Your company, AB Investigative Services (ABIS) has been contacted by a prominent state law enforcement agency concerning the need to discuss, in a high-level meeting, specific computer-related forensics tools and their functions when governing the seizures of computers and other technology. On behalf of your ABIS, you will conduct a training meeting for 25 state law enforcement agency forensic investigative personnel.
In your training meeting, you must provide specific details of what forensic tools are available for use, and what current evidence processing laws are in place.
For full credit, your 3–4-paragraph Discussion Board posting must include the following information:
Discuss 3 advantages and/or disadvantages of using forensic tools during an investigation? You may discuss any combination of advantages and disadvantages, but you must discuss 3.
Why is this an advantage/disadvantage?
What is 1 example of a way in which an investigation can be corrupted by not using computer forensics tools?
How would this affect the investigation?
What do you consider to be the 3 most important forensics tools currently being used? Also discuss the most important features of each of these tools.
What information can be accessed by using these tools, and how is this information used in the investigative process/what is the importance of this information?
What do you consider to be the 3 most important evidence processing laws that must be taken into consideration during an investigation?
Why are these laws important, and who, specifically, do these laws protect?
This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.
Currently, Casey (2011) points out that cyber-crime have reached unprecedented levels. Most of the internet users are gullible since they do not put in place mechanisms to ensure their safety online further propagating cyber crime. However, forensic experts use certain methodologies and computer-related forensic tools to extract data from the storage devices at the crime of scene. Most of the forensic tools are so advanced that they hardly miss any information in the cause of the investigations....
This is only a preview of the solution. Please use the purchase button to see the entire solution