Posts

Crime Classification Manual Part II Chapter 10 A 87

Image
  Crime Classification Manual Part II Chapter 10 A 87 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Common Forensic Findings. The victim’s computer will have copies of the transmitted messages as well as the address of the sender. The address of the offender may not be his or her real address, and the investigator will have to do online tracing when and if the offender sends additional messages. Investigative Considerations The investigator can try to hold the sender online to trace the sender’s location.

Crime Classification Manual Part II Chapter 10 A 86

Image
  Crime Classification Manual Part II Chapter 10 A 86 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N 523: CYBERSTALKING Cyberstalking is the use of the computer to follow a target of the stalker.   Victimology. Cyberstalking is similar to physical stalking except contact with the victim is with the Internet using e-mail, chatrooms, and instant messaging. The victim is typically female.

Crime Classification Manual Part II Chapter 10 A 85

Image
Crime Classification Manual Part II Chapter 10 A 85 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   The search should look for the pornographic data as well as addresses of customers. Pornographic material at the offender’s site should be compared with the pornographic material at the victim’s site.

Crime Classification Manual Part II Chapter 10 A 84

Image
  Crime Classification Manual Part II Chapter 10 A 84 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   This search warrant should list all forms of computer storage: disks, data CD-ROMs, DVDs, magnetic tapes, external hard drives, mini-drives (sometimes called memory sticks), flash memory modules, programming documentation, e-mail addresses (possible sources of malignant software creation programs), the computer and all its peripherals, and all program CD-ROMs.

Crime Classification Manual Part II Chapter 10 A 83

Image
Crime Classification Manual Part II Chapter 10 A 83 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Search Warrant Suggestions The investigator can obtain a warrant to the Internet service provider (ISP) to trace the path of the sender of pornographic data. When the location of the sender is determined, the investigator should obtain a search warrant for the offender’s location.

Crime Classification Manual Part II Chapter 10 A 82

Image
  Crime Classification Manual Part II Chapter 10 A 82 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Investigative Considerations The investigator should try to trace the path through the Internet or sign up for the service and do an online trace.

Crime Classification Manual Part II Chapter 10 A 81

Image
  Crime Classification Manual Part II Chapter 10 A 81 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Common Forensic Findings. Pornographic material will be found on the user’s computer as well as the address of the sender. In most cases, this ad- dress will not be real.