Threatening Email The Law Enforcement Research Paper

Length: 6 pages Sources: 8 Subject: Education - Computers Type: Research Paper Paper: #61856814 Related Topics: Ip Address, Age Of Innocence, Law Enforcement, Cyber Crime
Excerpt from Research Paper :

This is why computer evidence -- such as the email itself -- cannot outweigh the underlying crime. What is being investigated is a threat against human life.

While investigating this threatening email and Westfall (the main suspect), it is important for the investigator to heed the law; suspects still have all the legal rights and protections afforded them per the United States Constitution (Reyes & Brittson 2007). "Reading emails, intercepting communication, searching and copying computer data may land you in hot water if you do not have the proper permissions, or authority to do so" (2007). All investigations including computer crimes must follow certain forensic procedures in order for evidence to be admissible as well as to avoid civil and criminal liability. The Fourth Amendment, Electronic Communications Privacy Act (18 U.S.C. § 2501 et seq.), Electronic Communications Privacy Act (18 U.S.C. § 2701 et seq.), Pen Register and Trap and Trace Statute (18 U.S.C. § 3121 et seq.), Title III Wiretaps, and applicable state laws must all be considered (Gonzales et al., 2007).

Speaking to Westfall, the suspected sender, may have some negative ramifications. For one, it may give time to clean the computer and rid it of some evidence. If there was a legal challenge posed, there are several ways an interview could go. Westfall may be willing to cooperate with law enforcement or he may attain a lawyer, which in that case, the ways in which the investigator obtained information may come into question. If Mr. Westfall does not allow a search of his


The search warrant needs to outline what criminal offense is being investigated (in this case email threats), where or what will be searched, what is expected to be found there, why there is reason to believe it is there, and how it is relevant to the crime. The search warrant is as much to find innocence as it is to find guilt. Westfall may be approached and asked directly for permission to search or a search warrant is needed. In the home, the computer, as mentioned, is the main piece of evidence needed in order to establish whether or not the emails came from Westfall's computer.


1. Bryant, Robin P. (2008). Investigating Digital Crime. Wiley; 1st edition.

2. Casey, Ecoghan. (2004). Digital Evidence and Computer Crime. Academic Press; 2nd edition.

3. GeoBytes. (2010). "IP Address Locator Tool." GeoBytes. Retrieved on July 2, 2010,

from the Web site:

4. Gonzales, Alberto R., Schofield, Regina B., & Hagy, David. (2007). "Investigations

Involving the Internet and Computer Networks." U.S. Department of Justice:

Office of Justice Programs. National Institute of Justice.

5. Online Tech Tips. (2007). "How to track the original location of an email via its IP

address." Online Tech Tips. Retrieved on July 3, 2010, from the Web site:

6. Reyes, Anthony., & Brittson, Richard. (2007). Cyber Crime Investigations: Bridging

the Gaps Between Security Professionals, Law Enforcement, and Prosecutors.


7. Technical Working Group for Electronic Crime Scene Investigation. (2001).

"Electronic Crime Scene Investigation: A Guide for First Responders." National


Sources Used in Documents:


1. Bryant, Robin P. (2008). Investigating Digital Crime. Wiley; 1st edition.

2. Casey, Ecoghan. (2004). Digital Evidence and Computer Crime. Academic Press; 2nd edition.

3. GeoBytes. (2010). "IP Address Locator Tool." GeoBytes. Retrieved on July 2, 2010,

from the Web site:

Cite this Document:

"Threatening Email The Law Enforcement" (2010, July 03) Retrieved June 13, 2021, from

"Threatening Email The Law Enforcement" 03 July 2010. Web.13 June. 2021. <>

"Threatening Email The Law Enforcement", 03 July 2010, Accessed.13 June. 2021,

Related Documents
Law Enforcement and the Social Media
Words: 1446 Length: 4 Pages Topic: Education - Computers Paper #: 44555333

data collection includes survey form, structured interviews using closed ended questions, and gathering information regarding a sample size appropriate to analyze and draw conclusion on the basis of the research results. The statistical techniques are used for data analysis to analyze collected data in quantitative research methods. The qualitative data is gathered through case study method and open ended question of an unstructured interview from notable sample. The qualitative

Women Representation in Law Enforcement
Words: 5449 Length: 15 Pages Topic: Criminal Justice Paper #: 72395597

In this regard, Lott points out, "Between 70% and 80% of police departments explicitly use norming of physical standards in their hiring practices. However, most of the departments that use objective standards do not enforce these rules. Women who fail to meet the absolute standards during academy training are unlikely to be failed out of the program" (p. 276). This lack of consistency in how these standards are applied

Social Media Issues in Law Enforcement
Words: 1780 Length: 6 Pages Topic: Criminal Justice Paper #: 68869204

Social Media and Law Enforcement Social Media Issues in law Enforcement Social media and law enforcement: Boon or bane? Social media is a fact of everyday modern life. For law enforcement personnel, it has created new opportunities to share resources with the public, including as 'tweeting' information about a possible suspect or releasing safety information to the public about terrorist incidents or natural disasters. At first, in the Internet age, police departments were

Understanding the Importance of Communication in Law Enforcement
Words: 2389 Length: 8 Pages Topic: Business - Management Paper #: 70928944

Communication in the criminal justice system The process of communication entails the passage of information between individuals. This flow of communication, however, has its principles. The principles include the need of effective channel of communication, message, and the sender. It is also vital for receivers to comprehend the message. In organizations, communication takes a formal and informal approach. Formal approaches to communication in organizations include the use of business memos,

Law Comm. Tech Innovations in Database Communication
Words: 1963 Length: 7 Pages Topic: Criminal Justice Paper #: 83386894

Law comm. tech Innovations in Database Communication Technologies for Law Enforcement The proliferation of computer, digital and web technology have all had a significant impact on how civil and public administration functions are performed. The ability to engage in real-time communication through an array of media, the opportunity to access enormous databases of information from the field and the capacity to capture sound, video, photo and other data all have enhanced productivity,

Business Law - Bug, Inc.
Words: 1972 Length: 5 Pages Topic: Business Paper #: 79898795

Another option could be fro Bug to use a defense of proximate cause which states that for a negligent act or omission to be a proximate cause of damage, it must be a natural and probable (not just possible) result of a sequence unbroken by any intervening causes. 6. [See situations b. And c. For background information.] The attorneys for BUG have completed their investigation of WIRETAP and its employee,