Electronic Evidence and crome

User Generated

gnbbsyf

Computer Science

Description

For the assignments in this course, you will be developing a Forensics Research Report. Your first task in this process is identified below (under New Content)

You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add contents to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

The following are the project deliverables:

  • Forensics Research Report document shell
    • Use Word
    • Title page
      • Course number and name
      • Project name
      • Your name
      • Date
    • Table of Contents (TOC)
      • Use an autogenerated TOC.
      • This should be on a separate page.
      • This should be a maximum of 3 levels deep.
      • Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.
    • Section Headings (Create each heading on a new page with "TBD" as the content, except for the section listed under New Content below.)
      • Electronic Evidence and Crime
      • The Crime Scene
      • Chain of Custody Concerns
      • Digital Evidence and Admissibility
      • Process for Evidence Used in Legal Proceedings
    • References

New Content

  • Electronic Evidence and Crime
    • Using a search engine with queries such as “legal cases involving digital evidence,” “criminal cases involving electronic evidence,” and “civil cases involving digital evidence,” choose a case. (There is 1 case you cannot choose: it involves Kimmy, Kruse, and Cam).
    • Describe the digital evidence used in the case and explain how it supported the investigation.
    • Identify how the evidence was found.
    • Discuss how the evidence may have been analyzed.
    • Be sure to cite the case research in the references.
  • Name the document "yourname_CSS350_IP1.doc."

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: ELECTRONIC EVIDENCE AND CRIME

Electronic Evidence and Crime
Author’s Name
Institutional Affiliation

1

ELECTRONIC EVIDENCE AND CRIME

2

Table of Contents
Electronic Evidence and Crime

2

Electronic Evidence and Crime

2

Digital Evidence

2

Finding Evidence

2

Evidence Analysis

3

The Crime Scene

4

Chain of Custody Concerns

4

Digital Evidence and Admissibility

5

Process for Evidence Used in Legal Proceedings

6

References

8

ELECTRONIC EVIDENCE AND CRIME

3

Electronic Evidence and Crime
Electronic Evidence and Crime
Digital Evidence
James Kent was a Public Administration professor at Maris College in Poughkeepsie New York.
Back in 1999, the professor researched child pornography regarding a book he was to write
sometime later. Nevertheless, he decided to abandon his project around June 2000 which saw a
complete deletion of all his research from the computer. His computer became replaced in 2005
by the college; however, all his old files became copied into the new machine. In 2007, James
Kent raised a complaint about his computer having difficulties in functioning which was
affecting his school-work projects. A student employee at Maris went into his office to check the
problem, and in the processes of running a virus scan, many jpg files displayed as thumbnails
emerged from the scan. From them, scantily dressed underage girls in provocative poses
emerged. Deleted images of the girls found in Kent’s computer provided enough evidence to
show his involvement in child pornography. Nonetheless, the accused denied knowledge of
having such material in his possession, however, a careful analysis of his hard drive provided
enough proof for his involvement in the illegal act if child pornography (New York Courts)
Finding Evidence
Kent’s personal computer had various difficulties affecting its functionality. In the processes, he
sought assistance from the college’s IT department who sent a student employee to correct the
malfunctions. Initially, his old computer had become replaced; nonetheless, he used the campuswide network. In the process of installing his new computer, a restoration of his old files
accompanied the installation something he lacked awareness. As the student-run a virus scan on
his new personal computer, thumbnails emerged, and they displayed jpg images of provocatively

ELECTRONIC EVIDENCE AND CRIME

4

dressed and poising underage girls. The virus scan did not...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags