Fourth Amendment Case Study

Improved Essays
The fourth amendment protects all citizens from illegal searches and seizure of their possessions and property. The Weeks v. United States case law was established in 1914, which consisted of police entering Fremont Weeks home and illegally seizing evidence of Weeks transporting lottery tickets through the mail. This case is what brought forth the exclusionary rule, which makes any evidence obtained during an illegal search and seizure possibly inadmissible in court. To uphold the fourth amendment, officers need a probable cause to justify the search of someone’s home and other property. To establish probable cause, officers need factual evidence that leads them to believe that the suspect has committed a crime. Without probable cause, a search warrant cannot be obtained. Since the suspect in question has been arrested and interrogated, probable cause has been established, and a search is warranted. The suspect’s laptop is confiscated and brought to the investigation department for data analysis. Since the offender communicated via chat messaging, checking the instant message logs would be the first place to search for e-evidence. The …show more content…
Not only will the messages provide crucial information that was exchanged between the participants, but an IP trace could be performed on the other participants of the chat sessions. If the suspect deleted the messages prior to the confiscation, gaining any e-evidence may be somewhat more difficult. Instant messaging programs can often be setup to not store exchanged messages. If the suspect used these settings while messaging the participants, it may be possible to obtain the messages from the RAM instead. At the very least, the timeline of the exchange may be recovered from the program, in the absence of messages. It may also be possible to recover the names of the participants and their IP

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 693 Words
    • 3 Pages
    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Achman Case Study

    • 748 Words
    • 3 Pages

    When they couldn’t find anything, the looked in the kitchen drawer and found a 22-Caliber pistol with ammunition. Puzzled, the officers questioned him, put the pistol in a evidence bag and proceeded to arrest Mohammed. They arrested him because it was an illegal hand gun. My question is, why did the police officers arrest him for something that wasn 't included in the search warrant? It wasn 't in Plainview.…

    • 748 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The police officers found evidence of drug use in the trash. They then used this evidence to obtain a search warrant, a legal document permitting the searching of property by police or the government, to search Mr. Greenwood's home. Once inside they found evidence of drug use and trafficking.…

    • 561 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ap Euro Dbq Imperialism

    • 968 Words
    • 4 Pages
    • 968 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Constitution of the United States was signed by delegates to the Constitutional Convention in Philadelphia on September 17, 1787. Many criticisms of the constitution stemmed from the lack of rights provided in the Constitution, creating the first ten amendments of the Constitution, known today as the bill of rights. These ten rights were created September 25, 1789 and ratified on December 15, 1791. They guarantee multiple personal freedoms, limit the government's power in the judicial, legislative, and exectutive branches, and reserve some powers to the states and the public. One of these amendments is the fourth amendment, which regulates many of the steps government investigators take in the course of criminal investigations.…

    • 1041 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The 4th amendment is being violated in this scenario; for the 4th amendment states that; “U.S. citizens are protected from unreasonable searches of a person’s property.” Mrs. Jones was only being a good neighbor and friendly. But the police lied to her that way they could gain access to her house. Then they proceed to look around then arrest her when they find a bomb. Yes, arresting her would protect everyone else, but you have to have a warrant before you can even arrest anyone.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    As the court order, I have ten days to collect forensic evidence, analyze it, and submit a report to opposing counsel. I will ensure my team has proper search and seizure warrants for each locations, and start sending them to Slatestone Land Development and Acer Tree Services offices. My team also understands the limitations of our e-discovery search, and they only can retrieved text messages and email from one month prior to the incident to the present time. It is a crucial measure that every forensic investigator is clearly understood limitations of our authority for the investigation (Kral, 2011). With approved seizure and search warrants, my team will use our toolkit to acquire drive images at the offices and/or collect them back to our forensic laboratory for further analysis.…

    • 406 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Fourth Amendment

    • 752 Words
    • 4 Pages

    Amendment IV The fourth amendment is one of the primitive and mainly significant entitlements bestowed to the citizens of The United State of America; the law, distinctively states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” What Does the Fourth Amendment Mean? The Fourth Amendment of the U.S. Constitution stipulates, the entitlement of individuals to be secure in their individualities, dwellings, documents, and possessions, against irrational searches…

    • 752 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Illustrate the differences between digital forensics and network forensics. Digital forensic:  Digital forensic is a branch of forensic science and it talks about the recovery and investigation report found in the digital devices.  Digital forensics is about the "preservation, identification, extraction, documentation and interpretation of computer data"  In order to accomplish these goals, there are well-defined procedures, also derived from law enforcement, for acquiring and analyzing the evidence without damaging it and authenticating the evidence and providing a chain-of-custody that will hold up in court.  Digital forensic have variety of applications to supports a hypothesis before criminal and civil courts.…

    • 520 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    There is a finite line between national security and the privacy of innocent Americans in their day to day lives. The right to have privacy was provided to people when it was installed in the 4th amendment to the constitution. Although the U.S. Government has been stretching out this basic right and invading the privacy right that every American has. The government should not be allowed to freely use surveillance programs to watch over innocent people 's every move. Stated in the 4th amendment there is the right for people “to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.…

    • 1138 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Digital Forensic Evidence

    • 129 Words
    • 1 Pages

    The collection of voluminous amounts of network forensic data makes the creation of an evidential image or even processing the data collected difficult. The digital forensic examiner may be called upon to provide digital evidence in support of a conventional criminal investigation, such as fraud, embezzlement, or intellectual property theft. Thus, there is a problem where law enforcement agencies are faced with the challenge of adopting new investigation methodologies as too is the forensic examiner. This calls for a hybrid investigation approach, where both law enforcement and the forensic examiner approach the investigation process in the same manner. (Konstantinos, Emmanouil, & Vassileios, 2013).…

    • 129 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Digital Evidence Crimes

    • 921 Words
    • 4 Pages

    Electronic devices are everywhere in world today, from internet of things to machine learning super computer to computer cars helping people communicate locally and globally with ease. People think of computers, cell phones and the Internet as the only sources for digital evidence, but any piece of technology that processes information can be used by criminals in a criminal intent. Investigators need to be able to recognize and properly seize potential digital evidence. Digital evidence is defined as information and data of value to an investigation that is stored on, received or transmitted by an electronic device. Digital evidence can be obtained when electronic devices are seized and secured after a crime.…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Questions Relevant to the Case Things to keep in mind for the forensic investigation for this case: • To identify the malicious activities with respect to 5Ws (Why, When, Where, What, Who). • To identify the security lapse in their network. • To find out the impact if the network system was compromised. • To identify the legal procedures, if needed. • To provide the remedial action in order to harden the system Relevant Guidelines for Initial Preparation…

    • 984 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    In computer forensic investigation, the first pro-active step is that of acquisition. However, the method used for data acquisition by a forensics investigator plays a major role in influencing the admissibility of electronic evidence to be used in a court or law, or the reliability of any other relevant information required when dealing with computer forensic cases at the organizational level (Dykstra & Sherman, 2012). Different data acquisition techniques allow for the recovery of electronic data from devices like hard drives, databases, web server, internet sites, e-mail servers, zip drives, back-up storage media, and personal digital devices like digital cameras and phones (Chu, Deng & Chao, 2011). The purpose of this paper is to analyze…

    • 1215 Words
    • 5 Pages
    Great Essays