Forensic portfolio - Case Study Example

Comments (0) Cite this document
Forensic Portfolio James Moravec Institution Forensic Case Portfolio Introduction The era of information technology has made it possible for computer users to commit crime-using computers, but law enforcement officer also had tools that rely on computer to collect evidence about crime…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
Forensic case portfolio
Read TextPreview

Extract of sample "Forensic portfolio"

Download file to see previous pages The field of digital forensic analysis has various techniques that are critical in the identification, preservation, extraction, and documentation of digital evidence. The process of digital forensic is useful in solving criminal activities that touch on the use of computers (Casey, 2011). As a computer forensic, handling criminal involving computers is process of applying various procedures and practices that constitute best practices in digital forensics. This paper outlines the process of collecting digital evidence from the crime scene after the police called the digital forensic investigators. The paper outlines the digital forensic process applied on the photo show appendix A. the photo represents the area where the police officers believe a suspect took part in viewing and distribution of child pornography. On 10 December 2012, our computer forensic department received a request for computer forensic analysis. The local district police had sent the request to the head of the department after they had a suspect in custody. The suspect was behind the bars after the police received two complains from the suspect neighborhood that the suspect, Lee Oswald Havey, took part in distribution of child pornography. The request from the police was usual since the police also rely on the work of digital forensic analyst to collect digital evidence that is admissible before the courts of law. While computer forensic is of great value to investigators dealing with digital crime, such as seen in appendix A, there are many legal issues that are critical in any crime scene. Before working on the request, the department had to verify that the police had filled the appropriate forms requesting for the service. In addition, the department requested the police to furnish a copy of the warrant allowing for the seizure of computer hardware and other evidence that could link the Havey to the crime. The role of the warrant was critical since the Fourth Amendments protect all American citizens’ seizure or search unless police officers have probable cause of committing crime. As per the request, the request was in order and the investigators proceeded to carry the investigation at the crime scene. The investigators arrived at the home of the suspect the police showed them the room they suspected Havey to have used in watching and distributing child pornography. The room was dark with lights that were dim, but the investigators could still see the room. The room had two tables on the right and both had computer and other material. The first table had two computers under the desk with one being a Dell Vostro and another generic computer. The system units of these two computers were under the desk, but the user had switched them off. On the left desk were two sony 17’’ TFT screen. Both screens were connecting to the computer, but switched off. The same table also had a keyboard and a mouse. Beside the mouse were a USB thumb drive, mouse, and a notebook with a pen beside the book. Just beside the Sony TFT screen was some pieces of paper with some writings. There was a digital disk on the table, which appeared to have been in use. In addition, one of the screens had a sticky note attached to it with the note having some writings. The other screen also had some cables placed besides the base of the screen. The cables were the ends a microphone that was hanging off the table (the picture does not show the microphone hanging from the table). The second table had several items, as well. The ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Forensic case portfolio Study Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from
(Forensic Case Portfolio Study Example | Topics and Well Written Essays - 2750 Words)
“Forensic Case Portfolio Study Example | Topics and Well Written Essays - 2750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Forensic case portfolio

Case Law and Forensic Psychology

...? Forensic Psychology Task: Forensic Psychology Addington v. Texas The case refers to a suit instituted by Addington’s motherpetitioning for involuntary commitment of her son. She cited that the son had threatened her. Consequently, the police arrested Addington and arraigned him in court. The trial court, in Texas, required the jury to base their ruling on a clear confirmation of Addington’s illness. The jury decided that Addington was psychologically ill, and commitment was vital. The defendant appealed in the Texas Court of Appeal. The defendant’s idea was that the ruling ought to have a basis on unquestionable proof of his illness. The court of appeal accepted the argument, therefore, reversing the ruling. The case proceeded... within...
4 Pages(1000 words)Essay

Forensic Accounting Case Question (easy)

...Forensic Accounting Case Study a. Samantha is a new employee in the organization, and the fact that she has to audit employees who have been working with the company since it began, it is important for her to exercise care and caution. Although she could use this as an opportunity to prove her expertise in forensic accounting, the manner in which she approaches the situation significantly would determine her success. With the understanding that on Fridays, George, Gwen, Andy and Bob go out for lunch together is enough evidence that there is a close relationship among these individuals. Thus, she should ensure that she does not raise any alarm when going through the examination. If...
4 Pages(1000 words)Essay

Case Portfolio

...Topic: CASE PORTFOLIO, A COMPILATION A. Business and the Bill of Rights A Bill of Rights, Constitutional law Case number, and : Statesboro Publishing Co. v. City of Sylvania, - S.E.2d (1999 WL 304124, Sup. Ct., Ga.) 2. Parties : : Statesboro Publishing Co and . City of Sylvania 3. Legal Proceedings Constitutional Law 4. Facts : “To help reduce litter, the City of Sylvania enacted an ordinance prohibiting the distribution of free printed material in yards, driveways and porches. A publisher of the "Penny-Saver," a free weekly shopper newspaper thrown in yards and driveways, challenged the constitutionality of the ordinance. The trial court upheld the ordinance; the publisher appealed.”(...
4 Pages(1000 words)Essay

Case portfolio

...Case Portfolio List of potential digital evidence and explanation i. A removable flash drive/disk: This drive can be used as evidence to show any data that was stored in it by Mr. Didit. If this data was shared between several users, then a forensic study of the same can also reveal the destinations of the data with regard to the computers which it was used on. ii. The computer keyboard: This devise is used in typing and keying in computer commands. As such it can be easy to read the fingerprints of the last user forensically. This evidence can be preserved by taking a forensic imaging of the keys. It can also be preserved by totally being stored in a...
6 Pages(1500 words)Essay

Computer Forensics - Case Portfolio

...Computer Forensics - Case Portfolio 0 Case Summary The case is based on a criminal incident against child pornography. One of the employee in Widget Corporation namely Mr. Didit has been alleged for developing child pornography during the office premises. As a result, forensic investigation agency has been summoned in order to collect and examine digital evidences from the crime scene. Throughout the investigation process the legality and fairness has been maintained by engaging in best practices for evidence treatment. Various evidences have been gathered from the crime scene in order to judge that the employee is guilty of such a...
10 Pages(2500 words)Case Study

Forensic Pathology Case Study: Problem A

... Full Forensic Pathology (A case study on Problem A) 14 July Forensic pathology is a sub-specialty of pathology that determines the cause of death of people who died suddenly, violently, or unexpectedly by means of an autopsy. It requires a thorough knowledge of biology, science, medicine, and other fields in order to find the cause of death especially if foul play is suspected. Forensic pathologists are also called alternatively as medical examiners due to the nature of their job which is to think like a detective. Q1. The cause of Suzys death is probably due to alcohol poisoning which triggered a reaction in her body such as the development of hives resulting in itchiness from the allergies. She might have developed urticaria... her...
2 Pages(500 words)Assignment

Forensic Psychology Case Study: Custody Evaluations

... Forensic Psychology Case Study: Custody Evaluations From the child custody guidelines, before giving custody to a parent, factors such as the personality, family background, quality and nature of the parent and developmental needs of the child need to be assessed. In this case, the children have the characteristics acquired from parents. The family backgrounds of the parents play a big role in determining their nature upon growing up, and seemingly, the characteristics of a parent are passed on to the child. This is where the need to study the above factors comes in, being handing over custody to any parent. From the backgrounds of both parents, none is suitable to be a role model to the children. The fact that the mother came... from an...
2 Pages(500 words)Assignment

Forensic Science Case Study

...Forensic Science Case Study Part A With reference to instalments 3 and the CCRC report, write a critical essay discussing the investigation and trial of the A6 murder case James Hanratty is considered to be among the last individuals to be convicted and sentenced to death in United Kingdom after being found guilty of murdering Scientist Michael Gregsten in the year 1962 by shooting him in the head two times. At the same scene, Valerie Storie, who was Mr. Gregsten’s girlfriend, was raped and later shot five times, but by fate she did not die but rather got paralyzed. After the decision from the court that Hanratty must face death penalty for the crime he was convicted of, but a day prior...
24 Pages(6000 words)Case Study


...that it can be used to provide evidence. Encryption was used in the past to prevent people from viewing incriminating files (Taylor, Haggerty, Gresty, & Hegarty, 2010). A message is encoded using a particular key, hence making it impossible for anybody to decrypt it. Lastly, media database systems can be unified into one. Encryption and stenography can be used legitimately by forensic examiners to ensure that there is minimal tampering with the collected evidence. Stenography was used in the past to ensure confidential communication. Secondly, it can be used to protect data since it is embedded. References Bennett, S., Maton, K., & Kervin, L. (2008). The “digital...
1 Pages(250 words)Essay


...Forensic Document Examination Questioned documents are a common case in many legal proceedings. Forensic analysts are thus faced with a task of analysis the contents of the documents, nature of the materials used and the source. One of the primary tasks of forensic experts is to examine the individual characteristics of a document and match them with characteristics of a printer or photocopier. The printers and copiers always transfer their characteristics to the documents. The paper discusses the various characteristics of printers and copiers that make them readily identifiable. Such characteristics include; toner elements, grabber marks, graphic marks from specific...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Forensic case portfolio for FREE!

Contact Us