Write review on digital evidence

Assignment Help Computer Engineering
Reference no: EM132130867

Write review on this article with APA format.

Digital evidence has become a key component of the judicial process, due solely to the frequency of communications and transactions completed on computers and mobile devices. As with all forms of evidence, the collection, preservation, and examination of digital evidence must be able to meet the requirements of legal admissibility, so that the conclusions made based on that evidence may be presented in court.

The specific rules applicable to any particular investigation will differ based on the jurisdiction of the offense under investigation. However, the admissibility of digital evidence will still be determined on the same principles as physical evidence: relevance, authenticity, not hearsay, best evidence, and not unduly prejudicial. Casey (2011) suggests investigators answer four questions when searching and seizing digital evidence:

Does the Fourth Amendment and/or the Electronic Communications Privacy Act (ECPA) apply to the situation? Have the Fourth Amendment and/or ECPA requirements been met?

How long can investigators remain at the scene? What do investigators need to reenter? (Section 3.2.1).

The Fourth Amendment ensures that individuals are protected against unreasonable search and seizures by the government. Considering whether the Fourth Amendment is applicable in a digital investigation can be difficult because of the transient nature of digital evidence and the multitude of methods by which it can be acquired.

The Electronic Communications Privacy Act (ECPA) (18 U.S.C. 2510-2522) was designed to provide further protection of digital communication, but only specifically addressed the issues of wiretapping, trap devices, and stored communications.

While this law was an important step for the protection of privacy in digital communications in 1986, the argument for revision has been introduced in Congress several times to update the law to include specific guidance for the growing number of different types of digital evidence. Casey (2011) also notes, "The most common mistake that prevents digital evidence from being admitted by courts is that it is obtained without authorization" (section, 3.2.1).

Another reason for digital evidence uncertainty can be seen when flaws are identified in the tools used by digital forensic examiners. This was famously demonstrated during the murder trial of Casey Anthony where digital investigators used a tool that was discovered to have serious design flaws. "This error likely contributed to the reasonable doubt jurors found when they acquitted Anthony of first-degree murder, especially since the correction occurred during trial" (Goodison, Davis, & Jackson, 2015, p. 2).

The Anthony case highlights the need for extensive digital forensic tool testing and validation of results before proceeding to present them in trial. Not only does the testing and validation of digital forensic tools help to establish the legitimacy and verifiable integrity of digital evidence, it also helps to establish and keep the digital investigators honest, as well. Proverbs 10:9 enforces the importance of this concept, "Whoever walks in integrity walks securely, but he who makes his ways crooked will be found out" (ESV). Casey, E. (2011). Digital Evidence and Computer Crime, 3rd Edition, Waltham, MA Academic Press Goodison, S. E., Davis, R. C., & Jackson, B. A. (2015). Digital Evidence and the U.S. Criminal Justice System . In RAND Corporation.

Verified Expert

The present solution is based on review of an article. The solution is prepared according to the given instructions and rubrics. All the information provided has been thoroughly followed and the solution in total comprises of more than 250 words. References, as suggested in the instruction were provided. The solution is provided in a Microsoft Office file and is completely free from any type of plagiarism

Reference no: EM132130867

Questions Cloud

Order of books on shelf : In how many ways can he do that if the order of books on each shelf is not important, but it is important on what shelf a book is.
Study participants sit in a chamber maintained : You decide to research further this seemingly contradictory guidance, hypothesizing that the true population average core body temperature
What are the four key traps to avoid when scenario planning : What are the challenges which are inherent in emerging technologies that scenario planning address?
What is the probability of re-admittance within 30 days : Given that a patient is considered "lower-risk", what is the probability of re-admittance within 30 days?
Write review on digital evidence : Write review on this article - Digital evidence has become a key component of the judicial process, due solely to the frequency of communication
Denote the normal random variable with mean : Let N(m, v) denote the normal random variable with mean m and variance v.
Deterring criminal behavior through environmental design : What is the field of Crime Prevention Through Environmental Design (CPTED) and identify some of the strategies .
What is the significance of access and corrective controls : What is the significance of access and corrective controls? Describe and explain some of the hardening methods of entry control.
Create in your own words a security awareness policy : You are in charge of creating a new security awareness policy for your organization or an organization you are familiar with.

Reviews

inf2130867

11/17/2018 2:30:28 AM

"I really would like to say thank you for all that you have done to assist me with keeping my stress levels low. Working with you guys is always soothing. thank you so much. well handled." Thank you very much, appreciated. You are really so much supportive.

Write a Review

Computer Engineering Questions & Answers

  Explain why you can not input text to the editor

In what ways can a process behave when it receives a signal? Invoke the command vi foo &, and explain why you can't input text to the editor.

  Write a program that allows the user to input any number

Write a program that allows the user to input any number of hexadecimal characters. Sum the values and display the sum as a hexadecimal value.

  Monitoring of patient vital signs using mobile computing

Compare and contrast the monitoring of patient vital signs utilizing the mobile computing technology to in-patient visits to the doctor’s office or hospital.

  Explain the evolutionary algorithms

Evolutionary algorithms were introduced as general-purpose search algorithms developed with inspiration in evolutionary biology and applied for problem solving.

  Give an algorithm with polynomial running time to do this

Naturally, they're not sure that all these facts are correct; memories are not so good, and a lot of this was passed down by word of mouth.

  Write a program that simulates inventory bins in a warehouse

Write a program that simulates inventory bins in a warehouse. Each bin holds a number of the same type of parts.

  Describe what you believe to minimum set of branch condition

Describe what you believe to be a minimum set of branch conditions. Modify the branching hardware described on page 161 to complete your design.

  Create the logic for a program that computes weekly salary

Create the logic for a program that computes weekly salary. Include two overloaded methods named compute Weekly Salary().

  Discuss privacy issues related to the use of biometrics

various implementations and the ethical and privacy issues related to the use of biometrics

  Discuss the advantages of the approach

Briefly explain the main problem addressed and why you have found it interesting - Classify to which topic from the aforementioned areas this paper belongs.

  Create an implementation of a queue

Create an implementation of a queue that would have an average performance of (1) for enqueue and dequeue operations.

  Use the library and other quality resources for information

use the library and other quality resources for information about the role of computer forensics and security within

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd