Verified Document

Computer-Based Crime Research Paper

Computer-Based Crime The illegal site I reviewed for this assignment is www.howtogrowmarijuana.com. This site covers virtually all aspects of marijuana growing -- which is an illegal activity because marijuana is widely outlawed in the United States. However, there are some states in which individuals can legally consume marijuana for medicinal purposes. In these states and others there exists the potential for businesses to legally supply this substance to people.

There is a large degree of transparency in this particular web site. It was the first result to appear with a Yahoo search for "How to grow marijuana." As the tile of the site suggests, it discusses many different facets of growing marijuana and stratifies this process according to location (indoor or outdoors), various strains of marijuana including seeds (No author, 2014), irrigation and growth systems involving hydroponics, and other germane equipment types such as the expensive lights used to assist marijuana growth. There are also a host of other valuable resources such as links to additional sites that provide information about marijuana growing and its paraphernalia. Additional topics covered including growing this plant in boxes and in tents, while there is also a community forum with which visitors can interact with one another and obtain further information. This site is extremely open and transparent. In addition to getting good results from search engines, it also leverages videos from Youtube and sells books and other resources related to growing marijuana. It is not attempting to hide any aspect of its business.

It is difficult to pinpoint what exactly should be done about this site for the simple fact that there are some states in which people can legally grow this substance for medical purposes. Therefore, sites such as...

Nonetheless, the site is accessible to people in locations in which medical marijuana is not legalized, and they can still view it and utilize the information contained within it for illegal purposes. Subsequently, the ideal solution to this quandary is that those in states without legalized medical marijuana should be punished for visiting it by the Drug Enforcement Agency and the National Security Association, especially since the latter has access to data from internet users (Faris, 2013).
Part II

The legitimate site that I have chosen to explore for this assignment is Craigslist. This is a very popular and widely used site for a variety of purposes. Essentially, Craigslist functions as a medium to bring people together to effectively broker different transactions. The way the site works is people who are looking for someone else to provide a product or a service post advertisements for the specific things they are looking for. People who are seeking opportunities to supply goods or services can visit this site and respond to advertisements, and then discuss the process of assenting with the desires of the first party in a way that is mutually beneficial to both people. Legitimately, Craigslist is used for a variety of purposes such as the buying and selling of cars, the purchasing and renting of property, as well as the hiring of individuals to work for jobs. There are even personal ads on Craigslist where people can legitimately find mates, friends, or people to fulfill other roles in their lives.

Nonetheless, it is valuable to realize that nearly all of the important legitimate uses of Craigslist have the potential to be exploited by criminals for illicit purposes. Like many other applications of the internet, there always exists the potential for misrepresentation and fraudulent behavior -- either on the part of the person posting the ad or on the part of the person responding to it. In most of the egregious cases in which Craigslist…

Sources used in this document:
References

Faris, S. (2013). Have the NSA leaks compromised Big Data's future? www.dataversity.net Retrieved from http://www.dataversity.net/page/2/?s=stephanie+faris

No author. (2014). Marijuana seed strains review. www.howtogrowmarijuana.com Retrieved from http://howtogrowmarijuana.com/all-marijuana-strains.html

Romero, R. (2011). Craigslist illegal drug trade exposed. www.abc7.com

Retrieved from http://abc7.com/archive/8132665/
Cite this Document:
Copy Bibliography Citation

Related Documents

22 Federal and State Law Enforcements Role to Enforce Computer-Based...
Words: 1162 Length: 3 Document Type: Term Paper

Law Enforcement and Computer-Based Crime Before beginning any discussion regarding the consequences of employee monitoring, it is crucial to first develop a working knowledge of precisely what this blanket term actually entails. Simply put, employee monitoring is deliberate surveillance by an employer which is used to track various behaviors, such as a worker's visitation rate to certain websites, as well as to transcribe and archive written correspondence in the form of

Forensic Tools Computer-Based Forensics Tools
Words: 605 Length: 2 Document Type: Thesis

It is thus that technologies which work to yield that crucial data from the memory store of any such device have become so valuable to law enforcement in the age of terrorism. According to the Computer Forensics Tool Testing Program (CFTT), "a cellular forensic tool shall have the ability to logically acquire all application supported data elements present in internal memory without modification" (Ayers, 15) This is to indicate that

Computer Hacking, Electronic Surveillance and the Movie
Words: 1042 Length: 3 Document Type: Term Paper

Computer Hacking, Electronic Surveillance and the Movie Sneakers Sneakers Sneakers (1992), directed by Phil Alden Robinson, begins in December of 1969 as college students Martin Brice and his friend Cosmo are hacking into government and other computer networks and manipulating financial accounts by transferring funds from the Republican National Committee to the Black Panther Party and so forth as what is later termed a "prank." When Brice leaves to get a pizza

Computer Security Information in the 21st Century,
Words: 599 Length: 2 Document Type: Essay

Computer Security Information In the 21st century, information is the key to almost every organization's success. Data is the lifeblood of business -- the information one uses to be competitive and the information that spells success or failure in the marketplace. Data is so important that an entirely new security focus has arisen -- Computer Information Security. In an era in which we must choose which issues for focus, the issue

Computer Crimes Cyberspace Has Now
Words: 1811 Length: 4 Document Type: Essay

Cyber crime exerts threats to individuals, organizations & countries across the world. From the above provided descriptions it is comprehended that the computer crime is a serious crime that necessitates immediate attention of the law and of the law enforcement agencies. 0. There prevails no solution except to take strict measures to deal with cyber crimes against the speedy expansion of the communications & information technology and telecommunications networks. References Areheart,

Computer Law
Words: 1015 Length: 3 Document Type: Term Paper

Computer Fraud and Abuse Act was enacted into law in 1986 to deal with the hacking of computer systems operated by the American government and certain financial institutions. Through its enactment, the legislation made it a federal offense to access a protected computer without authorization or to an extent that is beyond the authorized access. However, since it was passed into law, the act has been amended severally in attempts

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now