StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Digital Evidence & Legal Issues - Research Paper Example

Cite this document
Summary
Digital Evidence and Legal issues BCJ 3801 Date Professor Introduction The increasing cases of cyber crime have impacted changes in the legal structures that guide criminal procedure and the consumption of digital evidence by court. Digital crime has popularized a new type of evidence, digital evidence, whose collection differs from the conventional approaches to criminal investigation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Digital Evidence & Legal Issues
Read Text Preview

Extract of sample "Digital Evidence & Legal Issues"

Download file to see previous pages

The innovative ways of gathering digital evidence are so diverse that the structures created for the conventional investigations usually no longer work for the new (Richard, Golden, & Roussev, 2006). For instance, rules that are applied by criminal investigators when confronted with privacy versus security scenarios relative to physical crime probes, usually results in astonishing outcomes in the search for digital evidence. They allow extraordinarily invasive investigatory processes to go unchecked in some cases, and yet permit incredible threats to privacy to turn legitimate investigations into a cropper.

Court rulings and Congressional laws, have shored-up the weaknesses of the search for digital evidence and the prosecution of the suspects in the United States, nonetheless. Criminal evidence procedure The investigation process in regard to digital evidence, such as in system intrusion cases usually is split into three stages: It starts with the gathering of stored traces of facts from third-party databases, turns next to potential scrutiny of the exhibits, before the forensic probe of the suspected criminal’s hardware wraps up the process (Daniel, & Daniel, 2012).

These three stages fulfil the primary objectives of gathering digital evidence: they include; gathering digital evidence on traffic, gathering digital evidence kept on the servers operated by cooperative third parties, and gathering digital evidence kept with unfriendly parties, which may include the suspect. Each mechanism exposes unique pieces of evidence, and requires deeper scrutiny. Collection procedure of digital evidence According to Casey (2011), the procedure of collecting digital evidence is long, tedious and sometimes yields negligible outcomes.

Nonetheless, computer forensics specialists have crafted a comprehensive set of processes that forensic investigators ordinarily adhere to, when they capture and scrutinize a suspect’s computer and or related hardware. First, the investigators ordinarily confiscate the computer and take it to a government forensic laboratory for analysis. This is important because the analysis of the exhibit is a time-consuming process; computer specialists, usually cannot locate the evidence on a hard drive during a search operation.

At the forensic lab, the specialists begin by creating a “bitstream” image of the computer hard drive. The “bitstream” is an exact copy of all the bits and bytes kept on the hardware. The expert then carries out investigations on the “bitstream” in order to avoid any damages or alteration to the original hard drive during investigation. The crime analyst may explore different approaches such as executing successive searches for certain extensions, terms, or textual clues that match the nature of evidence sought.

Alternatively, the investigator may scan through all documents bearing particular features on the sample, until there is enough proof that links the suspect to the offense is achieved. For instance, if these techniques proved to be fruitful, and that an evaluation of the suspect’s computer reveals proof of the hacking of a company’s database, the suspect will face criminal charges (Richard, Golden, & Roussev, 2006). The prosecution will call upon

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Digital Evidence & Legal Issues Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/law/1455623-digital-evidence-criminal-evidence-legal-issues
(Digital Evidence & Legal Issues Research Paper Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/law/1455623-digital-evidence-criminal-evidence-legal-issues.
“Digital Evidence & Legal Issues Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/law/1455623-digital-evidence-criminal-evidence-legal-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF Digital Evidence & Legal Issues

Implementing Digital Signature Technology

Thus, digital signature is a suitable technique for saving customers from identity theft and various others frauds.... This report presents a detailed analysis of digital signature.... The aim of this research is to analyze the role of digital signature in forming e-commerce security....
22 Pages (5500 words) Essay

Challenges Faced by Cyber Forensic Experts in Search of Digital Evidence

This paper "Challenges Faced by Cyber Forensic Experts in Search of digital evidence" examines cyber forensics, by looking at the process and its applicability in contemporary society.... Cyber forensics is the use of scientifically verified techniques to collect, develop, deduce, and to apply digital proof to give a convincing depiction of cybercrime tricks (Saks & Koehler, 2005).... Cyber forensics also comprise the act of making digital information appropriate for addition to a scandalous investigation (Rowlingson, 2004)....
18 Pages (4500 words) Research Paper

Significance of the Digital Evidences Collected

This case study "Significance of the Digital Evidences Collected" presents digital evidence that is regarded as different types of electronic information and is considered as vital proof for evaluating a crime.... As a result, a forensic investigation agency has been summoned in order to collect and examine digital evidence from the crime scene....  digital evidence can exist in several formats such as text, graphics, audio, and video among others....
10 Pages (2500 words) Case Study

Role of Contemporary Digital Media in Criminal Investigations

The paper further discusses how digital media is associated with digital technology and structural hierarchies of power, diversity, digital evidence, its privileges, demerits and misconceptions.... digital evidence refers to any information or data considered to be of value in a criminal investigation.... digital evidence acquired from digital media is easily damaged or altered.... Digital media serves as the source of the digital evidence....
11 Pages (2750 words) Research Paper

Evidence Law Cases Analysis

This essay “Evidence Law” deals with evidence law in which a certain criminal case is discussed and the legal implications are highlighted.... In this case, analysis will be done on the basis or grounds of the arrest of the suspect and the viability of the evidence obtained.... There are no identifying marks or forensic evidence that would tie the gun to Michel.... Having consulted with his client, Mole points out to the police that there are serious doubts as to whether the police have made full disclosure of the evidence that they have against Michel and as a result, he is going to advise his client not to answer questions....
12 Pages (3000 words) Assignment

Digital Evidence: Understanding The Process and Challenges

This paper outlines computer forensics, the lifecycle of computer crimes, digital information, juridical and legal issues, problems and safety.... This assignment describes digital evidence: Understanding the Process and Challenges.... This paper deals with the processes and challenges involved in identifying, recovering, securing, examining, analyzing and preparing digital evidence from a crime scene.... omputer Forensics is a comparatively new branch of the crime investigational system and involves collecting digital evidence from the crime scene by the analysis of the computers systems, networks, and servers in addition to numerous other digital devices (Sahu, 2008, p....
13 Pages (3250 words) Assignment

Issues in Cyber Forensics Affecting ICT

ssues in Cyber ForensicsLegal IssuesAccording to Boddington (2012), legal issues with regard to investigating cybercrimes and taking legal action involve jurisdictions' disagreements, handling of the electronic evidence, provisos pertinent for legal enquiries, and the safety of the individual's privacy.... … The paper “issues in Cyber Forensics Affecting ICT” is a brilliant variant of literature review on information technology.... The paper “issues in Cyber Forensics Affecting ICT” is a brilliant variant of literature review on information technology....
14 Pages (3500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us