Verified Document

Summarize The Disadvantages To Law Enforcement With Respect To The Advancements Of Computers Essay

¶ … Computer/Software and the Use of Computer Technology in Investigations The key advantage of computer forensics is that it can look for and assess loads of data in a swift and efficient manner. Computers are able to search for keywords from hard drives, in various languages. This proves valuable, as cybercriminals are easily able to cross national boundaries over the World Wide Web (Forensic Science, 2009). Computer forensics may be utilized in cases of corporate frauds, thefts, disputes over intellectual property, asset recovery and contract breaches (Forensic Science, 2009).

Important information, which cybercriminals have deleted or which is lost may be recovered and employed as significant court evidence. Professionals in the legal domain can furnish evidences in courts, which were earlier impossible. The field of computer forensics (i.e., electronic evidence) is fairly new; typically, criminal issues are handled through the use of physical evidence. Fortunately, the tool has proven advantageous in the recovery of damaged, lost, or deleted vital information, which plays a decisive role in cases (Forensic Science, 2009).

Disadvantages to Law Enforcement with Respect to the Advancements of Computers

The key drawback in the application of digital or electronic evidence is its permissibility in court. Information is easily modifiable. Computer...

They need to prove data tampering. Furthermore, their analysis should be wholly accounted for, and recorded. They need to be trained in standard legal procedures, while handling evidence. Data examination and reporting is dependent on the case's nature; it may even take a whopping fifteen hours to complete this process! (Forensic Science, 2009)
Computer analysts, while recovering information, might unknowingly unveil confidential documents. Moreover, legal professionals (including barristers, the judge, and solicitors) who are a part of the case, should be familiar with computer forensics, as a lack of understanding of the field will render them incapable of cross-examining expert witness. Computer forensics remains a rather new field, with some individuals still unfamiliar with it. The computer analyst ought to be capable of communicating what he has found such that all concerned parties grasp it. Evidence, however, can be captured only once. Computer application and the growth in cybercrimes call for a correspondingly advanced procedure for curbing them (Forensic Science, 2009).

A Case Where the Computer Was Used to Aid in Crime Commission

In the "Trident Breach," Eastern European, computer hackers stole no less than seventy million dollars from about 400 U.S. organizations'…

Sources used in this document:
References

10 Famous Criminal Cases Cracked by Forensics. (2011, February 1). Retrieved January 15, 2016, from http://www.criminaljusticeschools.org/blog/10-famous-cases-cracked-by-forensics

Forensic Science. (2009). Retrieved January 15, 2016, from http://www.anushreepatil.myewebsite.com/articles/advantages-and-disadvantages-of-computer-forensics.html

University professor helps FBI crack $70 million cybercrime ring. (2012, March 1). Retrieved January 15, 2016, from http://rockcenter.nbcnews.com/_news/2012/03/21/10792287-university-professor-helps-fbi-crack-70-million-cybercrime-ring
Cite this Document:
Copy Bibliography Citation

Related Documents

Freedom and Intellectual Libraries
Words: 5372 Length: 15 Document Type: Term Paper

Intellectual Freedom in Libraries In today's academic world intellectual freedom is a very important issue. In this paper various factors which are affecting intellectual freedom have been discussed along with efforts that need to be made in order to make the access of information possible for all. The issues being faced mainly by the librarians regarding the protection of confidential information of the library users have also been discussed in this

Invention of the Internet Has
Words: 6685 Length: 20 Document Type: Capstone Project

This software is used to perform common tasks like storage, data back up and data transfers. Small and medium businesses have embraced this technology because it involves no start up costs (like servers, hard disks, technicians etc.) therefore making it cost effective. Basically payment is based on the storage space taken by the user, again, this makes it user friendly. It may also be referred to as hosted storage. The flying

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now