StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations - Essay Example

Cite this document
Summary
This essay describes seizing computers and obtaining electronic evidence in criminal investigations. The law under the Fourth Amendment does not allow law enforcers to access and view information on a personal computer, which is considered personal and private…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
Read Text Preview

Extract of sample "Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations"

Seizing Computers and Obtaining Electronic Evidence in Criminal InvestigationsGiven the nature of digital evidence, officers who execute any search warrant for computer devices can turn the search into a ‘general warrant’. Is this a valid concern? A search is considered as a violation of a person’s privacy. The law under the Fourth Amendment does not allow law enforcers to access and view information in a personal computer, which is considered personal and private. Law enforcers, therefore, have to obtain search warrants in order to search an individual’s computer or devices controlled by the individual.

There have also been concerns over warrantless searches conducted by law enforcers, but in search cases, the court has to certify that the search was necessary. However, it is a valid concern if the officers turn a computer device search into general search. This is because the court issues warrant for a computer search separately from a general warrant. Therefore, it is illegal for law officers to turn the search into general warrant unless they can prove that there was probable cause to warrant the search.

Should judges require law enforcement to forego the plain view exception to the warrant requirement when they are executing search warrants on computer devices?The plain view exception indicates that the search warrant holders should seize evidence in plain view. No warrant is needed to seize evidence that is in view. However, in computer devices this is not applicable. Courts have generally held that law enforcers are entitled to search the entire computer device for evidence in the case of a crime.

The law enforcers are encouraged to look for information in the entire device by reviewing every file in the computer. This is majorly because of the ease with which files in a computer can be camouflaged or hidden in different kinds of names and extensions. Assume that the courts in your jurisdiction are considering requiring a judicially approved ‘search protocol’ before a judge will sign a search warrant authorizing a search of any computer device. Do you support or refute this idea?Law enforcers are allowed to carry out a full search warrant if they arrest an individual as they pursue a lawful arrest.

Computers can be used to manipulate evidence and make it difficult for authorities to obtain the required information to prosecute or find evidence. Even though, law enforcers are allowed to carry out a search warrant, if the courts deem it fit to curtail their mandate they would be forced to oblige, but at the risk of losing vital evidence (Marshall & Baillie 5). If courts restrict searches of computer devices up to the point when a judicial approval is received, suspects can manipulate their devices and do away with what can be incriminating.

By the time the judicial approval is acquired, the criminals shall have absolved themselves from any wrongdoing in connection to what they were being accused of. I, therefore, refute this idea. However, if the judicial approval is needed before a search warrant, then the law enforcers should be allowed to have the devices in their possession to eliminate the risk of the accused tampering with the evidence. That notwithstanding law enforcers should be allowed to conduct searches on computer devices when they see any suspicious activities in the community.

Work citedMarshall H. Jarrett and Baillie W. Michael. Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations: Computer Crime and Intellectual Property Section Criminal Division (Department of Justice). 2009. Online.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Seizing Computers and Obtaining Electronic Evidence in Criminal Essay”, n.d.)
Retrieved from https://studentshare.org/law/1659567-essay
(Seizing Computers and Obtaining Electronic Evidence in Criminal Essay)
https://studentshare.org/law/1659567-essay.
“Seizing Computers and Obtaining Electronic Evidence in Criminal Essay”, n.d. https://studentshare.org/law/1659567-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations

Interpreting Qualitative Data

Interpreting Qualitative Data [Instructor Name] Interpreting Qualitative Data With growing application of qualitative research method, scholars and researchers have come forward to assess the method with its limitations and effectiveness.... hellip; An argument comes in place for qualitative research that it is an approach, which is not specific or objective as like quantitative research, but it is an approach that requires profoundness and high contemplative thinking of the researcher (James, 2012)....
4 Pages (1000 words) Essay

The Role of Computers in Industrial Espionage

People are in the world in which the economic condition of nations and the “competitiveness of businesses is determined largely by the ability to develop, commercialize, and capture the economic benefits from scientific and technological innovations.... ?? (Nasheri,) As the… et and other technological advances persist to reshape the way we operate in government and industry, and as competitions become stiffer means are created to efficiently facilitate how one would do business....
7 Pages (1750 words) Research Paper

Knowledge and Attitude of Saudi Health Professionals Towards Using Technology at Workplace

Apparently, it is worth noting that technology is very crucial in the field of health particularly in treatment procedures and other procedures that would otherwise… As such, it is important to note that technology is not static hence changes with time.... This study aims at making findings on the knowledge and attitudes of health professionals as have been requested by most of the health sectors Consequently, the study will be done through the use cross-sectional survey design....
16 Pages (4000 words) Essay

Law of Digital Evidence

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations.... : Computer Crime and Intellectual Property Section criminal Division, Office of Legal Education: Executive Office for United States Attorneys, 2009.... It would not be argued that all the information established from a personal computer belongs to the user since some may be uploaded via Questions on search warrants for computers Given the nature of digital evidence, officers who execute any search warrant for computer devices can turn the search into a “general warrant”....
2 Pages (500 words) Essay

Cyber Terrorism and Information Warfare

This is due to the fact that different countries have different laws that govern the usage of computers e....   This paper “Cyber Terrorism and Information Warfare” is an evaluation of the various types of internet crimes, how they are accomplished and where possible, the proper measures that can be taken to prevent the crime in order to make the use of internet safer....
10 Pages (2500 words) Dissertation

Cyber Fraud: Types, Cases and Laws

nbsp;Cross and Mille define cyber-crime as “any violation of criminal law that involves knowledge of computer technology for its perpetration, instigation or prosecution” (156).... This involves many crimes such as fraud, embezzlement, and theft of intellectual property as long as it is committed with the aid of computers....
10 Pages (2500 words) Coursework

Therac-25 Radiation Overdose Accidents between 1985 and 1987

The paper "Therac-25 Radiation Overdose Accidents between 1985 and 1987" discusses that The incident could have been prevented if a thorough risk assessment could have been conducted before implementing the program.... The manufacturer conducted an unrealistic risk assessment.... hellip; The Therac-25 incident demonstrated that several misconceptions in the attitude of manufacturers caused accidents....
10 Pages (2500 words) Essay

Application of Chemical Instruments to a Bomb Site

After the explosion, preliminary investigations discovered the fact that an approximate amount of 3 to 4kg of trinitrotoluene (TNT) was the cause of the explosion at the 89 Forum Cinema Hall.... Based on this evidence, it was possible for one to confirm the fact that the investigation found small shreds of nylon fabric at the site of the blast....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us