Write review on digital evidence

Assignment Help Computer Engineering
Reference no: EM132130867

Write review on this article with APA format.

Digital evidence has become a key component of the judicial process, due solely to the frequency of communications and transactions completed on computers and mobile devices. As with all forms of evidence, the collection, preservation, and examination of digital evidence must be able to meet the requirements of legal admissibility, so that the conclusions made based on that evidence may be presented in court.

The specific rules applicable to any particular investigation will differ based on the jurisdiction of the offense under investigation. However, the admissibility of digital evidence will still be determined on the same principles as physical evidence: relevance, authenticity, not hearsay, best evidence, and not unduly prejudicial. Casey (2011) suggests investigators answer four questions when searching and seizing digital evidence:

Does the Fourth Amendment and/or the Electronic Communications Privacy Act (ECPA) apply to the situation? Have the Fourth Amendment and/or ECPA requirements been met?

How long can investigators remain at the scene? What do investigators need to reenter? (Section 3.2.1).

The Fourth Amendment ensures that individuals are protected against unreasonable search and seizures by the government. Considering whether the Fourth Amendment is applicable in a digital investigation can be difficult because of the transient nature of digital evidence and the multitude of methods by which it can be acquired.

The Electronic Communications Privacy Act (ECPA) (18 U.S.C. 2510-2522) was designed to provide further protection of digital communication, but only specifically addressed the issues of wiretapping, trap devices, and stored communications.

While this law was an important step for the protection of privacy in digital communications in 1986, the argument for revision has been introduced in Congress several times to update the law to include specific guidance for the growing number of different types of digital evidence. Casey (2011) also notes, "The most common mistake that prevents digital evidence from being admitted by courts is that it is obtained without authorization" (section, 3.2.1).

Another reason for digital evidence uncertainty can be seen when flaws are identified in the tools used by digital forensic examiners. This was famously demonstrated during the murder trial of Casey Anthony where digital investigators used a tool that was discovered to have serious design flaws. "This error likely contributed to the reasonable doubt jurors found when they acquitted Anthony of first-degree murder, especially since the correction occurred during trial" (Goodison, Davis, & Jackson, 2015, p. 2).

The Anthony case highlights the need for extensive digital forensic tool testing and validation of results before proceeding to present them in trial. Not only does the testing and validation of digital forensic tools help to establish the legitimacy and verifiable integrity of digital evidence, it also helps to establish and keep the digital investigators honest, as well. Proverbs 10:9 enforces the importance of this concept, "Whoever walks in integrity walks securely, but he who makes his ways crooked will be found out" (ESV). Casey, E. (2011). Digital Evidence and Computer Crime, 3rd Edition, Waltham, MA Academic Press Goodison, S. E., Davis, R. C., & Jackson, B. A. (2015). Digital Evidence and the U.S. Criminal Justice System . In RAND Corporation.

Verified Expert

The present solution is based on review of an article. The solution is prepared according to the given instructions and rubrics. All the information provided has been thoroughly followed and the solution in total comprises of more than 250 words. References, as suggested in the instruction were provided. The solution is provided in a Microsoft Office file and is completely free from any type of plagiarism

Reference no: EM132130867

Questions Cloud

Order of books on shelf : In how many ways can he do that if the order of books on each shelf is not important, but it is important on what shelf a book is.
Study participants sit in a chamber maintained : You decide to research further this seemingly contradictory guidance, hypothesizing that the true population average core body temperature
What are the four key traps to avoid when scenario planning : What are the challenges which are inherent in emerging technologies that scenario planning address?
What is the probability of re-admittance within 30 days : Given that a patient is considered "lower-risk", what is the probability of re-admittance within 30 days?
Write review on digital evidence : Write review on this article - Digital evidence has become a key component of the judicial process, due solely to the frequency of communication
Denote the normal random variable with mean : Let N(m, v) denote the normal random variable with mean m and variance v.
Deterring criminal behavior through environmental design : What is the field of Crime Prevention Through Environmental Design (CPTED) and identify some of the strategies .
What is the significance of access and corrective controls : What is the significance of access and corrective controls? Describe and explain some of the hardening methods of entry control.
Create in your own words a security awareness policy : You are in charge of creating a new security awareness policy for your organization or an organization you are familiar with.

Reviews

inf2130867

11/17/2018 2:30:28 AM

"I really would like to say thank you for all that you have done to assist me with keeping my stress levels low. Working with you guys is always soothing. thank you so much. well handled." Thank you very much, appreciated. You are really so much supportive.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd