Computer Crime – Digital Crime Investigation Requirements

1.
Which federal law enforcement agency has assumed primary responsibilities in the area of access device fraud, including the fraudulent use of credit card numbers, personal identification numbers and computer passwords?
2.
What human resources does an investigator have to call upon when the investigator is not technically proficient with the system containing digital evidence? What skills facilitate using those resources to maximum advantage?
3.
Explain how what the “best evidence rule” is and how it applies to digital copies. What procedures are required to meet the rules of evidence?
4.
In the context of hearsay, explain how the “business records exemption” can be used to avoid presenting hearsay evidence and explain how an investigator best uses his/her notes on the stand.

 

Order Now