closed Tuesday After Historic Blizzard

  • Books

    CFA Professor’s Love Letter to Roxbury

  • University News

    Nor’easter to Close BU’s Charles River, Medical Campuses Monday

Section navigation

  • Sections
  • Must Reads
  • Videos
  • Series
  • Close ups
  • Archives
  • About + Contact
Get Our Email

Explore Our Publications

Bostonia

Boston University’s Alumni Magazine

BU Today

News, Research, Community

The Brink

Pioneering Research from Boston University

  • Twitter
  • Facebook
  • Youtube
  • LinkedIn
  • Instagram
  • Weibo
  • TikTok
© Boston University. All rights reserved. www.bu.edu
© 2026 Trustees of Boston UniversityPrivacy StatementAccessibility
Boston University
Notice of Non-Discrimination: Boston University prohibits discrimination and harassment on the basis of race, color, natural or protective hairstyle, religion, sex or gender, age, national origin, ethnicity, shared ancestry and ethnic characteristics, physical or mental disability, sexual orientation, gender identity and/or expression, genetic information, pregnancy or pregnancy-related condition, military service, marital, parental, veteran status, or any other legally protected status in any and all educational programs or activities operated by Boston University. Retaliation is also prohibited. Please refer questions or concerns about Title IX, discrimination based on any other status protected by law or BU policy, or retaliation to Boston University’s Executive Director of Equal Opportunity/Title IX Coordinator, at titleix@bu.edu or (617) 358-1796. Read Boston University’s full Notice of Nondiscrimination.
Search
Boston University Masterplate
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
Computer Crime Fighters
0
share this