Computer Crimes Search And Seizure Research Paper

PAGES
2
WORDS
632
Cite

¶ … search and seizure of computers in a criminal case. The paper discuses both the challenges and the instruments and approaches needed in gathering evidence from computers. Gathering Evidence

Computer evidence is similar to most other kinds of evidence in several ways. Computer evidence is not that different from the evidence to be collected from a car impounded after a car-chase or the scene of crime in a murder case, in the sense that just like any other form of evidence, it ought to have been legally obtained, if it is to be admitted in court (Oppenheimer, n.d). For one, I will first have to get a search warrant before taking any computer evidence. In civil cases, there has to be consideration for procedures and policies. Many companies have their own incident-report plans that ought to be followed. The state and federal laws that are concerned with search and seizure also ought to be adhered to (Oppenheimer, n.d). In both criminal and civil cases, several conditions should be adhered to in the acquisition of evidence:

It must be legally obtained: the instructions in the incident-report guidelines and the search warrant ought to be adhered to.

Complete: all evidences should be collected even those that, I as an investigator,...

...

This is especially true for computer evidences that can be easily altered or modified in some ways.
Authentic: the evidence must be the real thing and not a copy or a fake.

Believable: the judge must be able to understand the evidence. It must be explained in such a way that they understand it.

The next step, after knowing the above stated principles of search and seizure, I as the investigator, must also recognize the computer evidence that am going to collect. There are many different types of computer technologies that one can use to store data, including; scanners/printers/copiers that buffer files, servers, wireless access points, routers, GPSs, PDAs, digital cameras, video recorders, iPods, VOIP phones, smartphones, floppy disks, flash disks, DVDs and CDs, external hard drives and computers (Oppenheimer, n.d).

The next step requires the use of a digital camera. The camera is utilized to document the scene by taking photos of: the overall scene, the condition of the computer technology, all the…

Sources Used in Documents:

References

Boddington, R. (2015, March 17). Phys.org - News and Articles on Science and Technology. The challenges of digital forensics. Retrieved November 1, 2015, from http://phys.org/news/2015-03-digital-forensics.html

Oppenheimer, P. (n.d.). Priscilla Oppenheimer. Computer Forensics: Seizing a Computer. Retrieved November 1, 2015, from http://www.priscilla.com/forensics/ComputerSeizure.html


Cite this Document:

"Computer Crimes Search And Seizure" (2015, November 14) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/computer-crimes-search-and-seizure-2155310

"Computer Crimes Search And Seizure" 14 November 2015. Web.25 April. 2024. <
https://www.paperdue.com/essay/computer-crimes-search-and-seizure-2155310>

"Computer Crimes Search And Seizure", 14 November 2015, Accessed.25 April. 2024,
https://www.paperdue.com/essay/computer-crimes-search-and-seizure-2155310

Related Documents

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

This is true because of the following: Computer storage devices (hard disks, diskettes, tape, and removable drives) can store the equivalent of thousands or millions of pages of information. When users desire to conceal criminal evidence, they often store the information in random order with deceptive file names. Directories and subdirectories that contain these files can also be electronically hidden from normal view. Special forensic software is required to

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

Computer Hackers Case Study Hackers are people portrayed as super-criminals who have powers that enable them roam the internet searching for valuable information that is contained in an individual's or company's computer. The article is about a case of the United States v. Jarrett.in Jarrett the issue was if the prosecution was in apposition to use information that had been obtained by the search of private hackers of the defendant's personal

FBI Digital Forensic Services Requirements for employment as a member of an FBI CART In order for one to become a member of the FBI CART team they need to have exceptional problem solving and analytical skills, thorough understanding of computers and computer systems and cyber and computer crime investigation. This is because CART offers assistance to the FBI field offices when it comes to the search and seizure of computer evidence.

XYZ Company Tasking The plan for processing the potential crime/incident scene depends upon maintaining the integrity of the scene as well as the integrity of the data. That means the first step is to prevent the scene from contamination. Preparing for the search is an important step, therefore, in this process. The team should have the legal authority to proceed with the seizure of evidence and this should be shown upon arrival. Likewise,