Related Articles
AN OVERVIEW OF DIGITAL FORENSICS
In order for the investigative evidence to be upheld in court as ‘best evidence’, methodologies and technologies have become developed for investigators to adhere to, in order that the evidence can satisfy the strict scrutiny of evidence as mandated by court rules. As time has progressed from the 1980s, data is now extracted from numerous devices, such as; computers, computer networks, offsite data storage networks, data cloud storage, cell phones, digital pads and tablets, loose media storage devices (thumb drives, diskettes, CD-ROMs, DVDs, etc.), automobiles, surveillance cameras, the Internet of Things (IoT) such as Echo and Alexa and other devices, drones, and many other devices that can store electronic data. Therefore, the term ‘Computer Forensics’ is now referred to as ‘Digital Forensics’.
SEXUALLY VIOLENT PREDATOR LAWS
An SVP risk assessment has several components and areas that are carefully evaluated by the forensic expert. Studies have demonstrated that relying solely on the predictions of mental health professionals alone is less accurate than utilizing a more precise and sound approach, often referred to as an “adjusted actuarial approach” to evaluating the risk of recidivism of sexual offenders.
