Respond to digital forensics in the criminal justice system discussion

Can you help me understand this Law question?

Haven’t Found The Relevant Content? Hire a Subject Expert to Help You With
Respond to digital forensics in the criminal justice system discussion
Post Your Own Question And Get A Custom Answer
Hire Writer

Analysis on a digital evidence must never be conducted on the original evidence if possible as alterations to the data may occur. This being said, write blockers are used to prevent contamination to the original evidence during a capture, analysis, and control (CRU, n.d.). Write blockers are software or hardware that enable read-only access to data within a storage drives while keeping the integrity of the data (Cybrary, 2016). As the name says, write blockers prevents writes to a storage device. Using this tool, analysts are able to access the data within a storage device without altering the data.

Upon receiving the evidence from the detective, a computer forensic examiner would first review the chain of custody log and ensure all information are correct. Then, all appropriate information will be filled out on the log to update the chain of custody and ensure its validity in court. Next, a hash of the original evidence will be taken for later comparison. Following the hash, the acquisition process is started where data from the digital evidence is acquired without altering the data within the original evidence (InfoSec, n.d.). This can either be done with a physical acquisition where an image is captured from a physical storage device or through logical acquisition where a sparse or logical image is captured from a storage device (InfoSec, n.d). A write blocker is used during this process to prevent alteration to the original evidence.

Following the acquisition process, the analysis phase starts. During this process, the examiner conducts analysis on a copy or image of the original evidence, analysis should not be conducted on the original evidence (InfoSec, n.d.). Various actions can be conducted during this phase to find evidence and help reconstruct actions or events that occurred relating to a case (InfoSec, n.d.). After the analysis phase, reporting must be conducted on the results and process. The reports will include a detailed step by step list of the process and information regarding the acquisition phase such as who conducted it, when it was conducted, and what software/hardware tools were used (InfoSec, n.d.). In addition, the report will include a comparison of a hash of the original evidence and a hash of the image/copy where the analysis was conducted on and ensure the hashes match (InfoSec, n.d.). This comparison will show alterations were not made to the copied/imaged device. Finally, the original evidence and the imaged/copied evidence will be securely stored with access control policies in place within a climate-controlled area free from magnetic fields (Forensic Magazine, 2010).

superadmin (28431)
New York University
DO YOU HAVE A SIMILAR ASSIGNMENT?

Hire an Expert to Help you

Hire Verified Expert

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Have a homework question? Get help from verified tutors now!

Are You Looking For Assignment Help? We Can Certainly Assist You