Categories
Criminal homework help

Explain how digital evidence must be handled to preserve the integrity of the physical device as well as the data it contains.

Prior to beginning work on this discussion, watch the Heists: Cybercrimes with Ben Hammersley video below.
There are many obstacles for a criminal justice professional or a private citizen or corporation to
collect evidence at an electronic crime scene. Last week we examined how traditional notions of crime scene preservation may transfer into the world of cyber crime investigations. This discussion requires you to explain the details and the potential issues with gaining admissible, crime scene evidence for a virtual crime. The five elements provide the minimal requirements for crime scene preservation and data collection. Provide as much detail as possible in your initial post.
Your 400 word minimum initial post for this discussion will detail the following:
Explain how digital evidence must be handled to preserve the integrity of the physical device as well as the data it contains.
Examine how some digital evidence requires special collection, packaging, and transportation techniques.

What are the special considerations for various forms of data?

List the ways that data can be damaged.
Explain how investigators avoid damaging data.
Analyze how communication devices like computers, mobile phones, smart phones, and tablets should be secured and prevented from receiving or transmitting data once they are identified and collected as evidence.

Required Resources
Article
Sindhu, K. K., & Meshram, B. B. (2012). Digital forensics and cyber crime datamining (Links to an external site.). Journal of Information Security, (3), 196-201. Retrieved from http://www.scirp.org/journal/PaperDownload.aspx?DOI=10.4236/jis.2012.33024
This article discusses the various tools and techniques being used in the field of digital forensics as well as suggesting a systematic approach to the science. Accessibility Statement does not exist.
Privacy Policy does not exist.
Multimedia
Aspinall, W. (Director & Producer). (2014). Heists: Cybercrimes with Ben Hammersley (Links to an external site.) [Video file]. Retrieved from https://secure.films.com/OnDemandEmbed.aspx?token=109729&wID=100753&plt=FOD&loid=0&w=560&h=315&fWidth=580&fHeight=365
The full version of this video is available through the Films on Demand database in the UAGC Library. This video examines organized cyber hackers and how criminals and networks commit cyber crime and will assist you with your learning activities this week. This video has closed captioning.
Accessibility Statement (Links to an external site.)
Privacy Policy (Links to an external site.)
Recommended Resources
Article
Brown, C. S. D., (2015). Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice (Links to an external site.). International Journal of Cyber Criminology, 9(1), 55-119. doi: 10.5281/zenodo.22387. Retrieved from http://www.cybercrimejournal.com/Brown2015vol9issue1.pdf
This open access article centers on the systemic issues that face investigators when taking on a cyber crime scene. The topic of potential regulatory changes related to cyber crime investigation is also discussed.
Report
United States Department of Justice. (2008). Electronic crime scene investigation: A guide for first responders, second edition (Links to an external site.)[PDF]. https://www.ncjrs.gov/pdffiles1/nij/219941.pdf
This source provides pragmatic and practical information necessary to individuals collecting evidence of cyber crime evidence for prosecution. The governmental report provides step by step guidance for “first responders” and is considerate of the unique nature of each crime scene encountered. The report focuses upon preserving electronic crime scenes and provides methods for recognizing, collecting, and safeguarding digital evidence.
Websites
MSCJ Resources (Links to an external site.) (http://ashford-mscj.weebly.com/)
This resource site will provide assistance in researching additional sources for the assessments within this course.
Accessibility Statement does not exist.
Privacy Policy does not exist.

Leave a Reply

Your email address will not be published. Required fields are marked *