respond to digital forensics in criminal justice post

assessment matrix
October 13, 2021
responding to guiding questions
October 13, 2021

respond to digital forensics in criminal justice post

“Since digital evidence is extremely volatile in nature, it is important to collect and protect this type of evidence in a way that ensures its validity to stand up in court. One way to do this is to ensure you have the proper authority to seize the devices you believe contain evidence in relation to the case. This could be through a search warrant or consent from the owner. This could also be if the devices are being seized due to being in plain view and to stop possible destruction of evidence (DHS, n.d.). Another important process is making sure the search warrant contains the proper information to not only seize the specific devices being searched for, but to include that these devices may be duplicated and a forensic analysis performed on the data, not just the hardware. Maintaining proper documentation of the devices throughout the entire investigation is essential. This includes photographing the setup of the device prior to seizure, and labeling the cords and peripherals attached. If the computer is turned on when found, it’s important to also have photographs of the screen prior to unplugging the device (DHS, n.d.). Proper handling of all seized devices throughout the investigation reduces the potential of data being lost. This entails all steps from using proper packaging materials, to storing the components, and keeping devices away from magnets and other damaging objects (DHS, n.d.). On top of all these important processes, maintaining proper chain of custody of one of the biggest. The chain of custody ensures the handling and analyses of the devices were completed by authorized personnel, and uphold the admissibility and integrity of the evidence.

When I first entered the room where the computer was located, I made sure the room was clear and photographed the screen and back of tower, as it was on and active. I then unplugged the power cable from the back of the computer tower.

An imaged duplicate was made of the hard drive for analysts to use with their forensic software. This is a precaution for the original hard drive to remain unchanged.”

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.