Homework Help

FORENSIC EVIDENCE PROCESSING 6

Forensic Evidence Processing

Dylan Cato

CRJS 475

American Intercontinental University

01/05/2023

Forensic Evidence Processing

In the contemporary world, millions of people have made portable electronics including smartphones and PC part of their lives. They can hardly survive even a day or even hours without interacting with these gadgets. Millions of people are utilizing the contraptions created as a result of PC progression (Trujillo, 2019). The contraptions together with the PC have created a network of records as well as information regarding people and their day-to-day activities. The data and information are either stored locally in the gadgets or the cloud.

Based on the case that has been provided above, the initial thing that should be kept in mind is determining possible reasons why seizure and search should be carried out. Any procedure that should be followed as far as the case is concerned should be handled with a lot of legal care. Therefore, it is fundamental to carry the evidence which will help in obtaining the court order. With the judicial order in place, moving on with the case will be relatively easy since it will be protected within the law (Trujillo, 2019). However, in case the evidence is at risk and the investigators can prove that truly the evidence is at risk, then the investigations can commence even without any court order.

It should be known clearly that there exist two major laws protecting citizens against any illegal searches and seizures. The laws further serve to ensure that the procedure being followed does not serve to violate the privacy of the individuals in any way. This branch of computer forensics incorporates two major dockets, computer science, and law, intending to investigate crimes that might have been committed (Haq & Atta, 2019). As pointed out earlier, the pieces of evidence collected remain viable if and only if a legal due process was followed when collecting them and the privacy rights of the suspects were not violated in any way. These are the minimum conditions under which the court can choose to consider the pieces of evidence presented to them. Further, the investigating bodies and persons must adhere to the laws when recovering and analyzing any data in computers which is required. The most unfortunate thing which brings more issues, and some contradicting is that some of the laws were established before computer forensics was introduced (Haq & Atta, 2019). Therefore, they might present situations that are not workable with forensics. Though the laws are doing a significant job of upholding the rights of the people, they equally come along with their disadvantages. For instance, the laws might result in the discarding of the evidence gathered or simply, result in the violation of the two amendments, 4th and 5th.

Another concern that has been raised is that the laws are not as aggressive as technological advancement. This further makes them complicates issues and the efforts of computer and digital forensics. The laws limit a lot of evidence that has been presented in the court as they demand adherence to the laws. This has made several criminals take advantage of legal matters with the sole aim of covering up their wrongdoings and criminal acts in which they are involved in.

Accusations about terror, murder, and sexual harassment have been made easier with computer and digital forensics. Criminals, together with the people that they are working with have capitalized on networks to recruit more people and easily share their information. A specific example of a group that has exploited networking is ISIS. The groups have increased the number of people watching and following through sexual predators and hence, ended up attacking potential victims who come their way. Investigators have found it easy to trace the criminals (Chase, 2020). This is because criminals hardly safeguard the information they are using online. For the few who happen to delete the information from online platforms, the information remains stored in local drives like computer hard disks. The experts in the area are also able to track down the information which they might need.

There exist four different approaches which the court has taken regarding the doctrine of electronic data searching. These are ‘apply it to electronic searches, require discovery to be inadvertent, use filter kits, or abandon the use of plain sight entirely.’ Any practitioner who loses an argument that simple sight does not apply to electronic searches should need to go the extra mile and examine the procedures to be followed in separating the irrelevant electronic material with the authorization done in the provided search warrant (Chase, 2020). Such practitioners should seek alternative measures when assessing the actual materials which are associated with an alleged criminal offense. Failure to follow due process, failure to seek permission to go ahead with the investigations, and failure to inadvertent the discovery, the presentation can follow a serious setback in court, mounting a serious argument on a simple government argument.

The government’s attempt of claiming an inevitable discovery can easily be rebuked. It is demanded that the government should always return the equipment once the search is through. Besides, the government should destroy any documents found which were not used in the process (Chase, 2020). This implies that if the government can follow due process in collecting the documents, there will be no materials to be disposed of as everything collected would have been used in the required manner.

Technology advancements have resulted in the development of the Global Position System (GPS), a program that is embedded in all smartphones. The software can be used by prosecutors in tracking the whereabouts of the suspects (Haq & Atta, 2019). The firms working on computer forensics are also developing equipment and products on satellite browsers. This makes it easier to have gadgets well equipped with GPS technology.

Several PC owners have encrypted the information available on their PCs. This has made it difficult for other people to access the information unless authorized. This makes it difficult for the investigators to access the information (Haq & Atta, 2019). The Fifth Amendment further protects these people. Even those hiding sensitive information which can be used to attack others are protected by the amendment.

In conclusion, the researcher has pointed out the necessary forensic procedures to be followed when collecting data and forensic evidence from the suspects’ devices while adhering to the fourth and Fifth Amendments. The number of people owning PCs is on the rise and therefore, their networking with others is also on the rise. The amount of information on the network, which is aimed at attacking people is on the rise. The major issue emanating from the amendments is the attempt of reforming the presently occurring digital crimes.

References

Chase, A. (2020). Secure the Smartphone, Secure the Future: Biometrics, Boyd, a Warrant Denial and the Fourth and Fifth Amendments. Hastings Race & Poverty LJ, 17, 577.

Haq, U., & Atta, Q. (2019). Cyber Security and Analysis of Cyber-Crime Laws to Restrict Cyber Crime in Pakistan. International Journal of Computer Network & Information Security, 11(1).

Trujillo, M. (2019). Computer Crimes. Am. Crim. L. Rev., 56, 615.

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

  • Analysis (any type)
    Advantages and Disadvantages of Lowering the Voting Age to Thirteen
    Undergrad. (yrs 1-2)
    Political science
    APA
  • Coursework
    Leadership
    Undergrad. (yrs 1-2)
    Business Studies
    APA
  • Essay (any type)
    Is Pardoning Criminals Acceptable?
    Undergrad. (yrs 1-2)
    Criminal Justice
    MLA

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
  • Is there a possibility of plagiarism in my completed order?

    We complete each paper from scratch, and in order to make you feel safe regarding its authenticity, we check our content for plagiarism before its delivery. To do that, we use our in-house software, which can find not only copy-pasted fragments, but even paraphrased pieces of text. Unlike popular plagiarism-detection systems, which are used by most universities (e.g. Turnitin.com), we do not report to any public databases—therefore, such checking is safe.

    We provide a plagiarism-free guarantee that ensures your paper is always checked for its uniqueness. Please note that it is possible for a writing company to guarantee an absence of plagiarism against open Internet sources and a number of certain databases, but there is no technology (except for turnitin.com itself) that could guarantee no plagiarism against all sources that are indexed by turnitin. If you want to be 100% sure of your paper’s originality, we suggest you check it using the WriteCheck service from turnitin.com and send us the report.

  • I received some comments from my teacher. Can you help me with them?

    Yes. You can have a free revision during 7 days after you’ve approved the paper. To apply for a free revision, please press the revision request button on your personal order page. You can also apply for another writer to make a revision of your paper, but in such a case, we can ask you for an additional 12 hours, as we might need some time to find another writer to work on your order.

    After the 7-day period, free revisions become unavailable, and we will be able to propose only the paid option of a minor or major revision of your paper. These options are mentioned on your personal order page.

  • How will I receive a completed paper?

    You will get the first version of your paper in a non-editable PDF format within the deadline. You are welcome to check it and inform us if any changes are needed. If everything is okay, and no amendments are necessary, you can approve the order and download the .doc file. If there are any issues you want to change, you can apply for a free revision and the writer will amend the paper according to your instructions. If there happen to be any problems with downloading your paper, please contact our support team.
  • Where do I upload files?

    When you submit your first order, you get a personal account where you can track all your orders, their statuses, your payments, and discounts. Among other options, you will have a possibility to communicate with your writer via a special messenger. You will be able to upload all information and additional materials on your paper using the “Files” tab on your personal page. Please consider uploading everything you find necessary for our writer to perform at the highest standard.
See full FAQ

Take your studies to the next level with our experienced specialists

Live Chat+1 (857) 777-1210 EmailWhatsApp