Explain what limitations or hurdles in a law enforcement

Assignment Help Other Subject
Reference no: EM131578331

Reading takes you from the general discussion we held last week into some more specific details about the role of both criminal justice and non-criminal justice professionals in the IT and computer forensics world, as well as why it is important that you understand the basic principles and concepts of the criminal justice process. Then we get into the meat of what you would do and how you would interface with law enforcement in the event you have to conduct a forensic system analysis. The readings in module 2 again stress the importance of understanding the criminal justice process, as well as discuss different types of devices or file systems that may contain information critical to your analysis.

Among the basic concepts to understand this week are that there are many types of evidence one could find in digital data. Understanding what data you may find, even if it is not evidence of a crime, is important to preparing a digital examination/analysis plan. Let's look at a non-technical example...

When a law enforcement officer applies for a warrant to search a residence, the officer must specify for what it is he or she is searching; if the case involves a stolen car, then the officer's search will be limited to only those locations a stolen car, or pieces of a stolen car (in case it was chopped), could be located. It would be unwise to just list the stolen car on the warrant, as (in the interpretation of the court) might only limit the officer to the whole car, intact. So, the officer has to determine in the beginning of their search what could have happened to the car (attempting to account for all the possibilities) so his or her search is complete (and most likely to yield results). The officer will also have to justify (in the affidavit) why he or she believes that the car could be found in smaller pieces.

To that end, an officer with auto theft experience may also be able to state that, in his or her experience, stolen cars are often broken down into smaller components, which can be identified with certainty as belonging to the original stolen car, as well as where such components could be hidden. It would most likely not be enough for the officer to simply assert that cars are broken down and sold for parts, if he or she wants to justify seizing an ashtray; the ashtray would need some specific characteristics to do that like a serial number, or other unique identifying artifact.

Search warrants and searches are, therefore, most often limited in scope to items for which the searcher is looking (i.e., nearly always evidence of a crime or wrongdoing). You cannot look for an elephant in a kitchen drawer! I know that sounds absurd, but it is an excellent metaphor... However, if you were looking for narcotics, they could be hidden almost anywhere, and you could justify a much broader search. In this example, digital evidence is much more akin to narcotics than you may think, with evidential data often occurring in hidden, strange, or unlikely places. As such, warrants to search for digital evidence often cast a "wide net," but cannot be so overly broad as to not be supported by probable cause or violate someone's 4th Amendment protections and implied rights to privacy under the Constitution.
Do not despair, however, if you are not a law enforcement officer... The requirement to obtain a search warrant does not apply to searches by private individuals or non-government organizations, as long as the individual(s) have the authority to conduct the search (e.g., IT security personnel are searching a computer owned by their company for company data, or an employee gives the company consent to search for their personal data). Judicially, the Court evaluates whether your activity was an extension of the government (law-enforcement); acting on their behalf or assisting them. However, even those searches may be limited to certain parts of the computer system(s) or network(s). If a person is allowed to use a personally-owned flash drive at work, and that drive is connected to the computer, you still may not be able to search it without the employee's consent. All of these examples depend heavily on established company policies and what warnings were given to the employee.

The readings this week identify several types of devices on which digital evidence could be found.

For this week's discussion, please select two of the devices described in your readings (or other devices, if you prefer). For each device, answer the following questions below in detail. Please discuss thoroughly and substantively in your post. Additionally, respond in a thorough, substantive, intelligent way to at least one of your fellow classmates that adds to our discussion and learning of this week's topic!
For each, state what types of evidence you would look for on those devices in detail

Explain what limitations or hurdles you would have to clear before searching each of the devices (BOTH as a company IT professional and a law enforcement officer).

Identify what, if any, policies would need to be in place for you to search as a private employee, as well as what limits can be placed on the search by police.

Reference no: EM131578331

Questions Cloud

Arraylist data structure-daily temperature : Develop a Java program that will store data in the form of daily temperature for one week. Your program should prompt the user for the day of the week.
Calculate the annual and end of year loan payment : Calculate the annual, end of year loan payment. Explain why the interest portion of each payment declines with the passage of time.
How have social psychology theories been used in practice : Consider which concepts from sociological and/or behavioral theories could be used in nursing practice for addressing the patient's health care needs.
Document the three types of cloud services : 1. Document the three types of cloud services. 2. Compare the costs associated with cloud services over services that are installed on a local host machine.
Explain what limitations or hurdles in a law enforcement : Explain what limitations or hurdles you would have to clear before searching each of the devices BOTH as a company IT professional and a law enforcement office
Find the error in the given proof : Find the error in the following "proof" that all positive integers n are equal. Let p(n) be the statement that all numbers in an n-element set of positive.
Review and understand the example : 1. Review and understand the example. (Note: Always start a function with an = as the first character.)
National thai restaurant chain-what is the intrinsic value : Thai One On, national Thai restaurant chain, expects to see 25% annual increase in dividends over the next three years. what is the intrinsic value.
What is the role of technology in corporate performance : What is the role of technology in corporate performance? Is the mix of basic, applied, and engineering research appropriate given the corporate mission?

Reviews

Write a Review

Other Subject Questions & Answers

  What is advantage play-what constitutes a credit instrument

Are table games and slot players rated the same? Why or why not? Is it possible to rate two players on the same account? Why or why not? What is advantage play? Does an advantage player deserve comps? Why or why not? What constitutes a credit instrum..

  How technology changed way in which people pursue knowledge

Examine the relationship between advances in technology and the responsibilities of global citizenship. Describe how technology has changed the way in which people pursue knowledge.

  Contracts and antitrust protocols based on criminal aspects

From the scenario, differentiate between the concepts of criminal law, antitrust, and health care as they apply to U.S. health law in the 21st Century.

  Search the web for 1 job posting or advertisement from 4

search the web for 1 job posting or advertisement from 4 different multinational corporations. you must choose a

  Provide some background on this community and discuss its

describe the establishment of chicano park of the logan heights neighborhood of san diego ca. provide some background

  How did you feel and think while experiencing it

Describe a time in which you have experienced burnout, either as a student or employee. What led to the burnout? How did you feel and think while experiencing it? How did you overcome burnout?

  Provide three different explanations for this behavior

What specific factors would cause people to continue to shock other people, past the perceived thresholds of extreme pain, unconsciousness, or even death?

  What would make me think my time was well spent

What is success create your personal definition of success by answering the question posted in the article "When I'm 100 years old and I look back over my life, what would make me think my time was well spent

  Movement toward secession in the winter of 1860-1861

The movement toward secession in the winter of 1860-1861 was most rapid in...

  Describe three principles of nonverbal communication

Describe three principles of nonverbal communication that you believe are most important. Why are these important for you to keep in mind when communicating

  Compare and contrast one of the other theories mentioned in

discuss the differences between activity theory and disengagement theory.compare and contrast one of the other theories

  How did greece influence the culture of rome

How did Greece influence the culture of Rome? What were the similarities and differences? Why did the Romans accept these ideas

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd