Computer Forensics

Read Complete Research Material



Computer Forensics

Computer Forensics

Case

A 14- year old girl is missing after having an argument with her parents. They call the police at midnight on May 28. A police investigator shows up within 30 minutes to interview them and finds out that the girl spent a lot of time on the internet. The parents agree to let the investigator take her laptop. What steps should be taken next?

Solution

Although the field of private investigations is considered a professional field there is no formal education requirement but most investigators have prior knowledge of the law system and may have postsecondary degrees. Many private investigators enter the field after serving in law enforcement, the military, governmental positions, after retirement they may take private investigation as a secondary career. For investigative positions one must not be afraid of confrontation, should communicate well, and should be able to think and understand every situation (Hess & Orthmann, 2009).

Private investigators are hired to investigate based on suspicion. There job is to try and find out something hidden to do this they have to look for evidence. When dealing with every case investigators must be careful, take the best decisions and be as precise as possible. The importance of being cautious and precise is necessary for the everyday risk they face when dealing with cases in where not only their lives may run risk but others as well. The risk they may run can be anywhere from being charged criminally in court to death as a result of not taking the appropriate methods and tools when conducting an investigation. Excellent care is required to remain within the scope of the law. One as a P.I. has to always remember the importance of being successful, preventing failure and maintain focus on new skills to enhance their skills and techniques of being a well trained private investigator (Karl, 2007).

In this case, the steps that I look forward to take in order to solve the case, are given below:

I would ask the parents to look at her history on the computer to see if they have can gain any information, through chat logs and make a list of all her friends that they know or don't know.

Then I would have a change of custody form signed by the parents authorizing me to take the computer and investigate the contents using the appropriate software.

I would log in all items taken and seal all access ...
Related Ads
  • Computer Forensics
    www.researchomatic.com...

    Computer Forensics , Computer Forensics ...

  • Computer Forensics
    www.researchomatic.com...

    Computer Forensics , Computer Forensics ...

  • Computer Forensic
    www.researchomatic.com...

    Outline and describe the process of computer fore ...

  • Computer Forensics
    www.researchomatic.com...

    Computer forensics is also known as cyber-for ...

  • Computer Forensics
    www.researchomatic.com...

    Computer forensics is the study of law and co ...