Discuss how the evidence may have been analyzed

Assignment Help Other Subject
Reference no: EM131670986

Assignment

Unit 1

8-10 pages for the shell document with formatting; 2-3 pages.

For the assignments in this course, you will be developing a Forensics Research Report. Your first task in this process is identified below (under New Content)

You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add contents to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

The following are the project deliverables:

• Forensics Research Report document shell

o Use Word

o Title page

- Course number and name
- Project name
- Your name
- Date

o Table of Contents (TOC)

- Use an autogenerated TOC.
- This should be on a separate page.
- This should be a maximum of 3 levels deep.
- Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

o Section Headings (Create each heading on a new page with "TBD" as the content, except for the section listed under New Content below.)

- Electronic Evidence and Crime
- The Crime Scene
- Chain of Custody Concerns
- Digital Evidence and Admissibility
- Process for Evidence Used in Legal Proceedings

o References

New Content

• Electronic Evidence and Crime

o Using a search engine with queries such as "legal cases involving digital evidence," "criminal cases involving electronic evidence," and "civil cases involving digital evidence," choose a case. (There is 1 case you cannot choose: it involves Kimmy, Kruse, and Cam).

o Describe the digital evidence used in the case and explain how it supported the investigation.
o Identify how the evidence was found.
o Discuss how the evidence may have been analyzed.
o Be sure to cite the case research in the references.

Unit 2

10-12 pages, with 2-3 pages specifically for new content assignment. For this assignment, you will review the case of Kimmy, Kruse, and Cameron. You are expected to search additional sources about the case. You must complete the following:

• Identify what is considered crucial electronic evidence for this case.
• Identify how the police obtained the electronic evidence.
• Discuss what you believe the electronic crime scene is in this case.
• Discuss what electronic evidence you believe was admissible in court from this case.

The following are the project deliverables:

• Update the Forensics Research Report document title page with a new date and project name.
• Update the previously completed sections based on the instructor's feedback.
• New Content: The Crime Scene (see instructions listed above)
• Be sure to update your table of contents before submission.
• Name the document "yourname_CSS350_IP2.doc."

Reference

Kushner, D. (2011, October 27). Murder by text. Vanity Fair.

Unit 3

12-15 pages, with 2-3 pages specifically for Week 3's new content assignment.

For this assignment, you will conduct Internet research and create an opinion based on how best to collect evidence from a case involving social media. Please discuss how you would maintain the chain of custody for these types of cases. You will need to consider the following:

• What physical and electronic evidence can you as the investigator obtain?
• How would you safeguard that evidence?
• How would you create a chain of custody for this evidence?
• What are the limitations when protecting evidence only found online or in the cloud?

Before writing this section, complete the following:

The following are the project deliverables:

• Update the Forensics Research Report document title page with a new date and project name.
• Update the previously completed sections based on the instructor's feedback.
• New Content: Chain of Custody Concerns (see instructions listed above)
• Be sure to update your table of contents before submission.

References

Russell, L. (2013, April 24). When oversharing online can get you arrested. CNN.

United States v. Meregildo. 920 F.Supp.2d 434 (S.D.N.Y. 2013).

Unit 4

15-17 pages, with 2-3 pages specifically for Week 4's new content assignment

For this assignment, you will conduct Internet research and discuss the causes for why electronic evidence may be found inadmissible in court. Be sure to address the following:

• Spoliation
• Tampering
• Fruit of the poisonous tree

The following are the project deliverables:

• Update the Forensics Research Report document title page with a new date and project name.
• Update the previously completed sections based on the instructor's feedback.
• New Content: Chain of Custody Concerns (see instructions above)
• Be sure to update your table of contents before submission.

Unit 5

17-20 pages, with 2-3 pages specifically for new content assignment

For this assignment, you will conduct Internet research and create a guide for how you, as an investigator, plan to accomplish the following:

• Collect electronic evidence - list the tools and methods you would use to collect a forensic image of a hard drive while on scene.
• Store electronic evidence - explain best practices for storing, packaging and documenting the evidence found on scene.
• Analyze electronic evidence - what are some ways investigators analyze electronic evidence such as tools, methods and sources of artifacts.

This guide should assume that the evidence will be used in a legal proceeding. You may include templates and forms which you would use while at the crime scene or in the lab (an example would be a sign in and out log for the storage area).

The following are the project deliverables:

• Update the Forensics Research Report document title page with a new date and project name.
• Update the previously completed sections based on the instructor's feedback.
• New Content: Process for Evidence Used in Legal Proceedings
• Be sure to update your table of contents before submission.

Attachment:- Computer-Forensics.rar

Reference no: EM131670986

Questions Cloud

Develop business recovery strategies for sangrafix : Develop business recovery strategies for SanGrafix, a video game design company.
What are the dimensions of cultural diversity : What are the dimensions of cultural diversity? Identify and briefly explain the dimensions by referencing the text.
Compute the expected balance in accounts receivable : Prepare a schedule of cash collections for May through July - Compute the expected balance in Accounts Receivable as of July 31
Are children harmed if they do not feel good : Should parents try to promote children's self-esteem by telling them they're "smart" or "wonderful"? Are children harmed if they do not feel good?
Discuss how the evidence may have been analyzed : Identify how the evidence was found. Discuss how the evidence may have been analyzed. Be sure to cite the case research in the references.
How many workers commute from the west side of rio grande : An office in Albuquerque has 24 workers including management. Eight of the workers commute to work from the west side of the Rio Grande River.
Sturdy sense of self in infants and toddlers : 1. Suggest ways that parents can promote a sturdy sense of self in infants and toddlers.
Create a query that shows the productid and productname : Create a query that shows the Country, City, CustomerID, and Customer CompanyName for all customers located in France, Spain, or Sweden.
Discuss the impact of cyberbullying in today society : Discuss the impact of cyberbullying in today's society. Be sure to reference concepts and/or research you read about in Chapter 12.

Reviews

Write a Review

Other Subject Questions & Answers

  Write a well-formulated paragraph on theoretical perspective

For this assignment, please write a well-formulated paragraph on the theoretical perspective you think is the most prominent for each the 3 leaders identified below.

  How does this differ from a social network

What are the principles of scholarly discussion in an online environment? How does this differ from a social network? Please cite the sources used to support your response.

  Describe the value of the monthly budget report

Describe the value of the monthly budget report, the quarterly budget report, and the fiscal year budget report. What would occur without reviews of budget reports?

  Cognitive-gestalt-evolutionary psychology perspectives

Give a short Comparison and Contrast of these 3 Psychological perspectives:

  Explain applied behavioral analysis

select one of the common approaches mental health professionals use to support individuals living with a developmental disability

  How can the content of consumer blogs affect companies

Marketing The blog (Web log) is a personal, contemporary, and sometimes interactive publishing of information on the Internet. Blogging has become an extremely popular activity on the Internet today.

  Threats to web security-man-in-the-middle attack

Brute-Force Cryptanalytic Attack: An exhaustive search of the key space for a conventional encryption algorithm. Man-in-the-Middle Attack: An attacker interposes during key exchange, acting as the client to the server and as the server to the client.

  Impacted the criminal justice system

What is an example of technology that has impacted the criminal justice system? How does this technological advancement enhance/challenge the effectiveness of communication(s) within the various areas of the criminal justice system?

  Main motivations for toleration

Briefly describe three of the main motivations for toleration? indicate which one is associated with the moral virtue of toleration and why this is the case?

  Make a database to track his dvd-blueray collection

Martin wants to make a database to track his dvd/blueray collection. He has been tracking them in a spreadsheet with these collumns:

  Differences between feudal divine determinism

Reflect on the differences between feudal "divine determinism" that justified inequalities by claiming that God had ranked people into ascribed statuses, and the "biological determinism" that justified inequalities after the Enlightenment.

  Discuss the community policing and community involvement

Does the broken windows theory apply to the Anonymous Community scenario? Why, or why not?How did the process of assimilation impact the relationship between the police and the Anonymous Community?What strategies could police use to improve communica..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd