Verified Document

Polygamy In Human Trafficking Research Paper

What questions should you ask the woman to assist you with your investigations?
1. Do you have a good relationship with your husband? Are you in talking terms as of this moment?

2. Is the laptop in your possession right now? If not, where is it?

3. What is the location of your husband as of this moment? Does he know where you are right now?

4. Before you saw what you saw last night, do you, as his partner, have any reason to suspect that he has been viewing the same kind of content for a while?

What do you need legally to seize that laptop?

For one to be successfully prosecuted of the crime of child pornography, he or she must have knowingly received, distributed or possessed child pornography. So there must be intent on his or her part. In case a person, such as the complainant’s husband, just happened to have stumbled upon the content the wife allegedly caught him watching, he cannot be prosecuted and convicted for the crime of child pornography. However, in case a person is caught with hundreds or thousands of child pornography videos or images on his computer, the intent becomes pretty obvious and the prosecution of the case becomes straightforward (Bector, 2009; Milivojevic, Pickering & Segrave, 2017). For this reason, investigators usually seize computers and computer components owned by suspects to find clues and evidence as to whether they were intentionally and knowingly participating in, distributing, or consuming child pornography.

Some of the computers and computer components that are usually seized by investigators include laptops, CPUs, external data storage devices, hard disks, event logs, buddy lists, chat logs, internet browsing history, financial information, databases, emails and related attachments, image files, video files, documents, software, and hardware (Moore, 2014). So in the case of the complainant’s husband, his laptop ought to be seized to find out if there is evidence of intent on it.

Besides his laptop, connected and networked devices should also be seized or looked into to also gather evidence for prosecution. Connected/ networked devices include routers, switches, hubs, printers, and so on. The evidence that can be gathered from such devices include data, buddy lists, chat logs, event logs, log files, internet browsing history, financial information, databases, emails, attachments, image files, video files, and software. Other evidence that may also be collected from such devices includes the NIC (network interface card) address, the MAC (media access card) address, broadcast settings, IP (Internet Protocol) address, and the LAN (Local area network) address. These pieces of information are considered identifying information and can be utilized as evidence (Moore, 2014).

To acquire all or most of the above pieces of evidence, there are several methods that could be used. They include:

1. Plain view

If a laptop, a software, a hardware, or a computer is in plain view, there is no need for a warrant for it to be seized. This is the plain view exception. However, once it is seized, it cannot be searched as the plain view exception does not include the authority to search.

2. Consent

The second method to acquire evidence is to ask for consent from its owners. In this case, the complainant and her husband are joint owners of the evidence that needs to be seized. So the laptop can only be seized if both parties give their consent. However, consent cannot just be sought verbally; it needs to be obtained in writing. And the request for it should include words that directly request the seizure and subsequent forensic exam of whatever...…it is key to check if they are readable before removing them.

e. Redundant array of inexpensive disks (RAID): Removing storage disks and acquiring data from them separately may result in confusing or unusable results.

· Make sure that the examiner’s storage device is clean (forensic-wise) before using to acquire data evidence.

In general, as a law enforcement officer, one needs to use maximum caution when seizing digital evidence. Seizing such evidence improperly or poorly handling such evidence could damage or alter the evidence. In other cases, poor handling or seizing of evidence could itself constitute a crime under the 1980 Privacy Protection Act and the 1986 Electronic Communications Privacy Act (Computer Crime and Intellectual Property, 2009; U.S. Department of Justice, n.d). In some cases, before seizing or accessing some digital evidence, law enforcement officers may need to seek extra legal authority. In such cases or in cases where a law enforcement officer is unsure about the law, there is a need to consult with superiors and with the prosecuting attorney. Their guidance will ensure that the officer is within the law and that they have the authority to proceed with the investigations in the manner they wish to proceed.

Additionally, poor handling electronic evidence could damage it as mentioned before. So there is a need to carefully handle the evidence found. Some of the precautions that can be taken to seize, preserve and transport electronic evidence without altering or destroying it include:

· Recognizing, identifying, securing, and seizing all the electronic evidence based on search warrant.

· Carefully documenting the scene and the exact locations where all each evidence was collected.

· Gathering, labelling, and securing the electronic/ digital evidence from destruction.

· Packing the gathered evidence, and transporting it properly to avoid damage or destruction.

Sources used in this document:

References

Bector, S. (2009). Your laptop, please: The search and seizure of electronic devices at the United States border. Berkeley Tech. LJ, 24, 695.

Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.

U.S. Department of Justice Office of Justice Programs, (n.d). Forensic Examination of Digital Evidence: A Guide for Law Enforcement. National Institute of Justice.

U.S. Department of Homeland Security, (n.d). Best Practices for seizing electronic evidence. United States Secrete service.

Computer Crime and Intellectual Property Section Criminal Division, (2009). Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Office of Legal Education Executive Office for United States Attorneys.

Milivojevic, S., Pickering, S., & Segrave, M. (2017). Sex Trafficking and Modern Slavery: The Absence of Evidence. Routledge.


Cite this Document:
Copy Bibliography Citation

Related Documents

Relativism N "Some Moral Minima," Lenn Goodman
Words: 1022 Length: 3 Document Type: Essay

Relativism n "Some Moral Minima," Lenn Goodman argues things simply wrong. Do Goodman ? Using specific examples, explore challenges Goodman presents relativism. Determine universal moral requirements, defend answer. Moral minima: Goodman's arguments against relativism Given the increasing globalization of modern society, combined with the influence of postmodernism, the philosophy of moral relativism has become increasingly popular and accepted within the academy. However, according to Lenn E. Goodman's essay "Some moral minima," some things

Discrimination Agaisnt Women in Morocco
Words: 2199 Length: 7 Document Type: Term Paper

But domestic violence has not been eliminated. Nor have other discriminatory traditions, such as polygamy. "Although the practice of polygamy is declining, it continues to be a threat to women, as it undermines a woman's dignity, perpetuates notions of male dominance, and above all creates domestic environments where women become vulnerable to abuse because they are in the difficult position of agreeing to their husbands' marriage or asking for

Mesoamerica the History of Mexico
Words: 2707 Length: 10 Document Type: Term Paper

Atahuallpa was the ruler when the conquistadors arrived. The Spanish were under the leadership of Francisco Pizarro. There were a total of 168 Europeans in this group, and they challenged an empire of 6 million people. The Indians were puzzled by the importance Europeans placed on gold, but avarice was only one of the compulsions pressing the Spanish onward. The Inca empire was still relatively new in the early sixteenth

Women and Patriarchy
Words: 2880 Length: 10 Document Type: Term Paper

Women and Patriarchy Across the world, the secondary position of women in society remains a virtual constant. This preferential treatment for men is embedded in social and political structures in various countries and societies. This paper examines how patriarchal structures remain in three important social structures - marriage, household and family life, and in the economy. The first part of the paper compares the marriage practices among the Yanomamo Indians in northern Brazil,

How Turkey and Iran Changed Course
Words: 1753 Length: 5 Document Type: Essay

Turkey and Iran In the early 1920s both Turkey and Iran found themselves in an identity crisis. Formerly famous for their respective empires that were now crumbling, they found themselves in need of resurgence after the previous institutions of government had failed them. Mustafa Kemal (1923) or Ataturk, which means father of Turks, and Reza Shah (1925) came to power and contributed to the formation of the modern day national identity.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now