EVIDENCE.

Description

Instructions

Don't use plagiarized sources. Get Your Custom Assignment on
EVIDENCE.
From as Little as $13/Page

For this activity, you will review a cyberstalking scenario and then respond to specific questions. Answers should be from the perspective of a law enforcement professional. Your answers should identify the items of evidence collected in the scenario and the evidence category it represents, (e.g., physical evidence, direct evidence, circumstantial evidence, and hearsay evidence). Not all evidence categories must be used. One or more evidence categories may apply.

Response Format

Responses will be written in short essay paragraphs from the perspective of a law enforcement professional.
Your response should demonstrate critical thinking. Write your answers in complete sentences and provide justification for your responses.
Use in-text citations in your responses using APA format.
Submit your answers in a Microsoft Word document and save your file as Week1 _ A1_your name.
Justify and support your responses, using the information found in your text and through research.
Avoid copying text directly from the textbook. This is considered plagiarism and is not acceptable. Instead, paraphrase the information you found in the sources reviewed and then write in your own words the information that you found to be relevant to this assignment.
Assignment Questions
Draft responses to the questions below.
After reviewing the scenario and reading assignment, identify how the evidence collected corresponds with one or more evidence categories. Not all evidence categories must be used. Provide justification for your choices.
Evidence Categories
Collected Evidence Evidence categories
Fingerprints Physical evidence
Computer mouse Direct evidence
keyboard Circumstantial evidence
Computer monitor Hearsay evidence
The Cybercrime Unit investigative specialist retrieved the text message from Heather’s phone that was sent from Brian Jacoby. The investigative specialist also retrieved eight email messages from Heather’s computer that were sent to her friends. The investigative specialist also discovered spyware on the computer. This would have allowed the person monitoring Heather to track her computer activity. Identify how the evidence collected corresponds with one or more evidence categories. Not all evidence categories must be used. Provide justification for your choices.
Evidence Categories
Collected Evidence Evidence categories
Phone Physical evidence
Text message Direct evidence
spyware Circumstantial evidence
email Hearsay evidence
Detective Laton also interviewed the Secretary at the front desk for the Pinedale Elementary school, her seven friends receiving the email, her neighbors, and Brian Jacoby. Which category of evidence would you designate for the witness interviews? Briefly support your selection. Evidence Categories include physical evidence, direct evidence, circumstantial evidence, and hearsay evidence.