Subject Law Criminal Justice

Question

Your company, AB Investigative Services (ABIS) has been contacted by a prominent state law enforcement agency concerning the need to discuss, in a high-level meeting, specific computer-related forensics tools and their functions when governing the seizures of computers and other technology. On behalf of your ABIS, you will conduct a training meeting for 25 state law enforcement agency forensic investigative personnel.

In your training meeting, you must provide specific details of what forensic tools are available for use, and what current evidence processing laws are in place.

For full credit, your 3–4-paragraph Discussion Board posting must include the following information:
Discuss 3 advantages and/or disadvantages of using forensic tools during an investigation? You may discuss any combination of advantages and disadvantages, but you must discuss 3.
Why is this an advantage/disadvantage?
What is 1 example of a way in which an investigation can be corrupted by not using computer forensics tools?
How would this affect the investigation?
What do you consider to be the 3 most important forensics tools currently being used? Also discuss the most important features of each of these tools.
What information can be accessed by using these tools, and how is this information used in the investigative process/what is the importance of this information?
What do you consider to be the 3 most important evidence processing laws that must be taken into consideration during an investigation?
Why are these laws important, and who, specifically, do these laws protect?

Solution Preview

This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.

Currently, Casey (2011) points out that cyber-crime have reached unprecedented levels. Most of the internet users are gullible since they do not put in place mechanisms to ensure their safety online further propagating cyber crime. However, forensic experts use certain methodologies and computer-related forensic tools to extract data from the storage devices at the crime of scene. Most of the forensic tools are so advanced that they hardly miss any information in the cause of the investigations....

This is only a preview of the solution. Please use the purchase button to see the entire solution

Assisting Tutor

Related Homework Solutions

Criminal Justice Discussion (330 words)
Homework Solution
$15.00
Law
Criminal Justice
Discussion
Forensic Investigation
DNA Analysis
Costs
Taxpayers
Alibi
Biological Proof
Biology
Crime Scene
Blood Pattern
Testing Processes
Mental Health: Anxiety Disorders (360 words)
Homework Solution
$15.00
Criminal Justice
Law
Cell Block
Prison
Security
Anxiety Disorders
Population
Violence
Terror
Library
Staff
Employees
Officers
Psychology
Illness
Attack
Program Evaluation
Homework Solution
$25.00
law
Criminal
Justice
Program
Evaluation
Concerns
Types
Guide
Research
Questions
Testimony (410 words)
Homework Solution
$15.00
Privileged Communication
ASAC
Witness
SAC
Testimony
Document
Criminal Charges
Hearsay
Court
Get help from a qualified tutor
Live Chats