Wednesday, June 12, 2019
Forensic case portfolio Study Example | Topics and Well Written Essays - 2750 words
Forensic portfolio - Case Study ExampleThe field of digital forensic analysis has various techniques that argon critical in the identification, preservation, extraction, and documentation of digital evidence. The process of digital forensic is useful in solving whitlow activities that touch on the use of computers (Casey, 2011). As a computer forensic, handling criminal involving computers is process of applying various procedures and practices that constitute best practices in digital forensics. This paper outlines the process of collecting digital evidence from the crime scene after the legal philosophy called the digital forensic investigators. The paper outlines the digital forensic process applied on the photo show appendix A. the photo represents the area where the law of nature despatchicers conceive a mirthful took part in viewing and distribution of child pornography. On 10 December 2012, our computer forensic department received a request for computer forensic analysis. The local district police had sent the request to the head of the department after they had a suspect in custody. The suspect was behind the bars after the police received two complains from the suspect neighborhood that the suspect, Lee Oswald Havey, took part in distribution of child pornography. The request from the police was usual since the police also rely on the work of digital forensic analyst to collect digital evidence that is admissible before the courts of law. objet dart computer forensic is of great value to investigators dealing with digital crime, such as seen in appendix A, there are many legal issues that are critical in any crime scene. Before working on the request, the department had to verify that the police had filled the appropriate forms requesting for the service. In addition, the department pass the police to furnish a copy of the warrant allowing for the seizure of computer hardware and other evidence that could link the Havey to the crime. The role of the warrant was critical since the quaternate Amendments protect all American citizens seizure or search unless police officers have probable cause of committing crime. As per the request, the request was in order and the investigators proceeded to turn back the investigation at the crime scene. The investigators arrived at the home of the suspect the police showed them the inhabit they suspected Havey to have used in watching and distributing child pornography. The room was dark with lights that were dim, but the investigators could still see the room. The room had two tables on the right and both had computer and other material. The first table had two computers on a lower floor the desk with one being a Dell Vostro and another generic computer. The system units of these two computers were under the desk, but the user had switched them off. On the left desk were two sony 17 TFT screen. Both screens were connecting to the computer, but switched off. The same table also had a k eyboard and a mouse. Beside the mouse were a USB thumb drive, mouse, and a notebook with a pen beside the book. full beside the Sony TFT screen was some pieces of paper with some writings. There was a digital disk on the table, which appeared to have been in use. In addition, one of the screens had a cohesive note attached to it with the note having some writings. The other screen also had some cables placed besides the base of the screen. The cables were the ends a microphone that was hanging off the table (the picture does not show the microphone hanging from the table). The second table had several items, as well. The
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.