In: Psychology
In preparation for a court appearance, the federal law
enforcement agency wants to ensure proper forensic processes and
techniques are used in a computer crime case involving identify
theft.
When challenging the admissibility of the digital evidence, the
defense examiner will evaluate the authentication and chain of
custody techniques used. The federal law enforcement agency would
like your company, AB Investigative Services (ABIS), to identify in
a report the possible authentication and chain of custody
techniques acceptable in the investigative process, including
issues relating to First and Fourth Amendment privacy issues with
respect to computer-related technologies.
Using the library, Internet, or any other credible materials,
provide the following in your report to the federal law enforcement
agency:
Begin the report with a one page overview of the forensics process
and the steps taken by an examiner related to identity theft and
computer crime.
Provide 2-3 pages identifying:
two recommended examples of authentication acceptable in the
investigative process of identity theft
two recommended examples of chain of custody techniques of digital
evidence.
Provide 2-3 pages explaining:
what is considered legal or illegal under the guidelines of the
First and Fourth Amendments in relation to the identity theft
investigation
Cite your sources using APA style.
Overview of the forensics process related to identity theft and computer crime
Forensic science as defined, is the application of science to criminal and civil laws, mainly—on the criminal side—during a criminal investigation, as governed by the legal standards of admissible evidence and criminal procedure.
Forensic process related identity theft & computer crime:
Steps that are taken by an examiner related to identity theft and computer crime:
Two recommended examples of authentication acceptable in the investigative process of identity theft
Authentication means confirming the truth of something. In this case, the identity. The two recommended examples are,
Documents: In authentication, identification
documents can be Personal Identification Number (PIN), Passwords,
Key codes, Original account related cards, wallets etc.,
Biometric: In authentication, identification
biometrics can be a person's retina, fingerprints or even voice, in
order to confirm identity.
Two recommended examples of the chain of custody techniques of digital evidence
What is considered legal or illegal under the guidelines of the First and Fourth Amendments in relation to the identity theft investigation
Citations:
Katz v. United States., 1967., 389 U.S. 347 (ruling that
interception of a person’s conversations made over a public pay
phone is a “search” for Fourth Amendment purposes).
Morrison., Fourth amendment protections warranted in digital
searches, Pg. 21