Colorado Technical University Child Pornography Criminalistics Questions

User Generated

lrav16

Writing

colorado technical university online

Description

You have been given an assignment by your supervisor to assist detectives in recovering a personal computer from a house that was involved in a child pornography case that detectives are investigating on one of the occupants in the residence. You know from previous recovery situations that it is easy for valuable information to get destroyed from a computer if the recovery is not done properly, possibly jeopardizing any case against the suspect.

  • What steps would you take with the computer to ensure that valuable data are not lost from the computer in the recovery efforts?
  • If you are in the process of collecting the computer and see a pornographic picture you know to be illegal, what steps do you take?
  • Should you try and determine on scene if there was more pornography on the computer before attempting to remove it from the scene? (explain in detail why or why not)
  • Would you simply make a copy of the hard drive on scene and then release the computer back to the owner (explain in detail why or why not)?
  • Describe your own state's laws regarding child pornography.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go hun!
Attached.

Running Head: CHILD PORNOGRAPHY AND THE INTERNET

Child Pornography and the Internet
Instructor
Class
Date
Name

1

CHILD PORNOGRAPHY AND THE INTERNET

2

Child Pornography and the Internet

There is a multitude of elements that should be considered during the retrieving of data
on a computer so that the pertinent information will not be lost. Firstly, the relocation of the
computer equipment with the suspected illegal information on it should not be conducted unless
the environment is hazardous, such as a current fire at the scene. The investigator overseeing the
equipment shouldn’t alter the original information being obtained in any way through
expectations of programs or software, not allowing for the perpetrator to have any access to the
equipment before retrieval (Mercer, 2004). According to Mercer (2004), “There are two types of
data that needs to be collected, the persistent data and the volatile data.

The persistent data is the information stored on the hard or local drive that could become
preserved if the equipment were to lose power, and the volatile data is the information that
becomes stored in the cache or random-access memory of the system could be lost, due to the
power loss (Mercer, 2004). The persistent data would be the easiest to secure because of its
sustainability and the violate data would be more difficult to preserve because of its temporary
nature. At the crime scene, a back-up of the information on the system should always be secured
first. The proper methods of securing the information all depend upon the type of computer and
power the system is getting. However, an immediate disconnection of power will be omitted if
there is recognition of a program trying to overwrite the data or destruct the infor...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Content
Related Tags