Monday, February 17, 2020

Principles of Criminal Investigation Term Paper

Principles of Criminal Investigation - Term Paper Example However, lack of advanced forensic technology in the 1980s can be regarded as one of the reasons it took too long to link someone with the Green River killings. In 1982, authorities found five murdered women in the Green River. One unique thing about the murders is that all the killings had happened through strangling and the murdered women practiced prostitution. The discovery of the bodies alerted the locals on a possibility of having a serial killer targeting prostitutes. The area where the murdered bodies were discovered had Sheriff Officers and everyone had optimism that the murders would be resolved as soon as possible. Contrary to locals’ expectations, more bodies were discovered in and around the Green River. The bodies mostly include those of teenage women found naked and without any possession (Morehead, 2012). The police department remained to collect skeletons of unknown women without any trace of the murderer. Over a period of two years (1982-84), the police department listed 49 murder victims and described them victims of the Green River Killer. This could be later followed by the formation of the Green River Task Force that had the mandate of looking into the increased serial killings. The task force comprised of detectives from police departments across the United States. The task force conducted investigations on the murders and obtained a lot of evidence from hundreds of suspects. Unfortunately, none of the evidence gave any definitive evidence that could link anyone to the serial killing (Morehead, 2012). The continued delays in getting hold of the serial killer added budget constraints on the task force, which led to reduction of personnel within the task force. By 1992, only one detective had remained to deal with the Green River case (Reichert, 2005). According to Reichert (2005), in the 1980s, forensic technology was less advanced, which posed numerous challenges during the collection of evidence. In such cases,

Monday, February 3, 2020

E-mail and social media investigations Article Example | Topics and Well Written Essays - 250 words

E-mail and social media investigations - Article Example Pharming involves a hacker installing a spiteful code on a private computer or one’s server that later redirects to a webpage that was not expected and smishing involves the use of text messages to entice customers (Van, 2013). The advantages of circular logging is that it helps provide recovery from any transaction failure or any form of system crash through that may occur (Van, 2013). The logs are retained until the integrity of the current transactions is ensured. The disadvantage, however, is that it is difficult to restore the database and roll it forward in case a failure occurs. When investigating an e-mail abuse, one needs to detect how the server registers and handles the email upon receiving it. This is because the e-mail can either in the form of a flat file or the users’ e-mail (Van, 2013). The information available on social media may be used in investigation, since social media acts a snitch (Van, 2013). The information can be used through scrolling through the current updates and the feeds that the site might have. This means that the sites can be used as crime detection partners through provision of evidence. Proof of integrity and validity can be accessed through finding the origin of the report and the reporters of the same (Van,