Retrieved from https://studentshare.org/information-technology/1410261-case-study-pedophilia-and-credit-card-fraud-in-the-internet
https://studentshare.org/information-technology/1410261-case-study-pedophilia-and-credit-card-fraud-in-the-internet.
This paper examines the case of Mr. X, a suspected pedophile also believed to be engaged in credit card fraud to perpetuate his activities related to pedophilia in the internet. The objective of this paper is to draw out a plan to investigate and finally find proof of Mr. X’s pedophile activities in the internet where he is believed to be enticing children through trough online chatting, email and text messaging. The details of the proposed investigation on Mr. X’s activities are laid down in the following paragraphs.
II Sting Operation to Catch Mr. X in the Act of Pedophilia The end goal of the operation is to arrest Mr. X, which implies that evidence, admissible in court, against him must be collected. To make this possible, a sting operation must be conducted to catch Mr. X in flagrante so an arrest could be made and a case filed in court against him. A similar operation was conducted in the case of State v Heitman 262 Neb 185, 629 NW 2d 542 (2001), where a police detective pretended to be a 14 year old girl and communicated with the defendant through email messages.
The sting operation was an offshoot of an incident where the 53 year old defendant handed an envelope containing money, condoms and a letter to a 14-year old girl working in a Bronco’s restaurant. The detective handling the case pretended to be the Bronco restaurant worker. A series of email communication was exchanged between him and the defendant culminating to an arranged tryst in a motel. The defendant was subsequently arrested in the motel where he was found to have brought Viagra, condoms, lubricants, vibrators, sex videotapes and other related paraphernalia.
Under Nebraskan law, it is unlawful for a person 19 years old or older to sexually penetrate a person who is less than 16 years of age. The offence is classified as sexual assault in the first degree. In communicating with the suspect, it is important not to fall into the trap of inducement, which could be used as a defence in court. It is important therefore, that any suggestion of sexual congress must be initiated by him. In the aforecited case, the court rejected the defence of inducement, which contemplates not only giving the defendant opportunity to commit the crime but also effectively put excessive pressure on him to commit it.
It was established that the defendant was predisposed to commit the crime charged against him. III Credit Card Fraud/Theft Identity To verify the suspected credit card fraud, Mr. X’s activities in the internet must be examined. First, Mr. X’s ISP should be determined, which can be discovered from his activities in the internet, such as email messages, for example. His ISP can either be requested to cooperate or if not, forced to cooperate through a court order. A trap-and-trace device, such as the Carnivore system, known as DCS1000, can then be installed in the ISP to intercept and sift through communication messages involving Mr.
X, which are relevant to the investigation. The kind
...Download file to see next pages Read More