List and discuss the primary types of computer crime evidence and how they should be collected and preserved

What will be an ideal response?


• The computer itself has transaction journal, user identification, terminal location, e-mail log, and media storage disks/cards evidence. Printer activity can also produce evidence of computer crime. Physical evidence can come from source documents, handwritten notes, and photographs, while suspect evidence can include statements, background, personal habits, and attendance. Collection of evidence must comport with search warrants, which can be tricky given the need for particular wording, and special care is needed to protect computer crime evidence from physical damage (including magnetic tape and disks, printed computer listings, the computer itself, and additional hardware and add-on devices).

Criminal Justice

You might also like to view...

The presence of prostate specific antigen (PSA), or p30, is useful for identifying a sample stain containing semen

Indicate whether the statement is true or false.

Criminal Justice

______ are laws that define criminal acts and how such acts will be punished.

A. Criminal law B. Civil law C. Criminal justice D. Natural law

Criminal Justice

The U.S. Supreme Court recently ruled that it is unconstitutional to notify a community where a former sex offender lives

a. True b. False Indicate whether the statement is true or false

Criminal Justice

In an emergency situation, which of the following communications can be issued with relative ease, since concurrence by those affected is not sought?

a. Free rein b. Autocratic c. Democratic d. Dual Track

Criminal Justice