preview

Governing Identification Evidence Analysis

Better Essays

In Chapter thirteen, naming the law of governing identification evidence is introduced. It begins with the evidence needed for criminal convictions. It states that to convict a person of a crime, the government must be able to prove it. The government must prove that the crime the person is charged with did indeed happen. The government must also be able to prove that the defendant was committed or was a party to the crime charged. The evidence can either be direct or circumstantial. Direct evidence is evidence that stands on its own to prove an alleged fact, such as a testimony of a witness who specifically says he or she saw a defendant pointing a gun at a victim during a robbery. This means that the defendant must be identified in some sort …show more content…

When eyewitness identification evidence is presented, defense lawyers can cross examine the ID witnesses, and can argue in summation as to factors causing doubts in the precision of the identification. It is important that investigating officers have the witnesses give them a thorough detailed description of the offender as possible, as well as, having the description as soon as it is available after the crime is reported. In the cause, Neil v. Biggers case, the respondent was convicted of rape on evidence from the victim’s visual and voice identification of the respondent at a station house show up that occurred seven months after the rape. The victim, who has been in the presence of her assailant a considerable amount of time and had directly observed him indoors and under a full moon outdoors, testified that she had absolutely no doubt the respondent was her attacker. Before the show up where the victim identified her assailant, she had not made any identification of others present in previous show ups, lineups, or through pictures. The court held that the fact that the show up was considered suggestive and did not make the identification inadmissible under the due process clause. Therefore, her testimony was considered reliable. I personally agree with determining her testimony reliable but, I must also say this is based mostly on bias and not an evidential opinion. I believe that when a person …show more content…

Computers are electronic devices for storing and processing data and that is why they are a rich place for law enforcement to search for criminal activity. There is a common expectation of privacy when it comes to someone’s personal computer, which is why the fourth amendment applies to any search of a computer. When obtaining evidence from other personal electronic devices there must be a search warrant in place. Obtaining evidence from the Internet or cyber evidence includes crimes against children, abductions, threats, abductions, and pornography. Identity theft and computer hacking crimes also fall under this category. There are different types of search warrants; there is daytime, nighttime, no knock/unannounced, anticipatory, sneak and peek, etc. Wiretapping allows the practice of connecting a listening device to a telephone line to secretly monitor a conversation. Electronic surveillance is a way of monitoring a home, business, or individual using a variety of devices. Three techniques of electronic surveillance that are available to law enforcement agencies are pen registers, trap and trace devices, and interception of the content of the message. There are some situations where a court order was not required like overheard conversations, statements made to undercover officers, and tape recordings

Get Access