Identify at least two types of technologies for computer and internet applications available to law enforcement and discuss how these technologies may be utilized.
What will be an ideal response?
Answer may vary. May include searching e-mail for sender, recipients, or key words; Keystroke logging; and cell phone tracking. Analysis will vary based on the technology chosen.
You might also like to view...
The Southern Poverty Law Center monitors, but does not investigate organizations and individuals who it deems hate groups and extremists
a. True b. False Indicate whether the statement is true or false
Explain the roles and responsibilities of judges before the trial
What will be an ideal response?
The impact of the exclusionary rule
a. is pervasive considering the fact that 80% of school children recognize it b. ranges from 48-90% of cases c. is stronger in violent cases but is more limited in cases of property crime d. is limited because few motions to suppress physical evidence are made and even fewer are successful
Community corrections are sanctions that may be completed after a defendant serves time in prison
a. True b. False Indicate whether the statement is true or false