Computer Crime and the Role of Prosecutor
Cybercrimes are some of the most advanced types of criminal activities currently in the world, this is so because, the criminal conducts the offense virtually thus making it hard for him or her to be easily traced. The two possible methods which can be used to investigate cybercrime are: through identifying any potential digital evidence, and the other one would be finding roper ways of working with different types of digital evidence (Shavers, 2012). Digital evidence include emails and the social media. Moreover, the situation should be assessed in order to determine the specifics of the cybercrime which has been committed, and whether the law in the given jurisdiction sustained whether guilt is proven or not. The initial investigation concerning the IP address, who, where, why and when the crime was conducted helps in identifying the criminal.
The best method of encryption which can be used by is using an anti-virus program. An anti-virus is very effective, since it prevents the access of information through malicious ways or through spoofing. This therefore ensures that the company conducts its operations at ease without any problems at all (Shavers, 2012).
The significance of the prosecutor carrying the burden of proof and evidence is because the prosecutor is responsible for the provision of evidence, and factual information, thus proving that the defendant is guilty. The prosecutor has to establish this, before the jury convicts the defendant. It is therefore the role of the prosecutor to convince the jury, that the defendant is guilty without any doubts. The prosecutor’s responsibility is to make sure that the defendant is guilty, and so he must be able to provide enough evidence against the defendant (Scheb & Scheb, 2011). Moreover, the prosecutor must convince both the judge and the jury the precise reasons as to why the defendant is guilty, also providing the reasons as to how and why the perpetrator committed the crime. If the prosecutor does not have concrete reasons as to why the defendant committed the act, the case would not go any further.
Reference
Shavers, B. (2012). Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard. Burlington: Elsevier Science.
Scheb, J. M., & Scheb, J. M. (2011). Criminal law and procedure. Belmont, CA: Wadsworth Cengage Learning.