Which of the following is not a common defense strategy in high tech crime cases?

a. Attacking the credibility of the investigator
b. Attacking data or files, stating that they were manipulated or modified by the investigator
c. Attacking the chain of custody
d. Presenting suspect testimony


D

Criminal Justice

You might also like to view...

What part of a decedent's body resists rapid decomposition and is used by forensic anthropologists to provide information about the decedent?

a. Teeth b. Bones c. Soft tissue d. Cartilage

Criminal Justice

Sentencing based on what occupies the middle ground between indeterminate and determinate methods of sentencing?

a. Judicial discretion b. Sentencing guidelines c. Prosecutorial recommendations d. All of the above

Criminal Justice

The model developed by Herbert Packer that suggests the criminal justice system should focus on helping the victims of crime and that the repression of crime is of the utmost of importance in controlling crime is the ______ _________ model

Fill in the blanks with correct word

Criminal Justice

Paul and John witness a murder. As the murderer fled the scene, Paul heard him say, “I didn’t mean to kill her, I didn’t mean to kill her.” How can the prosecutor get Paul’s statement admitted at the suspect’s trial? What if Paul has since moved out of the country and is unavailable to attend the trial?

What will be an ideal response?

Criminal Justice