How to preserve computer crime evidence?
What will be an ideal response?
Determining if the evidence can be collected and preserved for future analysis is not as easy as it sounds. Investigators must check their warrants constantly for what they can and cannot seize. If something is found that is needed but is not covered in a search warrant, the wording must be amended before seizure of that item can proceed.
Some types of computer evidence require special care and attention. Because of this, storage areas must be controlled, and special care must be given to protect the evidence from physical damage. Certain care measures are required for the most common types of computer evidence:
? Magnetic tape and disks.
? Printed computer listings.
? Computer.
? Additional computer hardware.
You might also like to view...
__________ is a form of terrorism that uses high technology in the planning and carrying out of terrorist attacks
a. GovNet b. Bioterrorism c. Cyberterrorism d. Cyberspace
What is an Identity-Theft?
What will be an ideal response?
According to a study by Junger-Tas (1996), the peak ages for juvenile crimes are ______.
a. higher in developed countries b. higher in developing countries c. similar across all countries d. lower in developed countries
What are two difficulties with identifying idiographic causal explanations?
What will be an ideal response?