Preview

Cybercrime Case Study Paper

Better Essays
Open Document
Open Document
1122 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybercrime Case Study Paper
Cybercrime Case Study Paper

The Fourth Amendment can be applied to the Internet, computer, and cybercrimes, but it must be done very carefully. The protections that are granted by the Fourth Amendment should depend on the data. If the data is content, which means any kind of communications such as email, or any remotely stored files on a computer system, then the information is protected by the Fourth Amendment. However, if the data is non-content information, such as IP address and email addresses then those are not guaranteed to be protected by the Fourth Amendment. In 2012, a federal judge ruled that the computer of an individual is not protected by the rights granted under the Fifth Amendment. Many times cybercriminals will claim that their Fourth and Fifth Amendment rights were violated when investigators conducted the initial or follow-up investigations. One such situation is the court case United States of America v. Richard D. King, Jr. which was argued in the Third Judicial Circuit in 2009. In this case the defendant argued that his Fourth and Fifth Amendment rights were violated when the investigators served an arrest warrant for an accomplice at his residence.
According to court documents and the case files, "In August 2003, King was using the screen name 'ayoungbeaverluvr' when he met Angela Larkin on a website called 'CherryPoppinDaddys.'" The two exchanged emails and chat message in reference to Larkin's two year old daughter being the subject of child pornography and sexual acts against a child. Larkin sent King nude images of her daughter, whom she called "Peanut", when she left her husband with her daughter, the only other thing she took with her was her computer. King offered to have Larkin live with him and when she agreed he drove over 200 miles to pick the two up from their location. When authorities in Texas found images of "Peanut" on the computer system of a suspect in their jurisdiction, they noticed the Pennsylvania location



References: Kerr, O. (2010, August). Applying the Fourth Amendment to the Internet: A General Approach . Stanford Law Review, (), . Retrieved from http://legalworkshop.org/2010/08/12/applying-the-fourth-amendment-to-the-internet-a-general-approach Reilly, A. (2012, February). Digital Privacy and the Fifth Amendment. Technorati, (), . Retrieved from http://technorati.com/technology/article/digital-privacy-and-the-fifth-amendment/ University of Phoenix. (2009). United States of America v. Richard D. King, Jr.. Retrieved from University of Phoenix, BCC 402 website.

You May Also Find These Documents Helpful

  • Good Essays

    a. Arizona v. R. Joseph Gant, Supreme Court of the United States, 2009 (April 21, 2009)…

    • 671 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In this examination of United States v. Warshak 631 F.3d 266 (6th Cir. 2010), the primary focus will be on the constitutional issues regarding this case. First, an analysis of the defendant’s expectation of privacy, regarding e-mail communication. Next, an examination of the government argument concerning the potential invasion of the defendant’s Fourth Amendment right to privacy. Finally, an analysis of the case’s conclusion, and how the Stored Communication Act factored into the constitutionality of more than 27,000 items of e-mail evidence.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Binks Vs Mckay Case Study

    • 501 Words
    • 3 Pages

    On May 12, 2016 the court case Binks/McKay vs the United States challenged the idea of the Fourth Amendment. The case explains the situation between Binks and McKay, who claimed that the FBI violated their Fourth amendment rights when the FBI searched through their Facebook messages after being suspected of being terrorists. This occured when Binks and McKay were discovered to have been communicating with a supposed ISIS member. They had claimed to have no intentions of joining the terrorist group. In this case, Sam and Melanie (petitioners) reminded us that a warrant and reason for searching is a necessity when it comes to violating one’s right to privacy. However, court justices Danny and Nick both asked similarly: “Why do you think that violates their privacy?…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    “The Fourth Amendment provides the people of the United States, the right to be secure in their persons, houses, papers, and effects. Against unreasonable searches, and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons and things to be seized” (U.S Constitutional Amendments, 1972). The design of this Amendment is to create a type of barrier in order to protect individual rights to privacy, also preventing illegal search, and seizure of personal property. These search warrants are in…

    • 1424 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Our forefathers with great fortitude put together a document that would be forever known as the constitution. This document addressed the rights of the citizens of the newly formed states. One amendment has been a focal point of discussion in recent weeks with the leakage of NSA protocol. The fourth amendment states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place…

    • 2530 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    People charged with violations of the Patriot Act that involve internet users have had their Fourth Amendment rights violated by secret searches which is the government’s ability to search private property without notice to the owner and by trap and trace searches which collects addressing information about the origin and destination of communications not just the content. By the government using the secret searches they are able to find information that is not always available on the internet or outside of your computer or your home.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This comment analyzes the history of the Fourth Amendment and the evolution of the private search doctrine. Specifically, it takes the reader through a history of the Fourth Amendment and the inception of the private search doctrine into how the Fourth Amendment is being upheld in today’s technology-driven world. In detail, this comment seeks to expand upon the defendant’s home presumption argument that the Sixth Circuit in United States v. Lichtenberger did not address.…

    • 74 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    "Florida v. Jardines." Oyez itt chicago-kent college of law. N.p., n.d. Web. 23 Mar. 2017.…

    • 561 Words
    • 3 Pages
    Good Essays
  • Good Essays

    An example of when knowledge of the 4th Amendment must be applied to a crime scene is when warrantless searches were or will be made. The evidence collected through warrantless searches can be deemed inadmissible in court.…

    • 511 Words
    • 3 Pages
    Good Essays
  • Better Essays

    “The Fourth Amendment explicitly affirms the ‘right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.’ The Fifth Amendment, in its Self-Incrimination Clause, enables the citizen to create a zone of privacy which government may not force him to surrender to his detriment. The Ninth Amendment provides: ‘The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the…

    • 1390 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Fourth Amendment Essay

    • 889 Words
    • 4 Pages

    In 1928, Justice Louis Brandeis wrote in his dissenting opinion “the greatest dangers to liberty lurk in the insidious encroachment by men of zeal, well meaning but without understanding”. The men of zeal, described by Brandeis, were police officers trying to enforce the Prohibition Act. He would never have been able to fathom the modern men of zeal fighting the “War on Terror”. The modern era has carried questions of how far the Fourth Amendment and the right to privacy should and does extend to protect the rights of the individual. With advancing technology, there are more legal lines to be drawn in the sphere of privacy as well as determining how far the Fourth Amendment extends. Some of these topics include government watch lists, mass…

    • 889 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The Fourth Amendment

    • 1648 Words
    • 7 Pages

    As the United States formed as a republic its need to form laws to protect its people became an evident need. Along with the powers to be at control of these laws, there were also limitations on what the government could and could not do to protect the people from the government as well. One of these controlling factors is the Fourth Amendment, which protects our citizens and visitors from an array of items. A few in particular would be; right to privacy, search, and seizure. The Fourth Amendment also sets the tone for how arrests are affected and how reasonableness is weighed on heavily.…

    • 1648 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    On the 23rd day of November at the Auditorium of Nueva Ecija University of Science and Technology Main Campus Sumacab Este, Cabanatuan City, 4th year students of College of Information and Communication Technology held a seminar about Cyber Crime Law and Ethics for IT Professionals. At 12:00 o'clock noon, I and my classmates were met at the gate of the school. When they come all, simultaneously we went to the auditorium and sat in our seats. When the time comes where we start the seminar, Ma’am Ruth thought us a very simple action song. And after that Ma’am Ruth called Ma’am Gloria Alcantara to introduce our first speaker at our seminar. Our Speaker is also a product of our school Nueva Ecija University of Science and Technology, he was an Engineering student in their time, in his college life he received many awards, he is also a product of Nueva Ecija High School and as expected he received many awards like his college life. After he graduated in our School at he decide to be a Law Students At Aurollio University after that as expected he passed the bar examination, he was the legal consultant of Municipality of Laur and Municipalty of Gen. Natividad Nueva Ecija.His name is Engr. Atty. Bembol D. Castillo. Atty Bembol asked us many questions like “ Pagkatapos nyo makagradute Saan Kayo pupunta? “ and also he joked us and he said “ Magiging manager po ako ng computer shop”. Many of us laughed when he said that, Then he still have many question to us, he told us “ bkit Kayo nag IT bkit hindi nursing,?”. He also asked us “ Sino gusto magturo? Sino gusto maging Teacher?. And lots of questions to follow. Atty Bembol also tells story about his life after he graduated in NUEST.after all of this question he start to discuss our…

    • 1857 Words
    • 8 Pages
    Good Essays