Detective Reflection
description
Transcript of Detective Reflection
-
1/2
Detective Reflectionairra.org/detective-reflection
Introduction
Regarding the findings of this incident, the investigation in this business assignment help
carried out was good and in this report, we will discuss the further findings which were
made with respect to this incident. We will also cover the extra things which to be made
simultaneously with the existing investigation.
Main Investigation
On 90th December 2009, the police executed an important investigation which considers
the shipment of infected computers to the investigation site. The infected computer was
taken with the coordination of Aaron Greene’s. The computer contained various images
and videos of kitty exploitation material.
In the forensic lab, it was found and made clearer that the computer contains kitty
exploitation material and the material was stored within the hard disk of the computer.
However, over the detailed investigation of the computer, it was also found that the
computer was previously stolen from a company named M57 Patents. Additionally,
through the computer search, it is also found that the user of the computer if Jo with no
last name and no email address on the computer and given to Greene at the time of sale of
the computer.
Now, at this point, I would like to say ‘No’ to the idea of a search warrant because of the
fact that there is no crime committed and that no crime is linked with the information
found on the hard disk of the computer. In this regard, the fourth amendment of the
constitution of the United States clearly states that unreasonable searches through any
law enforcement agencies or police officers should be limited as a way to protect the rights
of citizens and that without having all requirements for a search warrant police cannot
search a person or his or her property or any other thing related to that person (Forbes,
1986).
No doubt, police and the forensic report found kitty exploitation material on the hard disk
of the computer and that there is a doubt about the true owner of the computer, as the
computer is sold by an online sales website and the owner of the computer only named
‘Jo’ with no first and last name as well as provided no email to the buyer of the computer.
Finally, I would also like to say ‘No’ as no crime is committed yet, linked with the
exploitation material found on the hard disk of the computer and, in last, the fourth
amendment of the constitution of the United States also protect the right of its citizens
like Jo from any kind of unreasonable search warrant.
Read Essay provides a platform for UK students from all over the world to connect with
experienced and professional writers. You can benefit from our custom writing solutions
like we offer help with economics homework, accounting assignment help, and many
https://airra.org/detective-reflection/https://www.readessay.com/assignment-help/business-assignment-help/https://www.readessay.com/assignment-help/business-assignment-help/https://readessay.com/assignment-help/accounting-assignment-help/
-
2/2
other writing services.
Reference
Forbes, J. (1986). The inevitable discovery exception, primary evidence, and the
emasculation of the fourth amendment. . Fordham L. Rev.
Also Read: Social Issue of Poverty
https://airra.org/social-issue-of-poverty/