Essay Undergraduate 791 words Human Written

Summarize the Disadvantages to Law Enforcement With Respect to the Advancements of Computers

Last reviewed: ~4 min read Technology › Respect
80% visible
Read full paper →
Paper Overview

¶ … Computer/Software and the Use of Computer Technology in Investigations The key advantage of computer forensics is that it can look for and assess loads of data in a swift and efficient manner. Computers are able to search for keywords from hard drives, in various languages. This proves valuable, as cybercriminals are easily able to cross...

Writing Guide
How to Write a Literature Review with Examples

Writing a literature review is a necessary and important step in academic research. You’ll likely write a lit review for your Master’s Thesis and most definitely for your Doctoral Dissertation. It’s something that lets you show your knowledge of the topic. It’s also a way...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 791 words · 80% shown · Sign up to read all

¶ … Computer/Software and the Use of Computer Technology in Investigations The key advantage of computer forensics is that it can look for and assess loads of data in a swift and efficient manner. Computers are able to search for keywords from hard drives, in various languages. This proves valuable, as cybercriminals are easily able to cross national boundaries over the World Wide Web (Forensic Science, 2009). Computer forensics may be utilized in cases of corporate frauds, thefts, disputes over intellectual property, asset recovery and contract breaches (Forensic Science, 2009).

Important information, which cybercriminals have deleted or which is lost may be recovered and employed as significant court evidence. Professionals in the legal domain can furnish evidences in courts, which were earlier impossible. The field of computer forensics (i.e., electronic evidence) is fairly new; typically, criminal issues are handled through the use of physical evidence. Fortunately, the tool has proven advantageous in the recovery of damaged, lost, or deleted vital information, which plays a decisive role in cases (Forensic Science, 2009).

Disadvantages to Law Enforcement with Respect to the Advancements of Computers The key drawback in the application of digital or electronic evidence is its permissibility in court. Information is easily modifiable. Computer analysts should wholly adhere to evidential standards mandated by the law. They need to prove data tampering. Furthermore, their analysis should be wholly accounted for, and recorded. They need to be trained in standard legal procedures, while handling evidence.

Data examination and reporting is dependent on the case's nature; it may even take a whopping fifteen hours to complete this process! (Forensic Science, 2009) Computer analysts, while recovering information, might unknowingly unveil confidential documents. Moreover, legal professionals (including barristers, the judge, and solicitors) who are a part of the case, should be familiar with computer forensics, as a lack of understanding of the field will render them incapable of cross-examining expert witness. Computer forensics remains a rather new field, with some individuals still unfamiliar with it.

The computer analyst ought to be capable of communicating what he has found such that all concerned parties grasp it. Evidence, however, can be captured only once. Computer application and the growth in cybercrimes call for a correspondingly advanced procedure for curbing them (Forensic Science, 2009). A Case Where the Computer Was Used to Aid in Crime Commission In the "Trident Breach," Eastern European, computer hackers stole no less than seventy million dollars from about 400 U.S. organizations' payroll accounts, right from home.

In early 2008, the hackers compromised several hundred thousand computers in the U.S. via the malicious "Trojan" virus named ZeuS, which infected PCs when users opened certain email links and attachments. This particular variant of the Trojan horse was capable of zeroing in on sensitive banking information of users. The information was then instantaneously "texted" to hackers waiting on the other end of the line, who could then get their hands on the money in the compromised bank accounts.

(University professor helps FBI crack $70 million cybercrime ring, 2012) A Case Where the Use of the Computer Was Beneficial to the Prosecution in a Criminal Case From June 1984 to August 1985, the notorious serial killer from Southern California -- Night Stalker -- terrorized Los Angeles by breaking into houses at night and attacking sleeping victims; he murdered no less than thirteen individuals and assaulted several others. Los Angeles residents were highly alert, and an observant adolescent observed a suspicious-looking car driving across his neighbourhood at night on the 24th of August, 1985.

He contacted the police after noting down its license plate. Coincidentally, the latest attack by this serial killer transpired in the very same locality that night, and therefore, police decided to track down the reported vehicle number. While the vehicle was abandoned when found, it provided major.

159 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
4 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Summarize The Disadvantages To Law Enforcement With Respect To The Advancements Of Computers" (2016, January 19) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/summarize-the-disadvantages-to-law-enforcement-2157168

Always verify citation format against your institution's current style guide.

80% of this paper shown 159 words remaining