Which federal law enforcement agency has assumed primary responsibilities in the area of access device fraud, including the fraudulent use of credit card numbers, personal identification numbers and computer passwords?
What human resources does an investigator have to call upon when the investigator is not technically proficient with the system containing digital evidence? What skills facilitate using those resources to maximum advantage?
Explain how what the "best evidence rule" is and how it applies to digital copies. What procedures are required to meet the rules of evidence?
In the context of hearsay, explain how the "business records exemption" can be used to avoid presenting hearsay evidence and explain how an investigator best uses his/her notes on the stand.
1. The United States Secret Service has the primary responsibility in the area of access device fraud within the financial industry under Title 18, United States Code, Section 1029. Under this law, they are responsible for debit cards, ATM cards, credit cards, computer passwords, person ID numbers, debit or credit account numbers, long-distance access codes and Subscriber Identity Module contained in cellular telephones that assign billing.
2. An IT specialist or a computer programmer would be vital to an investigator trying to access information from digital evidence. In today's IT industry, there are programming decoders that are able to access digital evidence that is embedded and encrypted in a computer's programming, even though it may not be visible to someone who can only use computer applications facially. For an investigator, it would help to be a people person because the investigator and the decoder will sometimes have to work for long periods of time and sometimes may not ...