Anthony Vs Mangione Case Study

Superior Essays
The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography. …show more content…
While ICAC commenced with the preliminary steps of a cyber investigation – e.g., the subpoenaing of AOL records, account information, subscriber and IP logs, details of Mangione's law enforcement status had not yet been revealed to investigators. Based only on one digital image from AOL, the lead was filed as a non-priority. However, things changed during the course of the investigation when an analyst discovered that Mangione could possibly be a federal agent. The revelation immediately altered the priority and course of the investigation. Were Mangione's email communications part of some elaborate undercover operation that was sloppily done? Could someone else be using Mangione's account? Could the perpetrator be leeching off Mangione's home wifi? Eliminating the potential of a misidentification would be crucial for several reasons. Failing to do so could possibly implicate an innocent person. Also, if the government were to formally implicate Mangione and then later determine he was wrongfully accused, the stigma attached to a child sexual abuse case …show more content…
This incident offered Mangione two advantages he did not have before. First, this was quite possibly the first time he was alerted to the fact he was a subject of interest to someone. Second, if the someone was a law-enforcement official, it could offer to him conclusive proof the government was investigating him. Destroying evidence would be foremost on his mind. If he believed in the latter, as investigators postulated, destroying evidence would be his priority. The investigators were now in a crunch to wrap up lose ends and approach Mangione. By the time, the search warrant was signed, investigators anticipated Mangione was likely prepared. When the task force approached Mangione, they discovered a laptop in his work vehicle. According to his family members, the laptop was off limits because it was Mangione's work computer, although, authorities later showed it to have been purchased with his own funds. A forensic analysis of the computer, revealed something of interest, but not what investigators expected to find. Instead of child abuse images, the laptop had wiping software installed. An examination of the logs revealed multiple “wipings,” the remnants of additional screen names and fragmented chats indicative of child exploitation themes. Deeper analysis revealed hibernation files depicting child erotica. At this point in the investigation, David Osborne enters.

Related Documents

  • Great Essays

    Mark Armstrong Case Study

    • 2295 Words
    • 10 Pages

    COMES NOW R. Mark Armstrong, PG (ProSe) (“Plaintiff”), and hereby files a Notice of Intent to Appeal. Please forward the: Complaint, Memorandum of Law, Motion to Proceed In Forma Pauperis, Order Denying Plaintiff R. Mark Armstrong Motion to Proceed in Forma Pauperis, Notice of Intent to Appeal along with any other documents in the file, for review by the 10th Circuit Court of Appeals. This Complaint begins with a nepotism violation (Pages 3,4,6,7,19,20,21,29 Complaint). The appearance of impropriety is the standard that applies.…

    • 2295 Words
    • 10 Pages
    Great Essays
  • Decent Essays

    Facts: The Defendant’s van was searched by Canadian border officials during a routine search and found a videotape that focused on a young ball-boy playing tennis. A more through search led the officials to discover marijuana paraphernalia, a photo album loaded with child pornography, a computer, and several hard drives. Customs officials examined the contents of the hard-drives and the defendant’s computer, all of which contained other files of child pornography. The defendant would later file a motion, seeking to suppress the contents of both the hard drives and the computer on both First and Fourth Amendment form.…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Unit 1 Discussion Board Featured in the winter 2016 issue of Context, a publication of the American Sociological Association, the article titled “Digital Punishment’s Tangled Web” is written by Sarah Esther Lageson. Sarah is in the Rutgers University-Newark School of Justice, where she studies how technology changes the law, criminal justice, and systems of American punishment and the effects it has on society. “I have studied the growth of what I call digital punishment by interviewing those who run criminal history and mug shot websites, by analyzing the content they produce, and by interviewing those working to clear their own criminal records through legal means even against the reality of an endless digital trail”. Sarah explains that…

    • 736 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    ISSUES IN HOMELAND SECURITY WRITING ASSIGNMENT THE HISTORY The United States Secret Service is one of the oldest federal law enforcement agencies in the country and ranks among the most elite in the world. With its origin dating back to the end of the American Civil War (July 5,1865), the Secret Service was originally founded to combat the then-widespread counterfeiting of U.S. currency. In 1901, the agency was asked to begin its protective mission after the assassination of President William McKinley – the third sitting U.S. President to be assassinated. Today, the Secret Service proudly continues to protect both national leaders and visiting foreign VIPs while helping to secure the nation’s financial infrastructure through financial…

    • 866 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Dni Effect

    • 1657 Words
    • 7 Pages

    ODNI Oversight and Unity of Effect In 2004, the Director of National Intelligence (DNI) position was created as part of the sweeping reforms from the 9/11 commission report. The DNI gained authority to oversee and manage the entire intelligence community with both domestic and foreign intelligence. As stated above, this community includes 17 federal agencies, 6 cabinet level departments, and 7 personnel systems.…

    • 1657 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Outrage In the Fox News editorial section, Judge Andrew Napolitano writes an opinionated piece he titles, “Hillary Clinton’s Lawbreaking and Lying Have Caught Up with Her”, which he uses to vent about his belief that Clinton is an obvious criminal and the American populous is aware of her deeds (2015). Napolitano uses argumentative language to express his outrage toward Clinton and the many scandals she has associated with her present presidential aspirations. The author uses a host of emotionally laced rhetorical descriptions and definitions of the issues, to demonstrate as evidence, as well as solidify her guilt. Napolitano also uses the use of questions incorporated with biases and anecdotal facts to convict Clinton in the process.…

    • 1169 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The criminal justice community is always evolving, there are changes in technology that have caused shockwaves through the system that reach an international level. In the review of the current system, the impact of globalization on the United States criminal justice system will be assessed, as well as comparing and contrasting the international criminal justice systems. Which include Civil Law, Common Law, Islamic Law, and Socialist Law traditions. Additionally, the impact that cybercrime and technology have on the worldwide justice system, and the differences between the policing systems that exist throughout the world will be examined. Finally, the major crimes and criminal issues that have a global impact on the justice systems around the world will be appraised.…

    • 1770 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    In today’s society, the word “privacy” has become ubiquitous. Author Daniel J. Solove, wrote, “The Nothing-to-Hide Argument”, published in 2013 by Yale University Press. He argues that while people are under the delusion of being watched publicly, then they should have nothing to hide. In Britain, for example, surveillance cameras were installed throughout the cities and towns.…

    • 702 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Fourth Amendment grants property rights to citizens against unreasonable searches and seizures. Consent is one of the most frequently used exceptions to the Fourth Amendment. Determining if a person has the authority to grant consent is an issue unique to computers. Today, technology enables multiple users to log on to a computer using multiple passwords and profiles and create multiple accounts and screen names. A password is analogous to a key that can be used to open a locked container.…

    • 1746 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Anthony Innocent

    • 1527 Words
    • 7 Pages

    When mistaken for a criminal the person that is innocent can be paying someone else’s sentence. When the person that is blamed for something they didn’t do they end up having to have that problem on their record. The person that has the situation on their record, it makes it hard to find a job. The crimes that innocent people are considered guilty for are serious and can do damage to their life.…

    • 1527 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The beginning of intelligence-led policing introduced a new paramount into the ideologies of crime control and policing practices. This style of policing gathers evidence to improve crime prevention and detection, better distribute the use of resources for police, improve effectiveness and enhance partnerships. Although for the philosophy’s of intelligence policing to be effective, decision makers need a critical understanding of the intelligence model to make a positive impact on the criminal environment. This essay will evaluate the research of intelligence-led policing and closely analyse the Australian Federal Policies adaption to its ideals through the use of scholarly articles, AFP corporate plans and annual reports while evaluating the…

    • 1017 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Forensic Evidence Essay

    • 1578 Words
    • 6 Pages

    In the criminal justice world, the theory of criminal investigation is laid out in a way that seems to be the same for every situation, but that is not the case in all cases. In some cases, the process has to be critiqued to fit the situation. In the world we live in we criminals are unfortunately getting better and better at committing crimes with little trace. People believe that the information investigators need are right their hands because of the CSI effect. This makes it harder and harder for criminal investigators to do their jobs and track down criminals because the public has this false since that they have magical technologies just like they have on the television.…

    • 1578 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The text asserts incarceration rates have declined over the past 25 years, which presents the argument of crime rates decreasing. (Karmen, 2017) In actuality, crime rates have decreased due to the incarcerations offering longer sentences than they did in the past. Murder rates have a lower rate than it ever has, with the exception of some major cities such as Chicago or New York. In comparison to other cities, my hometown of Memphis, TN has alarming and disturbing rates of murder.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays