Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
Check Instructions
Style:
APA
Subject:
Law
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.37
Topic:

Operation Stop Hack: Digital Evidence

Research Paper Instructions:

Disclaimer: This is for a Computer Forensic class. Not too sure which subject area it fell in.
Operation Stop Hack
Introduction
Suppose you have recently responded to your first computer forensic incident. The case in question involves a potential underground hacking ring, which the police, working in conjunction with the Federal Bureau of Investigation (FBI) have been investigating for several years. It has since been determined that an IP address confirms that location, and the identity of one of the suspects. Warrants have been issued for search and seizure of all electronic devices found on the premises.
View the setup found in the suspect’s home. Then document your findings and secure all relevant evidence.
Instructions
Write a 2–3 page paper in which you:
Investigate the legal statutes involved in this type of case and outline specific legal consideration to take when collecting evidence.
Pre-plan how to approach the crime scene, documenting the steps and procedures to process the digital evidence.
Analyze the crime scene diagram and document and tag each device that will be collected for evidence, specifying the importance of each device.
Use the Strayer Library to conduct your research. Use no less than three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed and double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides. Citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Outline the legal steps and procedures to process and collect digital evidence.

Research Paper Sample Content Preview:

Operation Stop Hack
Student’s Name
Institutional Affiliation
Date
Operation Stop Hack: Digital Evidence
Introduction
           The case in question entails a potential hacking ring, which the Federal Bureau of investigation, alongside police, has been doing an investigation for many years. It has been concluded that an internal protocol address confirms that place and the identity of the alleged suspect. In this case, a warrant for search and possession of all the devices has been issued. The evidence that will be collected is known as digital evidence.
Statute Law
           According to the statute law, agents must obtain a warrant If they know the search will retrieve sensitive information. Again, agents ought to obtain a warrant to search a suspected hacker. The seizure of some materials can implicate the ECPA or the PPA (Hitchcock et al., 2016). Agents of law enforcement should take critical steps during a search that may lead to the seizure of materials such as those posted on the website. To reduce liability under such statutes, agents must try to determine the information stored on the digital devices to be searched. Agents of law enforcement can carry out warrants if they reckon that declaring their presence would result in evidence destruction. Courts of Justice may also authorize warrants, which do not compel agents to notify the people whose residences are searched.
Steps to be Undertaken during Investigation
Digital evidence is brittle and volatile. Improper or unprocedural handling of digital evidence can temper such evidence. Due to digital evidence brittleness, prudent protocols and procedures to secure data. These procedures must be followed to ensure that data is not changed while handling processes, i.e., storage, transfer, packaging, collection, and access. These protocols describe the steps to stick to when handling evidence. These steps involved in the handling of evidence include identifying, collecting, questioning, and preserving.
The process of identification involves things such as evidence present, how the evidence is stored and where the evi...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!