Preview

Law Enforcement Challenges: Cyber Stalking And Obscenity

Satisfactory Essays
Open Document
Open Document
538 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Law Enforcement Challenges: Cyber Stalking And Obscenity
|

Law Enforcement Challenges | [Type the document subtitle] | | Law Enforcement Challenges | | Cheryl TraceyProfessor Gregory BlancheCIS 170 Information Technology in Criminal Justice | 11/26/2012 | |

There are many challenges law enforcement agencies face when investigating internet exploitation, cyber stalking, and obscenity. Few challenges include overlapping effort, lack of funding, overlapping jurisdictions, and priority. The purpose of this paper is to explain in detail the greatest challenge law enforcement agencies investigating exploitation, cyber stalking, and obscenity, the specific challenges with overlapping of jurisdictions and solutions for overcoming these challenges, and to discuss if states should have the ability to work with one another when a cyber- crime is carried out across state lines.
…show more content…
“Data on the computer can be deleted, modified, or destroyed.”(Taylor, Fritsch, Liederbach, Holt, 2012). It is very important for evidence to be collected, preserved, and examined right away. In most cases, 24 hours proves to be too late to recover non-tampered evidence. “Some computers have automatic wiping programs in case a new person touches the wrong key on the keyboard.” (http://www.supremecourt.gov.pk/ijc/Articles/10/2.pdf). Cyber forensics experts requires special tools which will be able to access any data available on the mass storage media including deleted files and data in unallocated disk areas. Although time is of the essence, it is very important that law enforcement agencies follow the search and seizures laws. A warrant must be issued first before any evidence can be gathered, searched, or

You May Also Find These Documents Helpful

  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This article is about the interviewing of young victims of cyber abuse by law enforcement and legal personnel. I found the article to be somewhat brief, but it is valuable as it is dense with information on the psychological side of “how” and “why” children and adolescents fall victim to internet predators. I liked this particular article because it differed from many other articles in that it explained the importance of how an interview should be conducted, and in explaining that importance it helps the reader grasp a better understanding of the psychological impact of the victims. I believe the psychological awareness and facts…

    • 1379 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Cj 216 Uncle Bob Assignment

    • 2545 Words
    • 11 Pages

    References: Dempsey, J. X. (n.d.). Overview of Current Criminal Justice Information Systems. Retrieved from http://www.cdt.org…

    • 2545 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Ethics Of Dumpster Diving

    • 396 Words
    • 2 Pages

    Based on the nature of the disposal, a computer hacker may acquire an array of details and information from improperly disposed materials and equipment, such as electronic equipment and computers. For example, if a computer is not properly wiped and securely disposed of, computer hackers who obtain such may be able to recover any and/or all data…

    • 396 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The advancement of technology is affecting everyone in their everyday lives whether we want to accept it or not. The criminal justice system is no stranger to this; it has created more work for them and in order for them to keep pace with criminals they have to continue to evolve and stay current with the progress of technology. Technology changes from one day to the next and in order to fight and prevent crime the criminal justice system must stay current with the many changes of…

    • 849 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computers, Technology and Criminal Justice Information Systems, Kaplan University Unit 6 Project. Professor Erik Bernoldt What is crime analysis anyway? Crime analysis is a systematic process of collecting, categorizing, analyzing, and disseminating timely, accurate, and useful information that describes crime pattern, crime trends, and potential suspects. Computers, Technology and Criminal Justice Information Systems Professor Erik Bernholdt Unit 6- Technology and Crime Analysis By: Sierra Spangenberg What is crime analysis anyway?…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bohm, R. and Haley, K. (2008). _Introduction to Criminal Justice, 5th ed, New York, NY, McGraw-Hill, retrieved on 10/18/2009._…

    • 548 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Many states have adopted sexual predator statutes which provide for incarceration, institutionalization, treatment, and registration for individuals convicted of specific sex crimes (Roberson and Wallace, 2008). The need for convicting sexual predators has become a top priority for lawmakers across the nation as society has determined that sexually related offenses are deviant behavior and simply will not be tolerated. Sexually related offenses such as rape, child molestation, and pedophilia are considered to be especially heinous offenses and tend to bring about disgust and rage from within our society. In response to such offenses, lawmakers across the nation, along with the assistance of law enforcement and its citizens, have made life very uncomfortable for sexual predators. Specifically, lawmakers have created new laws which restrict the freedoms of sexual predators and that inflict harsher punishments for those convicted of sex crimes.…

    • 1241 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The Internet has taken a number of society’s problems and vices, and exacerbated them. This paper will touch upon one of those vices, the sexual solicitation of children. The Internet has provided convicted sex offenders with virtually unfettered access to society’s most vulnerable victims. No longer are convicted sex offenders relegated to stalking their victims at places that youths tend to physically congregate, such as the local malls and movie theatres; they now have the advantage of preying on their victims in relative anonymity from the comfort of their own homes. At the click of a mouse they can access networks of millions of unsuspecting children. They stalk their victims with methodic…

    • 4547 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Persuasive

    • 1443 Words
    • 4 Pages

    D. We will first explore Omaha’s problem of having no laws to regulate sex offenders’ social media usage, and then look at the causes of this problem, and finally investigate a solution to end it.…

    • 1443 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Online Sexual Predators

    • 3367 Words
    • 14 Pages

    2. Faulkner, Nancy. "The Internet Online Summit: Focus on Children." Brief Overview of Pedophiles on the Web. 1 Dec. 1997. 28 May 2008 .…

    • 3367 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Smith, M. S. (2001). Internet - Protecting Children from Unsuitable Material and Sexual Predators: Overview and Pending Legislation: RS20036. Congressional Research Service: Report, 1.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Decker, Scott H. and Barlow, Hugh D. (2010). Criminology and Public Policy: Putting Theory to…

    • 704 Words
    • 3 Pages
    Good Essays