Nobody downloaded yet

Legal Topic Digital Forensics - Research Paper Example

Comments (0) Cite this document
There are cybercrime laws that govern the prosecution of the crime. Different elements justify the adequacy of digital forensics investigation.
The United States v Lynn of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Legal Topic Digital Forensics Paper
Read TextPreview

Extract of sample "Legal Topic Digital Forensics"

Download file to see previous pages This investigation discovered one hundred and eighty four video files and fifty-three still images of child pornography in Lynn’s computer hard drive (Watson & Jones, 2013).
The investigation also found that the videos and images had been obtained from the internet using Limewire, a program that allows peer-to-peer file sharing. On the first count, the defendant was convicted of receiving child pornography, a crime that violates § 2252(a)(2). He was also convicted of possessing child pornography material violating § 2252(a)(4)(B). Lynn was sentenced to 210 months imprisonment for the count of receiving child pornography material and 120 months imprisonment for the count of possessing the material. The court ordered a term of life supervision after Lynn’s release from prison (Casey & Altheide, 2010).
Lynn’s case implored the application of 18 U.S.C §§ 2251 through 2260. These sections warrant criminal and civil forfeiture of devices used to depict child pornography, the profits obtained from these crime and properties used in committing them. Record keeping of materials used to depict sexually explicit conduct was provided for in section 2257. Lynn was also liable for failure to report child abuse that is entrenched in a misdemeanor crime in section 2258. The 18 U.S.C §2525 that addresses the circumstances involving the use of interstate facilities to disseminate information about a minor was applicable to Lynn’s case. Another law that applied to this case is Title 19 section 1305 that criminalizes the importation of obscene materials. This law permits courts to order the seizure and forfeiture of such materials (Altheide & Carvey, 2011).
Since Lynn retrieved the materials from the internet which is interstate, he was convicted of violation of the 18 U.S.C § 2252. This section criminalizes interstate distribution of materials depicting a child engaging in sexually explicit conduct. The Child ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Legal Topic Digital Forensics Paper Research Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved de
(Legal Topic Digital Forensics Paper Research Example | Topics and Well Written Essays - 1000 Words)
“Legal Topic Digital Forensics Paper Research Example | Topics and Well Written Essays - 1000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Legal Topic Digital Forensics Paper

Digital Evidence ethics and computer forensics

...There is an ethical framework that guides any specialist that carries out a forensic investigation. Ethic is basically the how somebody behaves towards a particular task or thing. It is all about what you feel it is good and right when you are handling a particular activity. Both the person doing it and the society at large should get satisfied with what you are doing and the way you are doing it. It is all about the obligation that someone has in the society. Investigation technique Digital evidence are gathered, critically analyzed and secured and produced when need be. The gathering of this evidence must be done in a legal way to avoid controversies. It is a section of large and...
12 Pages(3000 words)Essay

Small Scale Digital Device Forensics Lab Project

...?30 January Small Scale Dgital Device Forensics Lab Project The German born American physicist who developed the theory of relativity, Albert Einstein in a famous quote once said “it’s appallingly obvious our technology has exceeded our humanity,” and indeed he predicted the future accordingly as his discoveries had paved the way for the development of science and into elevating mankind into greater heights that he would never had assumed. The advancement of science, research and through the indefatigable efforts of men, we have explored space, harnessed energy from the elements of nature, broken down matter, questioned astronomies, cracked geology, coined astounding hypothesis almost as good as solid ground theories; in light... January...
4 Pages(1000 words)Essay

The Digital Forensics

A distributed network can be on a broad scale and may involve many enterprise computer networks. Likewise, the currently installed network security controls are bypassed by the worm because distributed traffic anomaly is complex and small to detect. However, combining with multiple small data packets can impose a significant impact, as they all share the same frequency and domain that is already happening in the current scenario. For this reason, a method for detecting threats originating from the distributed network was introduced by (Zonglin, Guangmin, Xingmiao, & Dan, 2009). The methodology includes a detection of patterns of the distributed network along with network-wide correlation analysis of instantaneous parameters, a...
4 Pages(1000 words)Research Paper

Digital Image Metadata and Exif files - Forensics

...? Digital Image Metadata and Exif files - Forensics Introduction The real world images are stored in the digital form on many types of electronic storage devices such as memory cards, computer hard disks, USB and CD/DVD. These images are captured through varieties of digital cameras and cam-recorders easily available in the market. Printed images are captured through different types of scanners. The information of digital image so captured or created is electronically represented in binary digits. There are two ways in which data of digital images are represented in the digital memory; raster images and...
5 Pages(1250 words)Research Paper

Computer/Digital Forensics into a presentable and layman terminology and bring it to their understanding at the same time ensuring that the data may not get changed or tempered in any intended or unintended manner. Obstacles faced are not just in the technical domain, rather the legal and evidence protection are two other areas which need to be looked into in order to make the field of forensic science and computing more effective . Apart from the methodical approach and the processes that may be taken, the paper suggests possible solutions towards the reduction of the chances of cyber offenses, these have been provided in form of double option strategy, the first one is creating of a centralized organization...
10 Pages(2500 words)Book Report/Review

The Increased Need for Digital Forensics

...scientist, searching the digital contents of a computer printer, would look for potential evidence such as time and date stamps, images still retrievable on the printer’s paper roller, or even the specific network identity of the printer if it was, indeed, attached to an online network (Ashcroft, 18). If the owner of this hypothetical printer was alleged to have been involved in a child pornography ring, as one example, residual ink images left on the roller or various computer files buried in the printer’s hard disk might indicate whether a given alibi is valid or whether the individual has actually been distributing sexually explicit, youth materials. The personal computer and the laptop provide a...
10 Pages(2500 words)Essay

Digital Forensics

...Running head: Digital forensics The need for digital forensics has risen with the increase in digital crimes. Criminal Prosecutors use evidence from digital forensics in a variety of crimes where one can find incriminating documents involving misappropriation record keeping, financial fraud, homicides, child pornography and drug trafficking among others. This paper involves an assessment study on digital forensics and its focus is on admissibility of electronic evidence. It demonstrates how a system administrator would capture and authenticate log files from a system...
6 Pages(1500 words)Essay

Digital Forensics/Electronic Evidence

...guilty (Daniel, 2012). Investigators involved in collecting evidence of digital nature ought to have permission to undertake the investigation process. Computers are considered personal therefore; the right procedure should be followed in order to retrieve any form of evidence. In addition, the investigators need to be conversant with computer and electronic operations this will ensure the criminals do not outshine them (Johnson, 2006). Policies with regard to digital evidence should be adhered to prevent interference with the evidence. Digital evidence also recommends that honesty and validity are observed to prevent evidence interference. References Daniel, L. (2012)....
1 Pages(250 words)Essay

Cybercrime Investigation and Digital Forensics

...would conduct an interview with the pertinent staff of the healthcare company in order to identify the potential sources digital evidences for the data breach (Nelson, Phillips & Steuart, 2009). The sources of evidence may be database systems, servers, call logs or mobile devices. Extreme care is taken for the preservation of the evidences complying with international standards. Evidences of data breach is collected by highly expertise forensic professional of our company so that it would minimize the risk of data contamination and reinforce the legal acceptability of the evidences collected (“Investigating a data breach,” n. d). Once the evidences are collected, visualizing tools can...
7 Pages(1750 words)Assignment

Overview of digital forensics at NIST

...Digital Forensics at NIST National Institute of Standards and Technology (NIST) is a federal technology agency that mainlyworks hand in hand with industries to improve the innovations technology and security. Digital forensics is a scientific technique used to provide analyzed information to support investigations in cases of security incidences, arising from crimes, system damages and even recoveries of lost or damaged data (Shirley, par. 1). The main aim of using these techniques is to provide defined information to help in the investigations, analysis and provide proper recommendations on computer based security incidences. Due to the increased computer related...
1 Pages(250 words)Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Legal Topic Digital Forensics Paper for FREE!

Contact Us