Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data? This is a very important question.

Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data? This is a very important question. As many of you have discussed, it is important to make sure you know the limits of your warrant.  But while you are conducting a search with a properly executed warrant, you may come across other information that is not included in your scope but is still evidence of a crime. For example, imagine you are searching a hard drive for information related to a fraud scheme. While you are looking through the files you come across a picture that is obviously child porn, but you do not have child porn addressed in any way by your warrant. What do you do? The proper response is to stop the search and obtain another warrant for evidence related to child pornography. The same thing applies to discovering encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain evidence. Some may even use stego techniques to hide other files.
This week I would like you to do some research on encryption and steganography.  First, list five (5) examples each of how steganography and encryption or cryptology were used BEFORE the advent of computers. Then, discuss how stegonography or encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"