Ethical Challenges Faced by Law Enforcement (Research Paper Sample)
Assignment 3: Law Enforcement Challenges
Due Week 8 and worth 170 points
Write a three to four (3-4) page paper in which you:
Explain, in detail, what you believe to be the greatest challenge facing law enforcement agencies investigating exploitation, cyber stalking, and obscenity. Provide a rationale for your response.
Identify the specific challenges that overlapping of jurisdictions pose in the fight against cyber-crime. Next, propose salient solution(s) for overcoming the challenges in question. Justify your response.
Discuss whether or not law officers from different states should have the ability to work with one another when a cyber-crime is carried out across state lines.
Use at least three (3) quality references for this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
CHALLENGES FACED BY LAW ENFORCEMENT AGENCIES.
15th August, 2015.
With the advent of technological era, internet has been a key tool to establishing a global community. This has both positive impacts and the dark side of it. The positive side has propelled economies and inventions to a whole different level. So has the dark side equally pulled down that remarkable achievement. Endless crimes involving the internet ranging from obscene website blooming to cybercrimes compromising users' privacy. In this case, we are going to address each of these form of crimes in a wider perception. Also dealing with challenges law enforcement teams face in an attempt to curb this new generational crimes and discussion on possible remedies to fix them.
In my view, the greatest challenge faced by law enforcement agencies in this battle is the porosity of these softwares' access through the domains. If only it were possible to restrict registration unless appropriate additional identification is provided, such cases wouldn't be possible. Apparently the perpetrators register legal domain names with fake identities. This means that the infrastructure used to provide services end backing up their activities. It is in that manner that unmasking them becomes a challenge. One must wonder how they got through the protocols legally, but it is only then that they turn the situation around with their evil endeavors. Follow up after crime proves futile because no real identities were provided at the first place (Pettinari, 2002).
Affordability of these domain name registration favors perpetrators. Suppose it was expensive, then criminals would rethink engaging into the crime. If fear arises on the traceability of transactions made during access of the systems illegally. They will retreat (Pettinari, 2002).
Overlapping of jurisdiction pose many challenges in fight against cybercrime. Criminals use states as a hideout basing on the knowledge that their crime is excusable and that no clause in that particular state can apprehend them. Extradition to their knowledge, being internationally unacceptable as well puts them above the law. The anonymity of their identity leads to t...
YOU MAY ALSO LIKE
- Digital Crime TheoriesDescription: The choice theory is based on a utilitarian dogma that actions are accrued on a conscious assessment of the function of performing in a particular manner...3 pages/≈825 words | 3 Sources | APA | Law | Research Paper |
- Future of Law PracticeDescription: This is a case between a patient who was treated at Cedars-Sinai Medical Center and the hospital management...1 page/≈275 words | 3 Sources | APA | Law | Research Paper |
- Legal Research PaperDescription: Attempted murder: in the case study, Benny gave Victor a gun so that he can shoot and kill Private Dan for testifying in court which resulted in the conviction and incarceration of Jorge...2 pages/≈550 words | No Sources | APA | Law | Research Paper |