This is why computer evidence -- such as the email itself -- cannot outweigh the underlying crime. What is being investigated is a threat against human life.
While investigating this threatening email and Westfall (the main suspect), it is important for the investigator to heed the law; suspects still have all the legal rights and protections afforded them per the United States Constitution (Reyes & Brittson 2007). "Reading emails, intercepting communication, searching and copying computer data may land you in hot water if you do not have the proper permissions, or authority to do so" (2007). All investigations including computer crimes must follow certain forensic procedures in order for evidence to be admissible as well as to avoid civil and criminal liability. The Fourth Amendment, Electronic Communications Privacy Act (18 U.S.C. § 2501 et seq.), Electronic Communications Privacy Act (18 U.S.C. § 2701 et seq.), Pen Register and Trap and Trace Statute (18 U.S.C. § 3121 et seq.), Title III Wiretaps, and applicable state laws must all be considered (Gonzales et al., 2007).
Speaking to Westfall, the suspected sender, may have some negative ramifications. For one, it may give time to clean the computer and rid it of some evidence. If there was a legal challenge posed, there are several ways an interview could go. Westfall may be willing to cooperate with law enforcement or he may attain a lawyer, which in that case, the ways in which the investigator obtained information may come into question. If Mr. Westfall does not allow a search of his home and computer willfully, then it may be necessary to obtain a search warrant so that an investigation of Westfall's home and computer will be done to find further evidence. The search warrant needs to outline what criminal offense is being investigated (in this case email threats), where or what will be searched, what is expected to be found there, why...
data collection includes survey form, structured interviews using closed ended questions, and gathering information regarding a sample size appropriate to analyze and draw conclusion on the basis of the research results. The statistical techniques are used for data analysis to analyze collected data in quantitative research methods. The qualitative data is gathered through case study method and open ended question of an unstructured interview from notable sample. The qualitative
In this regard, Lott points out, "Between 70% and 80% of police departments explicitly use norming of physical standards in their hiring practices. However, most of the departments that use objective standards do not enforce these rules. Women who fail to meet the absolute standards during academy training are unlikely to be failed out of the program" (p. 276). This lack of consistency in how these standards are applied
Social Media and Law Enforcement Social Media Issues in law Enforcement Social media and law enforcement: Boon or bane? Social media is a fact of everyday modern life. For law enforcement personnel, it has created new opportunities to share resources with the public, including as 'tweeting' information about a possible suspect or releasing safety information to the public about terrorist incidents or natural disasters. At first, in the Internet age, police departments were
Communication in the criminal justice system The process of communication entails the passage of information between individuals. This flow of communication, however, has its principles. The principles include the need of effective channel of communication, message, and the sender. It is also vital for receivers to comprehend the message. In organizations, communication takes a formal and informal approach. Formal approaches to communication in organizations include the use of business memos,
Law comm. tech Innovations in Database Communication Technologies for Law Enforcement The proliferation of computer, digital and web technology have all had a significant impact on how civil and public administration functions are performed. The ability to engage in real-time communication through an array of media, the opportunity to access enormous databases of information from the field and the capacity to capture sound, video, photo and other data all have enhanced productivity,
Another option could be fro Bug to use a defense of proximate cause which states that for a negligent act or omission to be a proximate cause of damage, it must be a natural and probable (not just possible) result of a sequence unbroken by any intervening causes. 6. [See situations b. And c. For background information.] The attorneys for BUG have completed their investigation of WIRETAP and its employee,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now