CRJS475 IP4

Apr 19th, 2015
Studypool Tutor
Price: $10 USD

Tutor description

In preparation for a court appearance, the federal law enforcement agency wants to ensure proper forensic processes and techniques are used in a computer crime case involving identify theft. When challenging the admissibility of the digital evidence, the defense examiner will evaluate the authentication and chain of custody techniques used. The federal law enforcement agency would like your company, AB Investigative Services (ABIS), to identify in a report the possible authentication and chain of custody techniques acceptable in the investigative process, including issues relating to First and Fourth Amendment privacy issues with respect to computer-related technologies. Using the library, Internet, or any other credible materials, provide the following in your report to the federal law enforcement agency: • Begin the report with a one page overview of the forensics process and the steps taken by an examiner related to identity theft and computer crime. • Provide 2-3 pages identifying:

Word Count: 1585
Showing Page: 1/7
CRJS475-IP4NameClassDateProfessorCRJS475-IP4Forensic Process Identity Theft and Computer Crimes When crimes using electronic devices occur the forensic staff must be properly trained on how to process the evidence. Computers and other electronic devices provide a plethora of evidence in computer crimes, such as identity theft. Identity theft is when a person's identity is stolen by a criminal who then uses the identity to commit fraudulent acts. These acts are committed in order to obtain financial gratification but identities are also stolen in order to commit crimes. Identity theft is the largest growing crime in the United States and the globe. It is important to understand how to process evidence related to identity theft. Just as with any other crime scene the first step in the collection process is to photograph the evidence. If the evidence is contained on a computer or other digital device the screen needs to be photographed if it is turned on and then the device needs to be photographed from every angle. The same goes for any written documentation proving identity theft has been committed. Documenting the location of the evidence is essential to ensuring it is eligible for the court process. Once the evidence is documented through photographs it will be collected. The collection is dependent on the evidence. Computers are collected by unplugging any exterior devices and turning off and unplugging the computer. The computer

Review from student

Studypool Student
" all I can say is wow very fast work, great work thanks "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1825 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors