Verified Document

Threatening Email The Law Enforcement Research Paper

This is why computer evidence -- such as the email itself -- cannot outweigh the underlying crime. What is being investigated is a threat against human life. While investigating this threatening email and Westfall (the main suspect), it is important for the investigator to heed the law; suspects still have all the legal rights and protections afforded them per the United States Constitution (Reyes & Brittson 2007). "Reading emails, intercepting communication, searching and copying computer data may land you in hot water if you do not have the proper permissions, or authority to do so" (2007). All investigations including computer crimes must follow certain forensic procedures in order for evidence to be admissible as well as to avoid civil and criminal liability. The Fourth Amendment, Electronic Communications Privacy Act (18 U.S.C. § 2501 et seq.), Electronic Communications Privacy Act (18 U.S.C. § 2701 et seq.), Pen Register and Trap and Trace Statute (18 U.S.C. § 3121 et seq.), Title III Wiretaps, and applicable state laws must all be considered (Gonzales et al., 2007).

Speaking to Westfall, the suspected sender, may have some negative ramifications. For one, it may give time to clean the computer and rid it of some evidence. If there was a legal challenge posed, there are several ways an interview could go. Westfall may be willing to cooperate with law enforcement or he may attain a lawyer, which in that case, the ways in which the investigator obtained information may come into question. If Mr. Westfall does not allow a search of his home and computer willfully, then it may be necessary to obtain a search warrant so that an investigation of Westfall's home and computer will be done to find further evidence. The search warrant needs to outline what criminal offense is being investigated (in this case email threats), where or what will be searched, what is expected to be found there, why...

The search warrant is as much to find innocence as it is to find guilt. Westfall may be approached and asked directly for permission to search or a search warrant is needed. In the home, the computer, as mentioned, is the main piece of evidence needed in order to establish whether or not the emails came from Westfall's computer.

Sources used in this document:
References:

1. Bryant, Robin P. (2008). Investigating Digital Crime. Wiley; 1st edition.

2. Casey, Ecoghan. (2004). Digital Evidence and Computer Crime. Academic Press; 2nd edition.

3. GeoBytes. (2010). "IP Address Locator Tool." GeoBytes. Retrieved on July 2, 2010,

from the Web site: http://www.geobytes.com/IpLocator.htm
http://www.online-tech-tips.com/computer-tips/how-to-track-the-original-location-of-an-email-via-its-ip-address/
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now