What are the seven (7) investigative protocols for investigating high tech crimes discussed in this chapter?
What will be an ideal response?
•Receive and identify the nature of the complaint
•Make evidentiary copy of the digital evidence
•Expand the email header/other web address information on a non-evidentiary working copy
•Read the address information to determine the originating source IP address
•Use an IP lookup website to determine the originating source Internet Service Provider (ISP)
•Using the ISP administrative contact information, draft a subpoena / search warrant for ISP records pertaining to the email message and its sender
•Properly secure and document digital evidence while maintaining chain of custody in an electronic world
You might also like to view...
In the case of Daubert v. Merrell Dow Pharmaceuticals, Inc., the U.S. Supreme Court advocated that a "gatekeeper" determine the admissibility and reliability of scientific evidence. Who is this gatekeeper?
a. Expert witness b. Prosecutor c. Jury d. Trial judge
The U.S. Department of Homeland Security (DHS) was created by the:
a. Homeland Security Act of 2002. b. USA PATRIOT Act of 2001. c. Bioterrorism Act of 2002. d. Post-Katrina Emergency Reform Act of 2006. e. all of the above.
In several communities discussed in this chapter, youth programs were introduced to help police and youth become more accustomed to each other
a. True b. False Indicate whether the statement is true or false
Although multiple agencies play a role in our nation’s cybersecurity, leading the way is the ______.
a. Federal Bureau of Investigation b. National Security Agency c. Central Intelligence Agency d. Defense Intelligence Agency