SlideShare a Scribd company logo
1 of 2
In 2005, serial killer Dennis Rader, also known as BTK, was
arrested and convicted of murdering 10 people in Kansas
between the years of 1974 and 1991. Further research this
incident using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
Explicate how digital forensics was used to identify Rader as a
suspect and lead to more concrete physical evidence.
Describe in detail the digital evidence that was uncovered from
the floppy disk obtained from Rader. Discuss why you believe it
took so many years to find concrete evidence in order to build a
case against Rader.
Explain how the acquisition of digital evidence aided the
investigation and whether or not you believe Rader would’ve
been a person of interest if the floppy disk evidence wasn’t
sent.
Identify the software that was used by the authorities to uncover
the evidence and summarize how this software can be used for
digital forensics and evidence collection.
Use at least two (2) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Identify the role of computer forensics in responding to crimes
and solving business challenges.
Report investigative findings of potential evidentiary value.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics
using proper writing mechanics and technical style conventions.

More Related Content

Similar to In 2005, serial killer Dennis Rader, also known as BTK, was arrested.docx

Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docxAssignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
daniatrappit
 
Assignment How a Law Becomes a LawAccording to the Library of .docx
Assignment  How a Law Becomes a LawAccording to the Library of .docxAssignment  How a Law Becomes a LawAccording to the Library of .docx
Assignment How a Law Becomes a LawAccording to the Library of .docx
petuniahita
 
Preliminary investigations do not necessarily yield enough informati.docx
Preliminary investigations do not necessarily yield enough informati.docxPreliminary investigations do not necessarily yield enough informati.docx
Preliminary investigations do not necessarily yield enough informati.docx
sarantatersall
 
Assignment 2 Computer LawsToday, there are many laws that address.docx
Assignment 2 Computer LawsToday, there are many laws that address.docxAssignment 2 Computer LawsToday, there are many laws that address.docx
Assignment 2 Computer LawsToday, there are many laws that address.docx
chandaronald
 
Term Paper Digital Forensic CasesYou have been asked to condu.docx
Term Paper Digital Forensic CasesYou have been asked to condu.docxTerm Paper Digital Forensic CasesYou have been asked to condu.docx
Term Paper Digital Forensic CasesYou have been asked to condu.docx
jacqueliner9
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
astonrenna
 
Assignment 2 Learning Activity 2—Analysis of a Profiling CaseOver.docx
Assignment 2 Learning Activity 2—Analysis of a Profiling CaseOver.docxAssignment 2 Learning Activity 2—Analysis of a Profiling CaseOver.docx
Assignment 2 Learning Activity 2—Analysis of a Profiling CaseOver.docx
josephinepaterson7611
 
You have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxYou have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docx
maxinesmith73660
 
Assignment 2 Computer Laws Due Week 4 and worth 50 points Tod.docx
Assignment 2 Computer Laws Due Week 4 and worth 50 points Tod.docxAssignment 2 Computer Laws Due Week 4 and worth 50 points Tod.docx
Assignment 2 Computer Laws Due Week 4 and worth 50 points Tod.docx
MerrileeDelvalle969
 

Similar to In 2005, serial killer Dennis Rader, also known as BTK, was arrested.docx (18)

CIS 562 STUDY Lessons in Excellence--cis562study.com
CIS 562 STUDY Lessons in Excellence--cis562study.comCIS 562 STUDY Lessons in Excellence--cis562study.com
CIS 562 STUDY Lessons in Excellence--cis562study.com
 
CIS 562 Education Organization / snaptutorial.com
CIS 562 Education Organization / snaptutorial.comCIS 562 Education Organization / snaptutorial.com
CIS 562 Education Organization / snaptutorial.com
 
CIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comCIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.com
 
Cis 562 Enthusiastic Study / snaptutorial.com
Cis 562 Enthusiastic Study / snaptutorial.comCis 562 Enthusiastic Study / snaptutorial.com
Cis 562 Enthusiastic Study / snaptutorial.com
 
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docxAssignment 1 Research PaperDue Week 3 and worth 200 points.docx
Assignment 1 Research PaperDue Week 3 and worth 200 points.docx
 
Assignment How a Law Becomes a LawAccording to the Library of .docx
Assignment  How a Law Becomes a LawAccording to the Library of .docxAssignment  How a Law Becomes a LawAccording to the Library of .docx
Assignment How a Law Becomes a LawAccording to the Library of .docx
 
Preliminary investigations do not necessarily yield enough informati.docx
Preliminary investigations do not necessarily yield enough informati.docxPreliminary investigations do not necessarily yield enough informati.docx
Preliminary investigations do not necessarily yield enough informati.docx
 
CIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.comCIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.com
 
CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   
 
CIS 562 Life of the Mind/newtonhelp.com   
CIS 562 Life of the Mind/newtonhelp.com   CIS 562 Life of the Mind/newtonhelp.com   
CIS 562 Life of the Mind/newtonhelp.com   
 
Assignment 2 Computer LawsToday, there are many laws that address.docx
Assignment 2 Computer LawsToday, there are many laws that address.docxAssignment 2 Computer LawsToday, there are many laws that address.docx
Assignment 2 Computer LawsToday, there are many laws that address.docx
 
Cis 562 Extraordinary Success/newtonhelp.com
Cis 562 Extraordinary Success/newtonhelp.com  Cis 562 Extraordinary Success/newtonhelp.com
Cis 562 Extraordinary Success/newtonhelp.com
 
Term Paper Digital Forensic CasesYou have been asked to condu.docx
Term Paper Digital Forensic CasesYou have been asked to condu.docxTerm Paper Digital Forensic CasesYou have been asked to condu.docx
Term Paper Digital Forensic CasesYou have been asked to condu.docx
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
 
Assignment 2 Learning Activity 2—Analysis of a Profiling CaseOver.docx
Assignment 2 Learning Activity 2—Analysis of a Profiling CaseOver.docxAssignment 2 Learning Activity 2—Analysis of a Profiling CaseOver.docx
Assignment 2 Learning Activity 2—Analysis of a Profiling CaseOver.docx
 
You have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxYou have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docx
 
Assignment 2 Computer Laws Due Week 4 and worth 50 points Tod.docx
Assignment 2 Computer Laws Due Week 4 and worth 50 points Tod.docxAssignment 2 Computer Laws Due Week 4 and worth 50 points Tod.docx
Assignment 2 Computer Laws Due Week 4 and worth 50 points Tod.docx
 
CRJ 320 Effective Communication/tutorialrank.com
 CRJ 320 Effective Communication/tutorialrank.com CRJ 320 Effective Communication/tutorialrank.com
CRJ 320 Effective Communication/tutorialrank.com
 

More from rochellscroop

In this assignment, you will analyze Fiedlers Contingency Theor.docx
In this assignment, you will analyze Fiedlers Contingency Theor.docxIn this assignment, you will analyze Fiedlers Contingency Theor.docx
In this assignment, you will analyze Fiedlers Contingency Theor.docx
rochellscroop
 
In this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docxIn this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docx
rochellscroop
 
In this assignment, you will apply your knowledge of cultural influe.docx
In this assignment, you will apply your knowledge of cultural influe.docxIn this assignment, you will apply your knowledge of cultural influe.docx
In this assignment, you will apply your knowledge of cultural influe.docx
rochellscroop
 
In this assessment, students will read the case study provided.  Stu.docx
In this assessment, students will read the case study provided.  Stu.docxIn this assessment, students will read the case study provided.  Stu.docx
In this assessment, students will read the case study provided.  Stu.docx
rochellscroop
 
In this assessment, students will read the case study provided.docx
In this assessment, students will read the case study provided.docxIn this assessment, students will read the case study provided.docx
In this assessment, students will read the case study provided.docx
rochellscroop
 
In the Wealth of Nations (1776) Smith describes the economy as a sel.docx
In the Wealth of Nations (1776) Smith describes the economy as a sel.docxIn the Wealth of Nations (1776) Smith describes the economy as a sel.docx
In the Wealth of Nations (1776) Smith describes the economy as a sel.docx
rochellscroop
 
In the Week 4 Case Study AssessmentResources, Mrs. Ashland w.docx
In the Week 4 Case Study AssessmentResources, Mrs. Ashland w.docxIn the Week 4 Case Study AssessmentResources, Mrs. Ashland w.docx
In the Week 4 Case Study AssessmentResources, Mrs. Ashland w.docx
rochellscroop
 
In the story The Lady or the Tiger , which comes through the door, t.docx
In the story The Lady or the Tiger , which comes through the door, t.docxIn the story The Lady or the Tiger , which comes through the door, t.docx
In the story The Lady or the Tiger , which comes through the door, t.docx
rochellscroop
 
In the scenarios and resulting simulations, Robert Donovan, a Jurisv.docx
In the scenarios and resulting simulations, Robert Donovan, a Jurisv.docxIn the scenarios and resulting simulations, Robert Donovan, a Jurisv.docx
In the scenarios and resulting simulations, Robert Donovan, a Jurisv.docx
rochellscroop
 
In the past weeks, students have learned about leaders and leaders.docx
In the past weeks, students have learned about leaders and leaders.docxIn the past weeks, students have learned about leaders and leaders.docx
In the past weeks, students have learned about leaders and leaders.docx
rochellscroop
 
In the midsized town of Centervale, there is no more crime than one .docx
In the midsized town of Centervale, there is no more crime than one .docxIn the midsized town of Centervale, there is no more crime than one .docx
In the midsized town of Centervale, there is no more crime than one .docx
rochellscroop
 
In the early 20th century, the specter of infectious disease lurke.docx
In the early 20th century, the specter of infectious disease lurke.docxIn the early 20th century, the specter of infectious disease lurke.docx
In the early 20th century, the specter of infectious disease lurke.docx
rochellscroop
 

More from rochellscroop (20)

In this assignment, you will analyze Fiedlers Contingency Theor.docx
In this assignment, you will analyze Fiedlers Contingency Theor.docxIn this assignment, you will analyze Fiedlers Contingency Theor.docx
In this assignment, you will analyze Fiedlers Contingency Theor.docx
 
In this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docxIn this assignment, you will be a Supreme Court Justice deciding on .docx
In this assignment, you will be a Supreme Court Justice deciding on .docx
 
In this assignment, you will apply your knowledge of cultural influe.docx
In this assignment, you will apply your knowledge of cultural influe.docxIn this assignment, you will apply your knowledge of cultural influe.docx
In this assignment, you will apply your knowledge of cultural influe.docx
 
In this assignment you will analyze the organizational behavior of y.docx
In this assignment you will analyze the organizational behavior of y.docxIn this assignment you will analyze the organizational behavior of y.docx
In this assignment you will analyze the organizational behavior of y.docx
 
In this assessment, students will read the case study provided.  Stu.docx
In this assessment, students will read the case study provided.  Stu.docxIn this assessment, students will read the case study provided.  Stu.docx
In this assessment, students will read the case study provided.  Stu.docx
 
In this assessment, students will read the case study provided.docx
In this assessment, students will read the case study provided.docxIn this assessment, students will read the case study provided.docx
In this assessment, students will read the case study provided.docx
 
In the Wealth of Nations (1776) Smith describes the economy as a sel.docx
In the Wealth of Nations (1776) Smith describes the economy as a sel.docxIn the Wealth of Nations (1776) Smith describes the economy as a sel.docx
In the Wealth of Nations (1776) Smith describes the economy as a sel.docx
 
In the Unit 4 assignment you learned about a complex international o.docx
In the Unit 4 assignment you learned about a complex international o.docxIn the Unit 4 assignment you learned about a complex international o.docx
In the Unit 4 assignment you learned about a complex international o.docx
 
In the Week 4 Case Study AssessmentResources, Mrs. Ashland w.docx
In the Week 4 Case Study AssessmentResources, Mrs. Ashland w.docxIn the Week 4 Case Study AssessmentResources, Mrs. Ashland w.docx
In the Week 4 Case Study AssessmentResources, Mrs. Ashland w.docx
 
In the story The Lady or the Tiger , which comes through the door, t.docx
In the story The Lady or the Tiger , which comes through the door, t.docxIn the story The Lady or the Tiger , which comes through the door, t.docx
In the story The Lady or the Tiger , which comes through the door, t.docx
 
In the third week of the session, you will submit a review of a scho.docx
In the third week of the session, you will submit a review of a scho.docxIn the third week of the session, you will submit a review of a scho.docx
In the third week of the session, you will submit a review of a scho.docx
 
In The Road Not Taken,” Robert Frost writes figuratively about the .docx
In The Road Not Taken,” Robert Frost writes figuratively about the .docxIn The Road Not Taken,” Robert Frost writes figuratively about the .docx
In The Road Not Taken,” Robert Frost writes figuratively about the .docx
 
In the scenarios and resulting simulations, Robert Donovan, a Jurisv.docx
In the scenarios and resulting simulations, Robert Donovan, a Jurisv.docxIn the scenarios and resulting simulations, Robert Donovan, a Jurisv.docx
In the scenarios and resulting simulations, Robert Donovan, a Jurisv.docx
 
In the past weeks, students have learned about leaders and leaders.docx
In the past weeks, students have learned about leaders and leaders.docxIn the past weeks, students have learned about leaders and leaders.docx
In the past weeks, students have learned about leaders and leaders.docx
 
In the poem, The Terrorist, He Watches” by Wislawa Szmborska, how w.docx
In the poem, The Terrorist, He Watches” by Wislawa Szmborska, how w.docxIn the poem, The Terrorist, He Watches” by Wislawa Szmborska, how w.docx
In the poem, The Terrorist, He Watches” by Wislawa Szmborska, how w.docx
 
In the midsized town of Centervale, there is no more crime than one .docx
In the midsized town of Centervale, there is no more crime than one .docxIn the midsized town of Centervale, there is no more crime than one .docx
In the midsized town of Centervale, there is no more crime than one .docx
 
In the movie, the school board decides to make Coach Boone the head .docx
In the movie, the school board decides to make Coach Boone the head .docxIn the movie, the school board decides to make Coach Boone the head .docx
In the movie, the school board decides to make Coach Boone the head .docx
 
In the mid-seventeenth century, Dutch scientist Jan Baptista van Hel.docx
In the mid-seventeenth century, Dutch scientist Jan Baptista van Hel.docxIn the mid-seventeenth century, Dutch scientist Jan Baptista van Hel.docx
In the mid-seventeenth century, Dutch scientist Jan Baptista van Hel.docx
 
In the early 20th century, the specter of infectious disease lurke.docx
In the early 20th century, the specter of infectious disease lurke.docxIn the early 20th century, the specter of infectious disease lurke.docx
In the early 20th century, the specter of infectious disease lurke.docx
 
In the Group Wiki, write by Day 5 a summary to address the follo.docx
In the Group Wiki, write by Day 5 a summary to address the follo.docxIn the Group Wiki, write by Day 5 a summary to address the follo.docx
In the Group Wiki, write by Day 5 a summary to address the follo.docx
 

Recently uploaded

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

In 2005, serial killer Dennis Rader, also known as BTK, was arrested.docx

  • 1. In 2005, serial killer Dennis Rader, also known as BTK, was arrested and convicted of murdering 10 people in Kansas between the years of 1974 and 1991. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: Explicate how digital forensics was used to identify Rader as a suspect and lead to more concrete physical evidence. Describe in detail the digital evidence that was uncovered from the floppy disk obtained from Rader. Discuss why you believe it took so many years to find concrete evidence in order to build a case against Rader. Explain how the acquisition of digital evidence aided the investigation and whether or not you believe Rader would’ve been a person of interest if the floppy disk evidence wasn’t sent. Identify the software that was used by the authorities to uncover the evidence and summarize how this software can be used for digital forensics and evidence collection. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges.
  • 2. Report investigative findings of potential evidentiary value. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.