Section 3: Specific Crimes
Investigating and obtaining evidence from homicides and computer crimes related to cyber space are just some of the challenges that police and forensic scientists encounter. How evidence is procured and evaluated will be the focal point of any criminal prosecution. Any deviations from standard protocols could result in having the procured evidence deemed inadmissible. Likewise, such deviations could have the opposite result in convicting an innocent person.
Please refer to each Activity for required readings within Activity Resources.
Assignment 5 Digital Evidence
New technology creates additional ways for criminals to victimize people. As such, the number of cyber-crimes is increasing. Identity theft, child predators, and fraud schemes are just some of the issues the FBI investigates within social media sites (Snow, 2010). Because Digital evidence can be very fragile, there are special collection procedures for electronic evidence that need to be followed because some programs will erase the data if the computer or laptop is not shut down in a special manner. With computer technology continually advancing, it is challenging for law enforcement to stay ahead of the criminals. Activity Resources
Main Task: Assess the Extent of Computer/Cyber-Crime
Write a paper that analyzes and interprets different crimes that constitute a cyber-crime and include responses to the following:
- Explain how technology has provided a new criminal frontier for those that engage in illegal activity.
- How are these crimes carried out?
- Who is at the greatest risk in becoming a victim of such computer related crimes? Why?
- Explain how law enforcement currently combats cyber-crimes.
- How do investigators secure evidence in order to successfully prosecute the offender?
Support your paper with at least five (5) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.
Length: 5-7 pages not including title and reference pages
Please Login or Register
to Submit the Solution for the Request