StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Forensic investigator - Essay Example

Cite this document
Summary
As I reached the unit, I was presented with the criminal record file of James Murray (culprit), aged 19, an information technology student at Hartford High School. His file showed a number of other accusations along with the crime using computer-generated…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Forensic investigator
Read Text Preview

Extract of sample "Forensic investigator"

Download file to see previous pages

The report is composed in response to a request from the investigation unit. 1. James Murray allegedly worked as a team head of numerous drug dealers on small scale level. The culprit had sensitively plotted and worked on the whole scheme of drug dealing. The co-conspirators were corresponded through a laptop hence leading to no physical proofs to the forensic unit. The culprit was first reported by one of his classmates, Walter Thom, declaring that he had heard the culprit conversing about the deal over the cell phone, offering the bureau an opportunity to generate his phone records for the proceedings of this case. 2. After the statement from Thom (witness), Murray (culprit) was put under surveillance.

His internet connection and phone records were under continuous observation of the investigation bureau. Surprisingly, for over more than two weeks time, there was no obvious evidence of the culprit being engrossed in any of the drug dealing crime. Neither his phone records showed any suspicious calls or text messages. On further evaluation, it was noticed that during 10 PM until the midnight, for two weeks, no data was received from the culprit although the connection was sustained. The testing concluded that the culprit exploited a high technology hacking system which would facilitate his data to be transmitted to his co-conspirators through a profoundly secured portico.

The hacking experts took two days to access his system. And the flow of receiving the data alleviated. After that, there was no reply to this e-mail. The other culprit might have discussed it in person or through some other mean. The e-mail was a significant source of the other two names engaged in this crime. Investigations on Job Rhett, aged 24, with rather a considerable criminal record and Robin White, aged 19, a college student debarred due to disgraceful leisure pursuits and conduct. The email also gave a hint that the culprits used a code word for the drugs: spoon.

The ‘car’ was

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forensic investigator Essay Example | Topics and Well Written Essays - 4000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1565277-forensic-investigator
(Forensic Investigator Essay Example | Topics and Well Written Essays - 4000 Words)
https://studentshare.org/miscellaneous/1565277-forensic-investigator.
“Forensic Investigator Essay Example | Topics and Well Written Essays - 4000 Words”, n.d. https://studentshare.org/miscellaneous/1565277-forensic-investigator.
  • Cited: 0 times

CHECK THESE SAMPLES OF Forensic investigator

Fingerprinting Procedure and Its Importance

As the author puts it, few elements of evidence can b e considered more important to the forensic investigator than fingerprints and the technology that surrounds fingerprints.... This essay "Fingerprinting Procedure and Its Importance" deals with the significance of fingerprinting for an investigator.... hellip; Even though technology has dramatically altered the type of evidence forensic investigators can collect, such as DNA evidence, fingerprints remain very important....
1 Pages (250 words) Essay

WE 5 AL &WE Response CRJ 545

eri DeWitt InterviewIn this interview, it is clear that the position of a forensic investigator requires someone with experience and a good education background.... mpressions as EvidenceIt is clear that gathering enough evidence is the goal of any investigator.... However, this cannot be achieved when an investigator(s) overlook some of the evidence such as impression evidence.... One of special interest is the forensic evidence....
2 Pages (500 words) Essay

Interview Methodology for a Digital Forensic Examination

This paper "Interview Methodology for a Digital forensic Examination" is dedicated to the analysis of the development of an interview methodology for a digital forensic examination.... It will depict the instructions and definitions for the forensic examiner.... This aspect results from the process, methodologies, or approaches adopted when conducting a digital forensic examination.... The report outlines the examination process as well as the pertinent data that has been recovered from the forensic information (Kohn, 2012)....
6 Pages (1500 words) Research Proposal

Advanced Criminalistics - Document Examination

For instances, if the identity thief erased or made some content obscure, a forensic investigator may be able to notice through handwriting.... orensic Science in Fighting Identity Theft forensic science can provide and use POS terminals and VPD techniques for detecting modified ATM intersections, concealed CCTV setups, listening gadgets, and custom-built or modified electronics of all kinds (Kevin, 2008).... Through forensic science's joint effort with the technology industry and the police, forensic analysis or investigations that formerly showed technological or paper transaction limitations or unknowns become solvable....
2 Pages (500 words) Assignment

The Scope of Job and Role of a Forensic Investigator

The paper "The Scope of Job and Role of a forensic investigator" states that with significant endeavours by forensic experts in volatile memory, the anonymity will slowly erode since investigators are now able to extract past information and can reconstruct early conversations.... For this reason, the central role of any forensic investigator is not only in executing investigation to unearth the truth about a mystery but also to apply his or her prowess to seize and safeguard obtained evidence....
12 Pages (3000 words) Coursework

NFTS,exfs2,extfs3

A forensic investigator will, therefore, use the first mode, called the journal to obtain the information pertaining to the activity of the file system.... In a journaling file system, the storage device is treated as an unbound linear array of blocks.... In the array of blocks, a journal is kept that records… The update information is sufficient for replaying each update, and ensures that the update is complete resulting in a consistent file system....
1 Pages (250 words) Article

Easy Retrieval of Data from Hard Disk Drives

Moreover, for any forensic investigator to obtain any sort of digital evidence, they must first look for the details from the computer hard disk.... Therefore, because the computer hard disk is capable of storing millions of data on anything, it becomes very tedious for the forensic investigator to search for the exact data that is needed for the investigation (Volonino & Anzaldua, 2009).... Therefore, for the investigator to be competent and to easily access all the details from the hard disk, the forensic investigator needs to implement this computer forensic project....
7 Pages (1750 words) Term Paper

Mysteries in Crime

The first recorded forensics was in the year 1248 when a Chinese man who was commonly referred to as death investigator performed an experiment to determine that a victim's fatal blow was a result of the strike of a sickle (Ogden, 2010).... The following paper under the title 'Mysteries in Crime' focuses on forensic science which has a big role in our criminal justice today, as it helps to unmask the truth and bring those individuals who cause murder and other related assaults to face the law....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us