Cybercrime-related laws and digital evidence

Assignment Help Basic Computer Science
Reference no: EM131220539

Application: Cybercrime-Related Laws and Digital Evidence

Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. The jury's eyes widen as their minds struggle to process the weapon visually.  

Now consider the same movie scene again. Except this time, the prosecutor picks up a laptop and thrusts it into the air. The same dramatic reaction, however, is unlikely. Although digital evidence that is stored in devices might seem intangible, this type of evidence has been used in previous legal cases for trying cybercrime.  

Cybercrime is just as real and subject to the same burdens of proof and judicial process. Yet, the admissibility of digital evidence for establishing proof of a cybercrime can be challenging. Understanding the linkage between digital evidence and the execution of a cybercrime is important for establishing a legal case.

To prepare for this Assignment, pick one of the following areas of cybercrime and select a federal or state law that addresses it:

  • Computer Intrusions
  • Cyberterrorism
  • Cyberharassment and Cyberstalking
  • Economic Espionage
  • Financial Crimes and Fraud

 For this Assignment, write a 3- to 5-page paper in APA format that:

  • Summarizes the key elements of the law.
  • Explains the types of digital evidence that would need to be collected to prosecute a case under this law. Be sure that you include possible sources of evidence, such as computing devices, wireless devices, and Internet service providers (ISPs).
  • Proposes  a new or emerging technology within the area of cybercrime selected that might  not be covered under this law.

Required ResourcesReadings

  • Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Course Technology.
    • Chapter 6, "Organized Crime and Cyber Terrorism" (pp. 210-223) 
      These pages discuss cyber terrorism, information warfare, and cyber espionage.
  • FindLaw. (1999). United States v. Upham. Retrieved from https://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=search&case=/data2/circs/1st/981121.html This site contains the text for the appeal for United States v. Upham.

Reference no: EM131220539

Questions Cloud

Analyze and interpret what the author is saying and doing : Clear exposition of text - Describe (i.e. give a clear exposition or summary of) what the author is saying and doing; An effective way to do this is by pre-reading, reading, re-reading, making notes and summarizing them.
Issue of trust an integral part of a security policy : 1). Why is the issue of trust an integral part of a security policy 2). Why is an e-mail use policy important?
Investment amount : Amy Monroe wants to create a fund today that will enable her to withdraw $25,780 per year for 8 years, with the first withdrawal to take place 4 years from today. If the fund earns 10% interest, how much must Amy invest today?
Attributes represent in an er model : Describe what attributes represent in an ER model and provide examples of simple, composite, single-value, multi-value, and derived attributes
Cybercrime-related laws and digital evidence : Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. T..
Conduct a service firm audit for a local business : MKT203 - Services Marketing - This assessment requires students to adopt the position of marketing consultants and conduct a service firm audit for a local business. Students are to work within groups of no more than three students.
What is the sales level in dollars required to equal year : Eagle Company makes the MusicFinder, a sophisticated satellite radio. Eagle has experienced a steady growth in sales for the past five years. However, Ms. Luray, Eagle's CEO, believes that to maintain the company's present growth will require an aggr..
Describe the planning process for public health intervention : Describe the planning process for public health interventions. Explain the importance of defining a health problem to program management. Identify possible outcome, impact, and process objectives.
Manufactures golf clubs in three models : Lisah, Inc., manufactures golf clubs in three models. For the year, the Big Bart line has a net loss of $3,600 from sales $201,000, variable costs $175,000, and fixed costs $29,600. If the Big Bart line is eliminated, $19,100 of fixed costs will rema..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is p[h1h2] are h1 and h2 independent

What is P[H1H2]? Are H1 and H2 independent?

  Explaining straight-line depreciation method

Explain in scholarly detail how to carry out Straight-line Depreciation Method calculations.

  Identify the important properties of the margin

Identify the important properties of the margin in solving pattern-classification problems.

  Clash of atoms and reactions generated in brains

Do you think that Hobbes was on to something with his theory? Is there joy or fear out there, or is it all inside of us and how we perceive and react to a situation?

  Valued or assimilated into the organization culture

How should employees' individual difference be treated: accepted? Valued or assimilated into the organization culture?

  Write a program to support children spelling game hangman

The traditional way to play hangman is to draw a figure on a gallows. Another part of the hanged man is added for each incorrect guess.

  Proposal to angel investors

Write a summary of your proposed initiative addressing the following (3.75 marks each): What your innovation is about

  Respond to those who think they can just start coding or

Respond to those who think they can just start coding or writing specifications without utilizing the systems development methodology?

  Prepare a list of threat categories

Contingency Planning Paper Address the following items: Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practice has a small LAN with four computers and Internet access. Prepare..

  What minimum rate should you sample the signal

Let us suppose that you have an analog signal that needs conversion to digital. The maximum frequency component in the signal is 2 kHz. At what minimum rate should you sample the signal (i.e., at least how many samples per second do you need)?

  Unix uses many commands in its operating system

Question 1: UNIX uses many commands in its operating system. Research on the web at least 2 more commands describe their function and discuss similar commands in Windows operating system.

  Context of information technology and information security

Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd