Studyspark Study Document

IT Security Lang, David. A Term Paper

Pages:3 (958 words)

Sources:1+

Subject:Law

Topic:Probable Cause

Document Type:Term Paper

Document:#99207988


This makes it easier for investigators to identify connections by clicking on a particular item in the three-dimensional link.

The difficulties of this process of proving such a chain indicates the importance of creating steps that can help companies simplify the task of conducting a computer forensic investigation, should one ever be required. The article stresses that the most important step is to ensure that network logging devices are turned on, even though these devices use disk space and processor time. If they are turned off, investigations can become impossible. Closing any unneeded ports on the company firewall and patching systems regularly, are also helpful.

This article paints an overall benign portrait of law enforcement, zealously protecting user privacy and safety. It demonstrates how an apparently invisible crime can be rendered visible through the use of technology, and both the law and law enforcement's attempts to stay one step ahead of potential hackers. Of course, when the proofs needed to obtain search warrants can be given without observable evidence, as is traditional with intellectual property cases, some legal scholars may grow antsy. But ultimately, one must agree with the author that the Internet's ability to facilitate identity theft, and the nature of identity theft as a computer-based crime requires new law, such as the allowance for a search warrant based on unobserved evidence, so an Internet provider may give access to an owner whose computer has been hijacked without his or her awareness, as transpired in the article.

As noted by legal scholar of intellectual property Daniel Burke in his article "Transborder Intellectual Property Issues on the Electronic Frontier, the fluid electronic environment of the Internet "magnifies and intensifies" the dangers and abuses associated with identity and intellectual property theft. (Burke, 1994)

The Internet, as it is indeed a swift information superhighway for both legal and legitimate commerce but also the illegitimate transfer of identity has a dark side arising from the incentives associated with the illegal access to valuable information, incentives that only seem greater given that the crimes are so difficult to detect. Thus, Burke suggests, additional legal powers must be granted to investigators, as demonstrated in Lang's article as well. When the hacker's identity can be hidden with technological devises, investigators must possess similar tools to be able to penetrate these shields. Also, given that the tools of the hackers are facilitated by the swift pace of technological innovation, investigators must have the same tools at their disposal to discover how hackers and hijackers are developing new, creative, and potentially untraceable ways to illegally access consumer's identity, especially though uniquely permeable wireless sources.

Works Cited

Burke, Dan. "Transborder Intellectual Property Issues on the Electronic Frontier." Volume 5. Stanford Law & Policy Review

http://www.ifla.org/documents/infopol/copyright/dburk2.txt

Lang, David. "A Graphic Picture of Crime." ASIS. Sept 2002.


Sample Source(s) Used

Works Cited

Burke, Dan. "Transborder Intellectual Property Issues on the Electronic Frontier." Volume 5. Stanford Law & Policy Review

http://www.ifla.org/documents/infopol/copyright/dburk2.txt

Lang, David. "A Graphic Picture of Crime." ASIS. Sept 2002.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Technology and National Security Privacy Issues Edward Snowden

Pages: 6 (2481 words) Sources: 7 Subject: Terrorism Document: #54658191

Technology and national security / privacy issues / Edward snowden The massive 9/11 attacks revealed some obvious flaws in our security system. Terrorists not only managed to slip through the immigration and airports but also managed to live, train and plan within the United States for many years. The resulting fear of other terrorist groups who might have been living and training in U.S. were justifiable. In this regard, congress came

Studyspark Study Document

Phoenix Program Lessons to Iraq

Pages: 75 (19225 words) Sources: 50 Subject: Military Document: #51380939

(MACV Dir 381-41) This document is one of the first confidential memorandums associated with the Phoenix Program, which details in 1967 the mostly U.S. involvement in counterinsurgency intelligence and activities and discusses the future training and development of South Vietnam forces to serve the same function, that had been supported by the U.S. In civilian (mostly CIA) and military roles. The document stresses that the U.S. role is to

Studyspark Study Document

Vision Newspaper Extract Kim Gavin,

Pages: 7 (2196 words) Sources: 15 Subject: Sports Document: #31853362

Rather than functioning solely as a sporting event, the '84 Summer Games delivered a broader scope of entertainment never before seen or attempted. The event encompassed entertainment not only in the form of sporting competition, but also in music and arts (Masterman, 2004). It is now understood that special events possess a powerful role in the society. 2012 Olympic closing ceremony will be a mega event as it will have

Studyspark Study Document

Arab-Americans: Racism Before and After

Pages: 7 (2354 words) Sources: 4 Subject: Terrorism Document: #48275290

This abuse of Arab-Americans and Muslim-American follows the ritualized sacrifice of the pharmakos, which involved the projection of a specific set of characteristics onto the scapegoated victim, who was then sacrificed in order to restore the health and unity of the community" (p. 165). As Taslitz (2002) emphasizes, such hate crimes and stereotypical portrayals of Arab-Americans represent a firmly entrenched set of beliefs held by many Americans that contribute

Studyspark Study Document

Family Break Up

Pages: 22 (8857 words) Sources: 1+ Subject: Family and Marriage Document: #2513458

Family Break Up For a humane, the word 'community' hints at people trying to work out solutions to common problems. The term 'community' generally stands for a group that is bigger and more diverse than a family or any group of people bound together with relationships. It also has more elements than being of the same neighborhood or enclave, though not as large as a county or a nation. Certainly it

Studyspark Study Document

Is the European Union a State or What Else Distinguishes It From Other International Organizations ...

Pages: 22 (9068 words) Sources: 20 Subject: Government Document: #99365197

European Union a state, or what else distinguishes it from other International Organizations The primary question concerning global organizations as a medium of global governance relates towards the quantity and excellence of this governance within an era where we now have an overdeveloped global economy as well as an under-developed global polity (Ougaard and Higgott, 2002). There's a powerful disconnect amid governance, being an efficient and effective collective solution-seeking process

Join thousands of other students and

"spark your studies".