Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Write review on this article with APA format.

Digital evidence has become a key component of the judicial process, due solely to the frequency of communications and transactions completed on computers and mobile devices. As with all forms of evidence, the collection, preservation, and examination of digital evidence must be able to meet the requirements of legal admissibility, so that the conclusions made based on that evidence may be presented in court.

The specific rules applicable to any particular investigation will differ based on the jurisdiction of the offense under investigation. However, the admissibility of digital evidence will still be determined on the same principles as physical evidence: relevance, authenticity, not hearsay, best evidence, and not unduly prejudicial. Casey (2011) suggests investigators answer four questions when searching and seizing digital evidence:

Does the Fourth Amendment and/or the Electronic Communications Privacy Act (ECPA) apply to the situation? Have the Fourth Amendment and/or ECPA requirements been met?

How long can investigators remain at the scene? What do investigators need to reenter? (Section 3.2.1).

The Fourth Amendment ensures that individuals are protected against unreasonable search and seizures by the government. Considering whether the Fourth Amendment is applicable in a digital investigation can be difficult because of the transient nature of digital evidence and the multitude of methods by which it can be acquired.

The Electronic Communications Privacy Act (ECPA) (18 U.S.C. 2510-2522) was designed to provide further protection of digital communication, but only specifically addressed the issues of wiretapping, trap devices, and stored communications.

While this law was an important step for the protection of privacy in digital communications in 1986, the argument for revision has been introduced in Congress several times to update the law to include specific guidance for the growing number of different types of digital evidence. Casey (2011) also notes, "The most common mistake that prevents digital evidence from being admitted by courts is that it is obtained without authorization" (section, 3.2.1).

Another reason for digital evidence uncertainty can be seen when flaws are identified in the tools used by digital forensic examiners. This was famously demonstrated during the murder trial of Casey Anthony where digital investigators used a tool that was discovered to have serious design flaws. "This error likely contributed to the reasonable doubt jurors found when they acquitted Anthony of first-degree murder, especially since the correction occurred during trial" (Goodison, Davis, & Jackson, 2015, p. 2).

The Anthony case highlights the need for extensive digital forensic tool testing and validation of results before proceeding to present them in trial. Not only does the testing and validation of digital forensic tools help to establish the legitimacy and verifiable integrity of digital evidence, it also helps to establish and keep the digital investigators honest, as well. Proverbs 10:9 enforces the importance of this concept, "Whoever walks in integrity walks securely, but he who makes his ways crooked will be found out" (ESV). Casey, E. (2011). Digital Evidence and Computer Crime, 3rd Edition, Waltham, MA Academic Press Goodison, S. E., Davis, R. C., & Jackson, B. A. (2015). Digital Evidence and the U.S. Criminal Justice System . In RAND Corporation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93118332
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Assignment week 3 create a scrum boardprojects that conform

Assignment: Week 3 Create a Scrum Board Projects that conform to the Agile methodology often use something called a scrum board. You can think of a scrum board as a digital whiteboard containing yellow "stickies," each l ...

Aaninformationretrievalsystemhasacertainpairofaverageprecisi

(a) An information retrieval system has a certain pair of average precision and recall values when the system returns 10 documents in response queries. Would the precision and recall rate remain unchanged if the system w ...

How does the learning environment effect the success of

How does the learning environment effect the success of students? Provide examples.

A orange juice producer buys all of his oranges from a

A orange juice producer buys all of his oranges from a large orange orchard in Florida. Suppose that the amount of juice squeezed form each of these oranges is normally distributed with a mean of 4.70 and a standard devi ...

For recursion trees why sometime there are 2 recursion

For recursion trees, why sometime there are 2 recursion trees shown. why sometimes the work per level decreases from level to level, and it is constant in each level. The recursion tree shown for merge sort has same tota ...

Why is a secure random number different than a

Why is a secure random number different than a statistically random number in security and if it weren't securely random everything that it could impact. For example, think of everywhere that we rely on them being secure ...

Reflective journal entryreflective journal entry on writing

Reflective Journal Entry Reflective Journal Entry on writing a Bibliography Assignment Topic; Research Question: One of the most common questions that new students learning programming students ask is what programming la ...

What is the role of arp and how does it cause a security

What is the role of ARP and how does it cause a security concern? What is the different between global and private IP addresses? How does using NAT change a private IP address into a global IP address, and why is this so ...

Systems requirements and analysisyou have been hired to

Systems requirements and analysis You have been hired to lead a software project to design a Library Management System (LMS) for your local library at Jonesville. The library has been managed manually using written docum ...

You isolate an acidic compound by suction filtration and

You isolate an acidic compound by suction filtration and think it is still wet. How do you remove the remaining water without the risk of decomposition (no extreme heating)

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As