Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.

Week 8 Discussion 1
“The Investigation of Computer-Related Crime” Please respond to the following:
From the e-Activity, there are general principles that investigators must follow when they respond to any crime scene in which computers and electronic technology may be involved. Suggest at least two (2) general principles for proper evidence preservation for stand-alone personal computers, networked home personal computers, and network server business networks. Provide a rationale for your response.
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes. Next, speculate on the primary concern of investigators as they execute the evidence-collection procedures in question, and explain the main reasons why you believe such a concern is valid. Justify your response.
Please also reply to the student

Alecia Giles
RE: Week 8 Discussion 1
Two of the general principles that I believe are extremely important are ” do not alter the state of an electronic device” and “identity, seize, and secure all electronic devices, including personal and/or portable devices”. These two stand out to me as not following proper guidelines can make the information gathered inadmissible. Also with the electronic devices any change in state can change all of the information. So following at least these two principles can help save the information gained.
Evidence requires that it is handled correctly, every step of evidence process is documented, and all devices collected are cataloged for use in obtaining any future warrants. Once this process is followed then begins the process of evidence collection from the network trace. With electronic evidence the manipulation or change of data is such a primary concern that precautions must be followed or loss of evidence collected could be the result. Even accidental data change can be a cause for that evidence to not be allowed in. Making sure all steps are properly followed or loss of evidence collected validates all concerns the invewstigators have.

Week 8 Discussion 2
“White-Collar Crime and Bribery versus Extortion” Please respond to the following:
Discuss the key elements of identifying white-collar crimes. Next, determine at least two (2) federal criminal statutes that government agencies commonly use to convict white-collar criminals, and specify the main reasons why government agencies commonly use the statutes in question. Justify your response.
Define the key difference between the crime of bribery and the crime of extortion, based on the federal bribery and extortion statutes. Next, specify the necessity of defining the difference that you have defined. Justify your response.

Please also reply to the student


 

PLACE THIS ORDER OR A SIMILAR ORDER WITH NURSING HOMEWORK HELP TODAY AND GET AN AMAZING DISCOUNT


For orders inquiries       +1 (408) 800 3377