Preview

Electronic Evidence And Crime Case Study

Powerful Essays
Open Document
Open Document
1025 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Electronic Evidence And Crime Case Study
ELECTRONIC EVIDENCE AND CRIME Page10

Contents
Electronic Evidence and Crime 2
Digital Evidence Used 2
How the Evidence was Found 3
How the Evidence was Analyzed 3
The Crime Scene 5
Chain of Custody Concerns 6
Digital Evidence and Admissibility 7
Process for Evidence Used in Legal Proceedings 8
References 9

Electronic Evidence and Crime
The improvement in technology is one of the concerns that is both an advantage and an adversity if it lies on the wrong hands in the current and contemporary world. Over the years, the solution to ensuring maximum supervision and regulation to avoid its application in the infringement of individual rights has been debated across numerous legal conferences globally. This understanding brought
…show more content…
Krenar had plans of carrying out terror attacks in the United Kingdom but was convicted through studying the information on his internet browsing history. In his messages sent via MSN and other messaging systems, he bragged to foreign girls of himself and his personal view, which were recorded on the computer. Upon retrieval of the computer, the police were had to use the recorded information and files in presenting him to court for criminal charges.
Additionally, mobile phones were seized at his home with a video displaying how they would be turned into bomb triggers. The digital video was intended to guide Lusha in crafting a shotgun that would be used in blowing up petrol using its cartridge. After studying the information contained in the video, the police carried out an operation in his house and ended up seizing several liters of petrol, potassium nitrate and gunpowder
…show more content…
Investigations in digital criminology also involve capturing of the devices for their analysis to extract the relevant information. Electronic evidence is useful in proving the violation of the criminal statute codes to help in applying punishment based on the established law.in the case involving terror suspect Lusha, electronic evidence was used in sentencing him to jail and later deportation to Albania. For instance, Lusha was imprisoned based on the established law after having been charged in court. Moreover, to prevent him from accomplishing his plans upon release from jail, Lusha was to be deported back to his country. Analysis of electronic evidence involves examining the computer systems and synthesizing of the information to make informed

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Final Research Paper should address a topic that is connected to the content of this course (elements and requirements of a valid contract; issues related to real and personal property; intellectual property; employment law; and/or, international law and the global marketplace.) This paper should focus on a legal issue or situation that relates to a business environment or activity with a focus on the legal impact technology has on this issue. Ideally, this topic would concern a matter that you have experienced or that you have knowledge of; however, this not a requirement, only a suggestion. Apply the legal concepts and ethical considerations discussed in this course to your chosen topic. At a minimum this paper should include:…

    • 294 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Recent and future trends have always and will always affect the criminal justice system. New trends in technology, law, terrorism, gender and diversity will always effect the functions of the criminal justice system. Technology in the 21st century is one of the legal issues that have caused controversy. New technology devices such as hand geometry biometrics and the use of retina and iris devices have the ability to gain information not only on people’s health but also their medical history as well. When it concerns the criminal justice system, many of these new technology devices are being used to detect drugs and concealed weapons that are sneaked into prison facilities. They help prevent illegal activities in the prison. In Australia, the correction system there uses the smart card technology which provides them with better security, efficiency and flexibility. The smart card allows assets to tracking inmates, staff monitoring, visitor tracking, and telemedicine (govtech.com). The smart card also controls the temperature and humidity in the prison facility, allowing for their comprehensive responsibilities to be managed. Due to overcrowding in correctional facilities since 1997, this technology is…

    • 1714 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Lawrence Lessig in Code 2.0 argues that the rise of the internet and technology will inevitably lead to an increase in regulation and decrease in our right to privacy. Explain, through the use of recent developments and current legislation, how technology is challenging accepted concepts of Data Protection and Information Law…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Collecting evidence in a major or volume crime is an all-time practice, in order to get information about how the crime has happened. Volume crime is any crime which through its sheer volume has a significant impact on the community and the ability of the local police to tackle it. Volume crime often includes burglary, street robbery, and vehicle-related criminality but can also apply to criminal damage or assault. Major crime is any crime of criminal offence against the state and often includes murder, manslaughter, crimes in action offences of kidnap and extortion; homicide (the wilful killing of human being by another), rape, aggravated assault, robbery and etc. All these incidents may solved with variety of trace and contact materials may to be found at a crime scene investigation such as blood and body fluids, fingerprints, footwear marks, all of which could provide intelligence information, to named suspects. Additional, evidential material in the form of paint, hairs, fibres, tool-marks and glass can also afford corroborative evidence to link suspect with crime scene or eliminate the person from a police enquiries.…

    • 1513 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Evidence is a type of proof. It is usually used to prove someone innocent or guilty. There are many different types of evidence, such as: testimony, direct, circumstantial, and physical evidence. However, according to the article “Forensic: Evidence, Clues, and Investigation” by Andrea Campbell, forensic evidence is the best evidence to present at a court case or trial.…

    • 226 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    **Collection**Any and all investigating officers should keep this in mind as well as have a warrant baring the proper wording and language that adheres to search and seizure of a personal computer in order to avoid violating any privacy rights. First the officer should check to see if the computer is on or off. If an officer finds that the computer is not on, he or she should not turn it on the evidence must not be altered; however if the officer finds the computer on then the officer should photograph the screen even if the screen is in sleep mode. Once the computer is photographed the power should be disconnected. In other words the modem should be drained of power by unplugging it. Next the officer should be sure to insert a police disc into the CD or DVD drive; bear in mind the disc should be blank and after inserting it the drive should be sealed. All other hardware connected to the system should be photographed in order to have a record of how the system was…

    • 1674 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    the arrival of EMS which pronounced the victim deceased. Backup and Detectives were called to the scene.…

    • 2551 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This type of information is important to the development of new strategies to prevent and control crime; as well as where or what areas the implementation of new changes or new programs are in greater need, and would benefit the most. There is the benefit that new technology can be used to assist with crime prevention and with crime statistical information new technology can be created to assist law enforcement officers in the collection of evidence and with the arrest and conviction of criminals.…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The use of technology has been extremely beneficial to all branches of criminal justice although the loss of privacy and personal freedoms has been somewhat dramatic. As technology has evolved fighting crime has improved. Technology is a part of every day life for everyone. According to Rebecca Blaine, the first fully programmable computer was created around 1936. Since that date inventors all over the world began to work on improving computers. As inventors began to improve computers technology has evolved tremendously (Blaine 2007). The basic computer which once typed and was able to hold a few documents has evolved to tracking the movements…

    • 1795 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    There are many departments both inside and outside the criminal justice system that relies greatly on the use of advanced technology, as it appears to be a big help in many areas of the professional field, some of which includes Medical Services, fire departments, and law enforcement agencies. On the whole, all these agencies and more now rely on information and communication for their tasks to be effective and advance technology has certainly has necessitated true production and efficiency. Before the new discovery of advance technology, information was (and still is) documented on paper and stockpiled in boxes or filing cabinets. Now all it takes are a few click of a button to pull this information in a much faster way with computer systems. Information can now be retained from building structures a few feet away on a department computer, or even miles and many miles away from a remote computer location using a computer networking system. As fast as this information can be retained, is also can be disbursed at a rapid rate throughout the law…

    • 1519 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    There are crimes committed everyday. Investigators have to find evidence in order to get the evidence they need to get the criminal and finish the investigation. However, there is one major type of evidence to use and it is called Forensic Evidence, found in “Forensic Science: Evidence, Clues, and Investigation.” By Andrea Campbell.…

    • 296 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Whenever a crime occurs, no matter what the nature of the scene, crime scene evidence is the most important factor the criminal leaves behind. As far as forensic science goes, obtaining physical evidence is the biggest source of the crime scene. For an investigator, it gives insight into the way the crime was committed and is much like recreating the footsteps of the criminal through the clues left behind. Items of physical crime scene evidence are not always visible to the naked eye and may be easily overlooked so a systematic approach to collection and preservation of evidence is essential. The biggest problem that crime scene technicians encounter on the job is crime scene contamination by curious officers, detectives, and supervisors. Widespread trampling of crime scenes…

    • 3421 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    External drives, removable media, thumb drives, memory cards. These may contain information such as e-mail messages, internet browsing history, chat logs, pictures, image files, databases, financial records, and event logs which can be used as evidence in an investigation (National Institute of Justice, 2008).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays