Description
Each part needs to be three to four pages. This is going to be all one paper!
APA style
Add a table of contents
Reference page not included in 3-4 pages for each part
Part 1
Chain of Custody
- What physical and electronic evidence can you as the investigator obtain?
- How would you safeguard that evidence?
- How would you create a chain of custody for this evidence?
- What are the limitations when protecting evidence only found online or in the cloud?
Before writing this section, complete the following:
- Review this case. https://casetext.com/case/united-states-v-meregildo-2#.U7QZtvldW6V
- Review this report. http://www.cnn.com/2013/04/18/tech/social-media/online-oversharing-arrests
Part 2
Chain of Custody Concerns
For this assignment, you will conduct Internet research and discuss the causes for why electronic evidence may be found inadmissible in court. Be sure to address the following:
- Spoliation
- Tampering
- Fruit of the poisonous tree
The following are the project deliverables:
Explanation & Answer
Attached.
Running head: e- Evidence
1
Name of student
Unit and course code
Name of institution
Name of instructor
Date
e- Evidence
2
Table of content
Content
page number
Types of electronic evidence…………………………………………3
Methods of safeguarding evidence…………………………………..4
Ways of creating a chain of custody…………………………………5
Limitations when protecting e-evidence…………………………….6
Nullification of evidence in court…………………………………..7
References…………………………………………………………..9
e- Evidence
3
What physical and electronic evidence can you as the investigator obtain?
Apart from physical devices which are apprehended by the law of execution, digital
evidence ought to be unruffled and evaluated from schmoozed devices, in cooperation with
assemblages of IT systems and single servers. These schmoosed devices might be above the
scope of law enforcers. Additionally, questioning might also encompass both dead box disk
based forensics, and network handling in memory analysis.
Computer – There might be an affluence of credible digital evidence specifically on
personal computers. During browsing through the internet, websites may sometime preserve
flash cookies, browsing history or even internet pages and files. Messages including emails or
social media inboxes might be discovered in computers too.
Transportable electronics – Presently, digital proof dispensation from mobile
electronics, for example cell phones, are becoming a prime focus of interest to examiners
critically. Therefore, there ought to be no traces of surprise that mobile phones and other portable
electronic devices are becoming a center of interest surrounding the world of digital evidence.
Internet –File exchanging networks are among the principal source used in the course of
investigations. Developers have taken risks to themselves by assembling some internet
technologi...