Hello. Could you please answer the following discussion questions?
- Select what you perceive to be the most concerning crime(s) that utilizes computers and explain how this crime(s) is aided by technology. Justify why you perceive this crime(s) to be of most concern.
- Analyze the role of a computer systems’ forensics specialist in this crime(s) and explain why this specialized role is needed in an investigation and / or case. Determine how an investigation of this crime(s) would begin and what the initial steps taken by the forensics specialist would likely entail.
- Describe what you perceive to be the greatest challenge for system forensics investigators. Provide specific details of this challenge and whether or not the challenge differs from a private company investigation compared to a law enforcement investigation. Provide a rationale with your response.
- Go to the IEEE’s Website to read the article titled “U.S. Courts Rule For—and Against—Protecting a Suspect’s Hard Drives,” located at http://spectrum.ieee.org/riskfactor/computing/it/us-courts-rule-for-and-against-protecting-a-suspects-hard-drives.From the e-Activity, take Take a position on the 11th Circuit ruling that forced decryption of an encrypted volume as unconstitutional. Decide whether or not the subject matter of the potential evidence contained therein should have an effect on the court’s decision (e.g., child pornography versus terrorist activities vs. financial crime data). Justify your decision.