Application-cybercrime-related laws and digital evidence

Assignment Help Basic Computer Science
Reference no: EM131222944

Application: Cybercrime-Related Laws and Digital Evidence

Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. The jury's eyes widen as their minds struggle to process the weapon visually.  

Now consider the same movie scene again. Except this time, the prosecutor picks up a laptop and thrusts it into the air. The same dramatic reaction, however, is unlikely. Although digital evidence that is stored in devices might seem intangible, this type of evidence has been used in previous legal cases for trying cybercrime.  

Cybercrime is just as real and subject to the same burdens of proof and judicial process. Yet, the admissibility of digital evidence for establishing proof of a cybercrime can be challenging. Understanding the linkage between digital evidence and the execution of a cybercrime is important for establishing a legal case.

To prepare for this Assignment, pick one of the following areas of cybercrime and select a federal or state law that addresses it:

  • Computer Intrusions
  • Cyberterrorism
  • Cyberharassment and Cyberstalking
  • Economic Espionage
  • Financial Crimes and Fraud

 For this Assignment, write a 3- to 5-page paper in APA format that:

  • Summarizes the key elements of the law.
  • Explains the types of digital evidence that would need to be collected to prosecute a case under this law. Be sure that you include possible sources of evidence, such as computing devices, wireless devices, and Internet service providers (ISPs).
  • Proposes  a new or emerging technology within the area of cybercrime selected that might  not be covered under this law.

Required ResourcesReadings

  • Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Course Technology.
    • Chapter 6, "Organized Crime and Cyber Terrorism" (pp. 210-223) 
      These pages discuss cyber terrorism, information warfare, and cyber espionage.
  • FindLaw. (1999). United States v. Upham. Retrieved from https://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=search&case=/data2/circs/1st/981121.html
    This site contains the text for the appeal for United States v. Upham.

Reference no: EM131222944

Questions Cloud

Internet and use of communication impacted the outcome : Quick and easy! Please answer the below questions in 400 or more words. Needs to be orginial content please. 1. How has the Internet and use of communication impacted the outcome of war(s)?
Difference between rent paid by new tenant and rent : Gamison Ltd has leased a warehouse in an industrial section of the twon. The lease is for 5 years and can only be cancelled by Gamison if Gamisons reimburses the landlord for the costs of re-letting the warehouse including any costs of finding a new ..
Write the given autobiography in more better way : Write the given autobiography in more better way.- Design has the power of always being different in every project.
How many work for companies that provide goods and services : Among the families you know, how many work for companies that provide goods or services for capital formation-that is, for investment purposes rather than for consumption?
Application-cybercrime-related laws and digital evidence : Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. T..
What is the origin of callenders account about the jefferson : What is the origin of Callender's account about the Jefferson-Hemings affair, i.e. where and from whom did Callender get his scandalous information?
What is meant by transitive dependency : Describe what is meant by transitive dependency and describe how this type of dependency relates to 3NF. Provide an example to illustrate your answer.
Analyse current accounting issues : In your accounting career you will be required to analyse current accounting issues and communicate your theoretical understanding to your professional colleagues and your clients. For this assignment assume that you are the senior accountant work..
Management system for a software development project : Describe 5 factors you would evaluate in trying to identify a database management system for a software development project.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Importance of standards in networking technology

Discuss the importance of standards in networking technology and in communications in general. Evaluate how standards have helped to shape commonly used devices such as cellular phones or mobile devices.

  List the vertices in the order in which each traversal visit

List the vertices in the order in which each traversal visits them.

  Positive and negative technological advancements

Once the atom begins to be more understand, there are both positive and negative technological advancements that can possibly be made. Discuss at least one positive and one negative advancement that is related to the atom.

  Find the expected value e[t]

Monitor three phone calls and observe whether each one is a voice call or a data call. The random variable N is the number of voice calls.

  Emulate these types of data structures in a computer program

Identify at least two data structures used to organize a typical file cabinet. Why do you feel it is necessary to emulate these types of data structures in a computer program? For what kind of work project would you want to use this type of pr..

  Engineering a balance between the resources of pc

How has this lesson affected the way you think about engineering a balance between the resources of the PC and the needs of users?

  Demonstrates the appropriate time

Provide at least one (1) example of a scenario that demonstrates the appropriate time / situation to use a recovery option to return a Windows 8 system to a functional state. Identify the recovery option you would use for your provided example, an..

  How does the name server hierarchy relate to zone hierarchy

how does the name server hierarchy relate to the zone hierarchy? How do you deal with the fact that each zone may have multiple name servers?

  All disk drives in a particular batch are the same model

All disk drives of a certain model of a particular manufacturer have exactly the same capacity.

  When does r display character vectors/strings without quotes

when does R display character vectors/strings without quotes?

  Hershey company cohesion case

Using the Hershey Company Cohesion Case, the www.finance.yahoo.com information, or other sources, list what you consider to be Hershey's 10 major strenghts, 10 major weaknesses, 10 major opportunities & 10 major threats.

  Describe an algorithm to find the largest

Describe an algorithm to find the largest 1 million numbers in 1 billion numbers  Assume that the computer memory can hold all one billion numbers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd