Sunday, April 28, 2019

Forensic case portfolio Study Example | Topics and Well Written Essays - 2750 words

Forensic portfolio - Case Study ExampleThe field of digital rhetorical analysis has various techniques that are critical in the identification, preservation, extraction, and documentation of digital evidence. The move of digital rhetorical is useful in solving criminal activities that touch on the use of figurers (Casey, 2011). As a computer forensic, handling criminal involving computers is process of applying various procedures and practices that constitute best practices in digital forensics. This piece of music outlines the process of collecting digital evidence from the crime scene after the police called the digital forensic investigators. The paper outlines the digital forensic process applied on the photo show appendix A. the photo represents the landing field where the police officers believe a fly-by-night took part in viewing and distribution of child pornography. On 10 December 2012, our computer forensic department received a request for computer forensic analysis. The local district police had sent the request to the head of the department after they had a suspect in custody. The suspect was behind the bars after the police received deuce complains from the suspect part that the suspect, Lee Oswald Havey, took part in distribution of child pornography. The request from the police was usual since the police withal rely on the work of digital forensic analyst to collect digital evidence that is admissible before the courts of law. While computer forensic is of great value to investigators dealing with digital crime, such as seen in appendix A, there are m either legal issues that are critical in any crime scene. Before working on the request, the department had to verify that the police had filled the appropriate forms requesting for the service. In addition, the department requested the police to furnish a copy of the warrant allowing for the seizure of computer hardware and other evidence that could link the Havey to the crime. The role o f the warrant was critical since the Fourth Amendments protect all American citizens seizure or search unless police officers have probable cause of committing crime. As per the request, the request was in order and the investigators proceeded to carry the investigation at the crime scene. The investigators arrived at the home of the suspect the police showed them the fashion they suspected Havey to have used in watching and distributing child pornography. The room was dark with lights that were dim, but the investigators could however see the room. The room had two mesas on the right and both had computer and other material. The first set back had two computers under the desk with one being a Dell Vostro and another generic computer. The system units of these two computers were under the desk, but the user had switched them off. On the left desk were two sony 17 TFT screen. Both screens were connecting to the computer, but switched off. The comparable table also had a keyboard and a mouse. Beside the mouse were a USB thumb drive, mouse, and a pull downbook with a pen beside the book. Just beside the Sony TFT screen was some pieces of paper with some writings. There was a digital book on the table, which appeared to have been in use. In addition, one of the screens had a sticky note attached to it with the note having some writings. The other screen also had some cables placed besides the base of the screen. The cables were the ends a mike that was hanging off the table (the picture does not show the microphone hanging from the table). The second table had several items, as well. The

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.