•Go to Wikipedia, the free encyclopedia, at http://en.wikipedia.org/. Perform a
ID: 3880691 • Letter: #
Question
•Go to Wikipedia, the free encyclopedia, at http://en.wikipedia.org/. Perform a search on the Daubert Standard. Identify and provide two prongs of Daubert’s two-pronged test of admissibility that is applied to expert witness testimony. Explain each of them and give an example of each.
•What are the five general categories of cybercriminals in today’s society?
•How has traditional crime such as dissemination of contraband and offensive materials reappeared in the computer era?
•What are the differences between traditional crime and computer crime?
•Make a list of three tools or techniques that can be used to hide or disguise evidence of a crime and explain how each of these can make it more difficult for an investigator to recover admissible e-evidence.
Explanation / Answer
1. Daubert's standard is a rule of evidence regardingthe addmissibility of expert witnesses testimony.A party create a special Daubert's motion in limine raised before or during trial,to exvclude the presentation of unqualified evidence to jury.
Daubert’s two-pronged test:
1. general acceptance test. this is a basis for assessing the admissibility of scientific expert testimony, but that the rule incorporate a flexible reliability standard.
example: Daubert v. Merrell Dow Pharmaceuticals,which held in 1993 that rule 702 of federal rule of evidence.
2.gatekeeping test:It applies to all expert testimony,including that which is non scientific.they can be applied to find th reliability of the underlying scientific techniques and expert conclusion.
example: Kumho tire co. v. Carmichael which held in 1999.
2. Five categories of cybercriminals :
1.Script kiddies: A wannable hacker who want to hack but lacks any serious technical expert.They can usually hacks the weaker secured systems.
2.Scammers: Your email box is probably full of their work. discount pharmaceuticals, time shares, personal ads from avaailable women in Russia..
3. Hackers group: They usually work anonymously and create tools for hacking.they often hack computer for no criminal reason but hire by a company tpo test the security.
4. Phishers: got an email recently claiming your bank account is about to expire. dont fall for these jerks.they want your personal detail like your identity,by directing you to a phony website.
5.Advanced persistent threat agents: this group is famous for highly targeted attacks carried out by extremely organisted sate sponsored group. their technical skills are deep and they have to access vast computing resources.
3.Dissemination of offensive materials from traditional to computer era: :In this we includes sexually explicit materials, racist propaganda,and instructions for fabrication of incendiary.in traditional way the telecommunication harrashing,threatning or sent unwilling recepients. but now all thjis is done by internet, one boy can upload his former girl nude pics on internet along with his name address or phone number.
Dissemination of contraband:We know telecommuniucation is difficult and if someone want to hack any information is curious.it is difficult because of inconvenience. bjut now number of groups hack web pages of govenment sectors using servers.
4.Differences between traditional crime and computer crime:Cyber crime refers to online web base unlawful act.whereas there are identical type of crimes causes, traditional crimes like boredom or vandalism.
Cyber crime:it refers to to the danger of our bank details. using web some hackers hack details and misuse. they hack our pc details or our project details.
Traditional crime:it include the ideological or political help,malice or revenge,financial achieve,by way of extortion or sale of illegally obtained knowledge,terriorism or notoriety, and sensationalism.
5. Techniques to hide or disguise evidence of a crime and difficulties for investigators to recover:
1.Encryption in crime and terriorism: in this voice, fax and real data are encrypted by the criminals to hide their crime. sometimes electronic mails also encrypted by criminal.mobile storage is also encrypted by using encryption techniques.
It is very difficult to recover e evidence because criminals use encryption techniques on higher levels which are difficult to decrypt or takes more time to decrypt.
2.Electronically store data: in this criminal store the crimes detail in the electronic way onto the computer.
in this a big problem is that electronic data is difficult to hack because we have no knowledge of where the data is stored and in which format.
3.Using password or digital compression: some details are compressed by digital method so it is difficult to understand.and sometime password are used to hide crimes.
It is difficult to decompress the digital data or time cosuming process and sometime password are very typical which can't be identified.if we want to know details we need the expensive experts.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.