Arrest through arraignment means that the defendant has to be charged formally as the law suggests. That individual who has committed a crime should be an offense that is against the law or other people right has to face the consequences based on the kind of attack. Therefore, this paper tries to explain how cybercrime issue has endangered modern society including computer hacking, and child sex abuse hates speeches and insults and cyber terrorism as some of the effects. The paper also pinpoints the other two sources that have deeply talked about cybercrime having analyzed them and coming up with a supportive agreement about them. It also outlines individual position about the cybercrime issue.
Cybercrime had developed in history as a result of scientific inventions and advancement in technology especially in the field of computers. Individuals out there have taken this opportunity of technology to extend it to the level of criminology and threatening the current societies. Stealing of millions of dollars in bank accounts has been made possible through computer use by merely doing the transaction of money from one account to another in an online manner. David S. Wall on cybercrime having done research on cyber scam effect in the U.S that led to a loss of information of about $265 million in 2008 which doubled in the year that followed was caused by fraudsters who claimed to be government officials (Wall, 2007). He, therefore, said that "in the case of the encounter of such crime, it should be reported immediately and control measure be implemented." (Wall 28)
According to Shinder and Cross, on the fields of cybercrimes, criminal possesses very high knowledge on computer field and but the law enforcement and IT security have put more effort to improve their knowledge and skills too to investigate and prosecute cyber crimes (Shinder, 2008). According to them "cybercrime investigation must be reported and investigated by IT staff to meet the federal mandate from Sarbanes Oxley and the Security Payment Card (PCI) Data Security Standard Details forensic investigation techniques for the most common operating systems (Windows, Linux, and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phone."
On David S. Wall, it right to say that once the crime had been identified it should be reported but based on my opinion them once the problem has been identified research should be done undercover without stating it immediately so as the criminals be caught. Reporting it directly may alert the frauds that they are being investigated on and may make the destroy their site for action or even develop more security aid to hide entirely.
Based on Shinder and Cross it is right to report cybercrime to all those sectors for them to make advanced security protection on the computer. From this reason, criminal activities resulted from computers would have reduced at an identifiable percentage. On the other hand, Shinder and Cross have not outlined how the criminals should be caught and sentenced.
Basing on the two sources, it is right to say that once the crime has been realized is right that the issue is taken on silently for the fraudsters be caught first taken to caught and brought to court for formal judgment. After that, a report is made to that security sector like IT staff, PCI; Data Security Standard Details among other to improve on security protection for the most common OS. Here comes Eric Thompsons who appeals the judgment for a conviction of a four counts first degree of cybercrime offense by use of unauthorized access to government information and one count of suffocation and triangulation. He argued that evidence linking him to crime should have been suppressed because in search of warrant affidavit police intentionally added on the false statement and omitted material facts. For the reason put forward, it was disagreed and affirmed.
The jury listened to the evidence on Thompson's trial and drew an inference from the basis of their decision and decided that Eric Thompson was guilty of causing cybercrime and managed to steal $ 234 thousand from a government account. He is therefore sentenced for ten years imprisonment or a penalty fine of $2 million for the offense committed.
References
Wall, D. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4). Polity.
Shinder, D. L., & Cross, M. (2008). A scene of the Cybercrime. Elsevier.
Cite this page
Arrest Through Arraignment: Thompson's Trial Case Study Paper Example. (2022, Dec 12). Retrieved from https://proessays.net/essays/arrest-through-arraignment-thompsons-trial-case-study-paper-example
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- First Amendment: Religion and Education
- The Debate Against Human Right on Torture Essay Example
- Legalization of Guns in Texas Essay Example
- Save the Children's Foundation - Research Paper
- Lodzinski Murder Trial: A Critical Point in History - Essay Sample
- Essay Sample on Protecting Free Speech: A Necessary Human Right
- 1970s-90s: The USA's Serial Killer Nightmare - Research Paper