Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
The concept of this paper is to focus on crimination concerning the criminal justice system. It will cover privacy concepts regarding social media, voice calls, and text messages and further on the concept of computer forensics, where it will give a description and the types of crimes committed as well as traditional warrants. Also it will answer why the law enforcement offers search warranty refrain from asking people against whom the search is directed to assist. Lastly, it will discuss why some people are burglars, and others are not and what would make the United States make law-abiding behaviors more attractive than criminal behaviors.
Social media is a social network comprising of companies and people. Privacy involves the right of withholding information to other people for personal reasons to restrict third party. The issue of privacy in social media comes through public access to personal photos and a room for people to send and receive messages (Koohang, Paliszkiewicz & Goluchowski, 2018). Texts and emails are considered as the fastest method of messaging. However, they are under a lot of privacy danger on red flags as very voice call, and text message is recorded and stored. It comprises of sent and received messages, and the only possible solution in this scenario is message encryption.
Computer forensics is the other area of interest together with the types of crime involved. It is the new global technic used to collect computer evidence. It presents them in a way that can be used in the court of law. There are processes involved before the evidence is submitting to the court of law, like the process of data collection. The data collected should be both visible and invisible to give more support to the claim during presentation. There should be policy and procedures to be followed to govern data collection, acquisition, and examination before final documentation can be presented. Under the criminal justice, criminal investigation and civil investigation remains in the top list of crimes under cyber forensics. Computer forensics act as most relevant because it has a lot of importance, like protecting and gather important data that can be used to solve crime (Hsieh, 2019). The forensics follows different traditional approaches like evaluation and post search investigation.
The reason why law enforcement police officers can execute a search warrant from asking the person against who the search is directed to help is to protect the safety and identity of the victim involved. The search warrant is used to give the officers full permission to search whatever they want that is mentioned in the list to gather information on the crime (Estes et al. 2019).
Burglars are simply robbers who break into people’s houses and steal their belongings. Some of them would kill if anyone tries to stop them without second thoughts, and they mostly break-in when the owner is not there. Robbery is brought about by the high level of unemployment among the youth; there is another who carries guns during robbery to make it more effective and successful (Imran, Hosen & Chowdhury, 2018). However, others refrain from robbery because of the way they have been brought and neighborhood safety. The best way for the United States government to make law-abiding behaviors more attractive is by fair punishment. It is when sentences are charged according to the crime and not too severe for small crimes.
Lastly, the criminal justice of the United States should practice fair punishment to the law offenders to make the abiding behavior more attractive, and data encryption should be enforced on phones to protect information sent and received.
References
- Koohang, A., Paliszkiewicz, J., & Goluchowski, J. (2018). Social media privacy concerns: trusting beliefs and risk beliefs. Industrial Management & Data Systems, 118(6), 1209-1228.
- Hsieh, R. J. (2019). Digital evidence and computer forensics. In Introduction to Forensic Science and Criminalistics, Second Edition (pp. 201-221). CRC Press.
- Estes, B. L., McVicker, N. J., Swip, T. M., & Snyders, M. R. (2019). U.S. Patent No. 10,433,143. Washington, DC: U.S. Patent and Trademark Office.
- Imran, M., Hosen, M., & Chowdhury, M. A. F. (2018). Does poverty lead to crime? Evidence from the United States of America. International Journal of Social Economics, 45(10), 1424-1438.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.