Preview

81137787 Steps Necessary In Making Electronic Evidence Admissible In Court Pr

Better Essays
Open Document
Open Document
4479 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
81137787 Steps Necessary In Making Electronic Evidence Admissible In Court Pr
Steps Necessary in Making Electronic Evidence Admissible in Court
Name:
Course:
Instructor:
Institution:
Date of Submission:

Introduction
Electronic evidence or digital evidence is any information stored digitally that a party in a court case may use to prove a case in a court trial. This kind of evidence has been in use in the courtrooms for some timeandmay come in the form of instant message history logs, ATM transactions, browser history, databases, and other forms of electronic materials. The reason as to why electronic evidence is gaining momentum in criminal and civil litigation is that there has been a rise in electronic communication users everyday. This all comes down to the impact of revolution within the ICT that generates an effect across all spheres including businesses, transport, and communication. These advancements in electronic communications have revolutionized communication aspects, business aspects, and the relations between friends and family. Admissibility of electronic evidence within a trial has its hurdles considering that it could easily befalsified and manipulated. The pressure falls upon the judges to rule on the admissibility of certain electronic evidence. The way that the court rules on the admissibility of electronic evidence will have an impact on the final ruling by the court. This might be the determining factor between acquittal and conviction. The most demanding in ruling on admissibility of e-evidence is a case concerning computer crime. This crime, unlike others, may have little or no physical evidence and hence, electronic evidence remains as the only viable option.
Judges have to subject electronic evidence to the same rules as the paper or physical evidence with no regard to the type of electrical gadget or crime committed. This therefore calls for a lot of care and caution when ruling on the admissibility of electronic evidence due to its bleak nature. Moreover, since there are different kinds of electronic



References: Giordano, S. (2004). Electronic Evidence Law. Systems Frontiers, 6, pp. 161-174. Givens, L. (2003). Cumberland Law Review. Cumbria: LEXIS. Keena, J. R. (2002).Bench & Bar of Minnesota.Retrieved March12,2014 fromhttp://www2.m nbar/benchandbar/2002/mar02/ediscovery.htm. Kenneally, E. (2001). Open Source Software to Assess Reliability for Digital Evidence.Virginia Journal of Law and Technology, 6, pp. 23- 37. Kerr, O. S. (2001). U.S. Department of Justice, United States Attorneys.USA Bulletin: Computer Records and the Federal Rules of Evidence, 49,p. 4. Retrieved March12, 2014 from http://www.usdoj.gov/criminal/cybercrime/usamarch20014.htm. Krotoski, L.& Jason, P. (2011). Log Record Analysis in Computer Crime.Obtaining and Admitting Electronic Evidence, 59,pp. 1-15. Mercer, C. (2014). Causes of Cyber Crime.Retrieved March12,2014 from http://science. Opposing views.com/causes-cyber-crime-1846.html. Nemeth, C. (2001). Law: A Primer for Criminal Justice, Criminology. New Jersey: Prentice Hall. O 'Connor, T. (2004). Hearsay Rule and Exceptions. Retrieved March 12,2014 from http://faculty.ncw.edu/oconnor/405/405lect11.htm. Patzakis, J. (2003). Accounting Reform Laws Technology-Based.International Journal of Digital Evidence, 2,pp. 113-134. Richardson, R. (2007). CSI/FBI Computer Crime and Security Survey. Retrieved March12, 2014 from http://www.gocsi.com/. Rowlingson, R. (2004). A Ten Step Process for Forensic Readiness. International Journal of Digital Evidence, 2,p. 3. Varchaver, N. (2003). The Perils of E-Mail.Fortune. Retrieved March 12, 2014 from http://money.cnn.com/magazines/fortune/fortune_archive/2003/02/17/337317/. Volonino, L. (2003). Electronic Evidence and Computer Forensics, 12, p. 27. Zaslow, J. (2003) To Fight E-Mail Sharing, Firms Try New Rules,Software. Wall Street Journal,2(1). Retrieved March 12, 2014 fromhttp://online.wsj.com/article/ 0,,SB105405850262272 400,00.html.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Csi Essay Example

    • 3977 Words
    • 16 Pages

    Technology is rapidly changing every aspect of the criminal justice system as computers make possible the streamlining of many procedures, shortening their time span and increasing their accuracy. Techniques used in the collection, processing and storage of evidence benefit from these recent developments.…

    • 3977 Words
    • 16 Pages
    Good Essays
  • Good Essays

    A message to Garcia

    • 606 Words
    • 3 Pages

    “A Message to Garcia” was a small story about a man who was called upon for a nearly impossible task. At the time the United States of America was in a bit of turmoil with Spain. President William McKinley it was wise to become allies with Cuban rebels who were led by General Garcia. Cuba at the time was under Spanish control and allying with the Cuban rebels seemed to be a powerful foothold for the U.S.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Evidence can be as diverse as people; however, when looking to collect any type of evidence, it will typically be separated into one of two categories: real evidence or testimonial. Real evidence is considered to be tangible, such as, it will be anything that the five senses can perceive (Worral, Hemmens, & Nored, 2012, p. 71). Articles of clothing, weapons, contracts or legal documentation, and photographs are all examples of tangible / real evidence. Additionally, within this same category of real evidence, “demonstrative” evidence will also be included. This type of evidence would be anything that can actually demonstrate the crime and/or scene. For example, a technician…

    • 1194 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    These days the electronic filing of forms and papers with many of the court systems and government agencies has started to become the only acceptable way of filing. If someone files a form or document in printed a format these days it is rare that it is not scanned and data entered into the electronic filing system. Today “Paralegals” need to have the “computer skills” to assist them in discovering facts from their computer-based “legal research” and use those “important,” properly stored and maintained “documents” to develop persuading presentations to turn the tide to their side in “litigation support” (Paralegals and Legal…

    • 1126 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The Atf

    • 5288 Words
    • 22 Pages

    The Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) has seen many changes since it origin in 1789. Originally established to tax the sale and distribution of alcohol, the ATF now posses more responsibilities in the world of law enforcement. It is important to understand the historical events and current changes that shaped the agency in the past several decades.…

    • 5288 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    Information technology knowledge and skills are necessary tools of the forensic accountant in a world filled which paperless crimes. At minimum, forensic accountants must know the point at which they should contact an expert in computer hardware or software. Examples of ways that forensic accountants use information technology skills to quarantine data, extract data through data mining, design and implement controls over data manipulation, accumulate baseline information for comparison purpose, and analyze data.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Court Issue Analysis

    • 1255 Words
    • 6 Pages

    Courts and those who work with the courts can use technology in many routine activities. These can include the e-filing of documents, court standardizations, court management, document management, electronic discovery and access to documents (Brunson, 2012).…

    • 1255 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    5. Evaluate the use of technology, such as video tape recordings, as demonstrative evidence in the courtroom.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays

Related Topics