Computer Essay

544 words - 3 pages

Running head: COMPUTER CRIME 1

Computer Crime and the 4th Amendment
ITT Technical Institute

COMPUTER CRIME 2

The case law that would allow me to search the office computer of Jacob Myers would be the 4th Amendment law and also The Wire and Electronic Communications Interception and Interception of Oral Communications Act. Under the 4th Amendment to do a search and seizure you need to have probable cause. Under The Wire and Electronic Communications Interception and Interception of Oral Communications Act it typically requires a court order issued by a judge who must decide that there is probable cause to believe that a crime has been, is being or is about to be committed.
In this case we do have probable cause because the victim, Cynthia Simmons had to countless number of times change her email, IM, ...view middle of the document...

In this case the suspect’s supervisor Michael Henderson has consented to employing only surveillance on the internet usage of the suspect and the law that supports that is the third party consent. In a third party consent an officer can search a suspect’s information, computer, etc if the third party has sufficient legal authority over the place or thing they want to search.
COMPUTER CRIME 3
The research that supports the investigation technique used to trace the instant message communication comes from Jessica Reust (2006), a Digital Forensic Examiner and Investigator. In her case the suspect was accused of raping the defendant, but the suspect claimed that he consenting sex with defendant because they spoke earlier on IM and the victim invited him over. But the victim’s boyfriend claims he was having an IM conversation with the victim shortly before she was raped. The victim did claim knowledge of having the suspects IM name in her Buddy List.
The forensic examiner presented evidence relating to the use of AIM, including the presence of the defendant’s AIM profile and personalized away messages on the complainant’s computer, and the presence of each party’s AIM screen names in close proximity with the phrase ‘‘recent IM Screen Names’’ on the defendant’s computer, which is indicative of an AIM conversation having occurred. The forensic examiner concluded that there was evidence of AIM communications between the AIM screen name used by the defendant and the AIM screen name used by the complainant. In the end the suspect was acquitted of the rape charges. (Reust, 2006)

COMPUTER CRIME 4
References
http://www.strozfriedberg.com/files/Publication/87a719ee-2cfd-47ee-b91a-454146ccd4ca/Presentation/PublicationAttachment/f9e76600-1f02-4b87-b5d4-2646988cad97/ReustAolArticle.pdf
http://www.ncsl.org/default.aspx?tabid=13492
http://www.lectlaw.com/def/f081.htm

Other Papers Like Computer

Computer Since Essay

1049 words - 5 pages بسم الله الرحمن الرحيم Computer Science Made by: Ahad Mohammad Aljebreen Directed by: Dr. Maram Computer science Computer science is the scientific and practical approach to computation and its applications. It is the systematic study of the feasibility, structure, expression, and mechanization of the methodical procedures (or algorithms) that underlie the acquisition, representation, processing, storage, communication of

Computer Radiation Essay

2008 words - 9 pages this topic is to stress out the hazardous effects of computer radiation.Long-term exposure to radiation increases the risk of all forms of cancer, tumors, blood disorders, miscarriage, headaches, insomnia, anxiety, aging of the skin, skin burn, etc. Radiation exposure over time can cause skin burn, dry wrinkled skin and photo aging. This skin damage is identical to sun damage and causes the same health problems. Many electronic

Computer Viruses

1323 words - 6 pages A plethora of negative magazine articles and books have catalyzed a new kind of hypochondria among computer users: an unreasonable fear of computer viruses. This hypochondria is possible because a) computers are very complex machines which will often behave in ways which are not obvious to the average user, and b) computer viruses are still extremely rare. Thus, most computer users have never experienced a computer virus attack. Their only

Computer Crime

1185 words - 5 pages Formatting Problems In today's society our most valuable commodity is not grain, steel or even technology; it is information. Because of computer networks, just about everyone can now access an astounding range of information. The Internet is international, even though 80 percent of the Internet use occurs in the United States, and a staggering amount of information on every subject imaginable is available for free. Because so many people now

Computer Programming

3400 words - 14 pages THE INTEGRATION OF BASIC COMPUTER PROGRAMMING IN 5TH & 6TH GRADE OF SILLIMAN UNIVERSITY Management 35: Business Research 1st Semester School Year 2014-2015 TABLE OF CONTENTS Title Page Table of Contents Lists of Charts Lists of Tables CHAPTER 1 THE PROBLEM AND ITS SCOPE Introduction Theoretical Background: I. It will promote computer literacy. A. Computer literacy definition 1. Dictionary definition 2

Computer Forensics

4003 words - 17 pages International Journal of Digital Evidence Fall 2007, Volume 6, Issue 2 Computer Forensic Analysis in a Virtual Environment Derek Bem Ewa Huebner University of Western Sydney, Australia Abstract In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and software tools are presented and discussed. Further we identify the

Computer Crimes

1006 words - 5 pages everyday life, with the widespread use of computers comes one more way we can be victimized by criminals. Computer crimes are usually done by someone with a high level of technical expertise, also known as a hacker. Most people imagine a “hacker” as an anonymous cyber-intruder who spends an enormous amount of time trying to breach a security of networks, web servers and email servers. But half of the unauthorized system intrusions involve insiders

Computer Technology

924 words - 4 pages Computer technology started in the 1940's, yet during this time they were the size of a modern house and could cost as much as a battleship (Encarta Encyclopedia). Then in 1977, Apple was the first company to develop the personal computer, which was small enough to fit on a desk. Finally in the last twenty years computing power doubles every eighteen months due to faster processors, which enable computers to do billions of calculations per

Computer Differences

883 words - 4 pages 9/29/2014 Difference Between Computer and Calculator Difference Between ● ● ● ● ● ● AA HOME VACANCIES SUBMIT ARTICLE ABOUT CONTACT US Search... and Search... GO Technology Science & Nature Public People Life Style Language Health Education Countries Business Automobile Search Home > Technology > Electronics > Computers > Computer and Calculator Compared Subscribe Posts

Computer Maintenance

4510 words - 19 pages Computer Maintenance Manual IT/280 February 17th, 2013 Computer Maintenance Manual The following document is a computer maintenance and training manual designed for the new IT employees. This manual covers safety concerns, maintenance and cleaning of a computer, internal hardware installation and maintenance, basic principles for supporting I/O devices, and multimedia and mass storage devices. For any corporation there are many

"Computer Networking"

926 words - 4 pages There are many different kinds of networks, however this paper will be about networking computers. As we move further and further into the paperless society, the need for people to be connected and able to exchange data just as fast as they could by handing a paper to someone increases. This can be accomplished by having a group of computers connected by a network, so that as soon as data is entered into one computer, it can be immediately

Related Essays

Computer Essay

2841 words - 12 pages fy I. Discussions: A. (introduction) What is a Computer? B. History of computers C. (thesis) Types of computer 4.1 Supercomputer 4.2 Mainframe 4.3 Workstation 4.4 The Personal Computer or PC 4.5 Microcontroller 4.6 Server D. Hardware & software 5.7 hardware 5.8 software 5.9 firmware E. Basic operations 6.10 input 6.11 output 6.12

Computer Essay

390 words - 2 pages Q1 answer: A: A Database Management System (DBMS) is a software package with computer programs that control the creation, maintenance and the use of a database. It allows organizations to conveniently develop databases for various applications by database administrators (DBAs) and other specialists. A database is an integrated collection of data records, files and other database objects needed by an application. A DBMS allows different user

Computer Crimes Essay

819 words - 4 pages Computer Crimes Andy Berg Professor Gregorio Chavarria CIS Information Technology and Crime 15 January 2012 Defining computer crime effectively is a daunting and difficult task. Nevertheless there are four general categories of criminal crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor

Computer Addiction Essay

1003 words - 5 pages Chapter II History of Computer Addiction Computer addiction was noticed in 1973 in some people.The addiction is a mental illness which causes the excessive use of computers to the extent of it interfering with daily life. Its excessive use may also explain problems in social interaction, personality, mood, work ethic and relationships. Effects of Computer Addiction to Students Computer addiction can have a variety of negative effects on a