Torture

Is torture ever justified from a moral standpoint? Should it be legal in certain situations? What techniques, if any, employed by the Bush administration post-9/11 cross the line from permissible interrogation techniques into torture or CIDTP?

Drug courts

 

 

 

 

 

Drug courts are a relatively new phenomenon in the American judicial system. Focus your discussion on the following:

Discuss the philosophy and role as well as provide a short history of drug courts.
Does the state in which you reside utilize drug courts, and if so, how successful have they been in reducing recidivism rates?
Would you recommend that all of the states utilize these courts to assist in processing drug cases?

A criminal case investigation

 

 

 

 

 

During a criminal case investigation, a computer was taken as part of the evidence. The computer was found with a flash drive connected to one of the USB ports. It is suspected that this flash drive contains image files relevant to the case. Preliminary investigation revealed that the owner of the computer had the chance to delete some of image files. Other files were renamed so that they do not look like image files. It is also suspected that steganography was used with some of the files to conceal important information. The passphrase used for this purpose is hidden in the device slack space.

computer forensic investigator on duty and are called to process a case. List the general steps and tools required to begin investigation. In addition, because it is a high level profile case, processes must be carefully documented.

Reviewing digital media involved in a crime

 

 

 

 

You are hired by JLA Enterprise to conduct a Digital Media Investigation after it was discovered the Chief Financial Officer was embezzling money from the company’s accounts. Your job is to review all digital media involved in the case to determine if a crime has been committed. Here are some things to consider when explaining what happened during the investigation:

Who was involved in the embezzlement?
How much money was taken?
How can you prove the individual took the money?
What programs were used to embezzle the money?
When did they start embezzling the money?
Were they working with anyone else?

 

 

 

Traditional crimes in which computers are now used as an instrument.

 

 

 

 

 

Identify and describe two or three traditional crimes in which computers are now used as an instrument. How has the nature of these crimes changed as a result of technology?
What is anonymity on the Internet? What are the pros and cons of anonymity?
Find a spam or phishing e-mail in your e-mail account. Analyze the condensed and full e-mail header fields. What did you observe? Which header fields were included in the chosen e-mail that were not covered in this week? What forensic value do they hold, if any?
What is the difference between stand-alone and networked computers? What are the different types of computer networks?
Mobile devices have been the targets of crimes, have been used to commit crimes, and have held evidence of crimes. Conduct an online search for a case (not described this week) where a mobile device (PDA, mobile phone, or smart phone) was involved in a criminal or civil investigation. What were the facts of the case? What was the role of the device in the investigation?

 

 

Technology for protecting and gathering evidence

 

 

 

 

 

 

 

Describe the specific technology for protecting and gathering evidence

· Explain how the technology has influenced the criminal justice system

· Discuss any arguments in favor of or against this technology

· Explain any ethical dilemmas the technology may pose

· Conclude with how you think the criminal justice system will evolve in the future through the use of technology

Racial And Criminal Profiling

 

 

 

 

 

Each year when Crime in the United States is published, some entities use reported figures to compile rankings of cities and counties. These rough rankings provide no insight into the numerous variables that mold crime in a particular town, city, county, state, or region. Consequently, they lead to simplistic and/or incomplete analyses that often create misleading perceptions adversely affecting communities and their residents. Valid assessments are possible only with careful study and analysis of the range of unique conditions affecting each local law enforcement jurisdiction. The data user is, therefore, cautioned against comparing statistical data of individual reporting units from cities, metropolitan areas, states, or colleges or universities solely on the basis of their population coverage or student enrollment.
Discuss the following:

Why do you think this cautionary notice is given before users are directed to the FBI’s Crime in the United States publication? Expand on your viewpoint, and find credible sources to support your rationale.

Point out the distinction between institutional prejudice and personal prejudice.
Explain ways in which stereotypes can influence memory and perceptions of events.
What are common stereotypes of the specific minority groups explained in the training guide? How may one differentiate those stereotypes from accurate descriptions of the minority groups?
Identify the principal psychological motivations underlying prejudice.

Taking information on stalking situations.

 

 

 

 

 

 

As a victim advocate, your best friend became a victim of a crime of violence after being stalked for several months, and that incident changed your life. You provided comfort and support to your friend during the judicial process and you guided that friend through the criminal judicial process. Your efforts were successful in obtaining the help needed and criminal justice outcomes desired by your friend.

The new prosecutor for whom you have been working as a victims’ witness assistant has had several calls from victims of stalking. Some cases seem more serious than other cases; however, one case that no one in the office thought was serious resulted in the victim’s death. Everyone thought that the couple was just going through a difficult breakup. This case had a tremendous impact on the entire office, especially you.

To help make sure that the office does not minimize a potentially dangerous situation again, the prosecutor has asked you to put together an intake, evaluation, and assessment instrument to be used in taking information on stalking situations. Be sure to check stalking statutes, and cite the elements of the crime of stalking in your documents.
In 2 pages, provide a guide for using the intake form for stalking or other crime victims.

Cybercrime and the categories of cybercrime.

 

 

 

 

 

 

Define cybercrime and the categories of cybercrime.
Research how cybercrime (either in general or with respect to certain crimes — e.g., hacking, identity theft, cyberstalking) is handled in at least three different countries (one can be the United States).
Compare and contrast each country’s laws. What ethical issues arise as a result of differences in cybercriminal prosecution across cultures?
How will your understanding of cultural differences affect your ability to make decisions within your company?