preview

Cybercrime Case Study Paper

Good Essays

Cybercrime Case Study Paper The Fourth Amendment can be applied to the Internet, computer, and cybercrimes, but it must be done very carefully. The protections that are granted by the Fourth Amendment should depend on the data. If the data is content, which means any kind of communications such as email, or any remotely stored files on a computer system, then the information is protected by the Fourth Amendment. However, if the data is non-content information, such as IP address and email addresses then those are not guaranteed to be protected by the Fourth Amendment. In 2012, a federal judge ruled that the computer of an individual is not protected by the rights granted under the Fifth Amendment. Many times cybercriminals will …show more content…

When he was told about the criminal activity conducted with his daughter as a victim he immediately contacted Larkin and gave her most current cell phone number to authorities. Using cell phone tracking technology authorities were able to locate Larkin and get an arrest warrant for her immediate arrest. Larkin was living with her daughter at the King residence. When authorities went to the King residence, Kind opened the door and led authorities to Larkin. Larkin was taken into custody and as per the warrant her computer was also seized. King led authorities to the room and unplugged the computer to give to authorities, as officers were ready to take the computer, King objected and said that the hard drive inside the computer was his and officers had no right to the hard drive. At the time officers said they had the right to take the computer along with the hard drive and left. The data on the hard drive was incriminating evidence against Larkin and King along with others. Larkin was taken to a correctional facility, King planned to visit her and arranged to meet with FBI agent Kyle in March 2003. When King met with Agent Kyle he was informed that the interview was voluntary and he was free to leave at any time, in the course of

Get Access