legal widget

legal widget

Graduating With a Criminal Justice Degree Can Land You an Exciting New Career

Posted on February 12, 2019 in Uncategorized

As Martin Luther King has rightly said, ‘Injustice anywhere is a threat to justice everywhere’, law enforcement and keeping criminal minds in check is the utmost necessity to ensure that the society is safe and sound. A criminal law system always needs to be modern and synchronized to the society’s needs. With the recent increase in criminal incidents and terrorist attacks, attention has been diverted to the field of criminal law. The popularity to this subject has overwhelmingly increased the number of criminal justice degree programs available in the recent times.

Criminal justice is actually a broad term and includes covering a variety of topics which would finally come under the criminal law system. There can be a variety of career paths which a student can take up after his education in criminal law. The various number of professional areas included under criminal law are the border patrol Agent, Bailiff, Corrections officer, Crime scene investigator, Court reporter, CIA agent, Customs agent, Drug enforcement agent, Detective, FBI Agent, Industrial security specialist, Law librarian, Legal secretary, Postal service investigator, Police Officer, Legal secretary, Private investigator, Secret service agent, Probation & parole officer, U.S. Marshall and the Sheriff.

To attain any of the above positions, an associate’s, bachelors or master’s degree in the field of criminal justice is required. Associate and bachelor’s degree can only make it to entry-level jobs or can be the gateway to further advanced studies. A number of accredited universities and colleges are providing on-campus and online degree programs in criminal law with specialization in different topics. Some of the universities are providing degree programs in criminal justice and law with the specializations in Court Reporting, Justice administration, Law Degree, Paralegal and Legal Services and law and criminal law, while on the other hand certain other programs exclusively in policing and investigation have the major subjects as crime scene and forensics, Forensic Accounting, Law Enforcement and Forensics Science. Degree programs in Security as also picking up amongst the students and the program can offer majoring in Security & Loss Prevention, Corrections and Public Safety.

Various colleges are working efficiently to make many of the degree programs in criminal justice available to the students. Kaplan University is proud to be amongst the respected online institutions in the country and proud to be able to provide associate’s, bachelor’s and master’s program in criminal law. University of Phoenix also follows suit, and American Intercontinental University, Everest University Online, Colorado Technical University, Ashford University are a few amongst the large number of universities providing this unique advantage.

Criminal Justice degrees not only offer the opportunities for a great career but also instill the voice of justice and security and the sheer joy to be able to help the nation in the toughest of jobs is not an easy task.

Predator Reform Toward a Balanced Justice System

Posted on February 9, 2019 in Uncategorized

Current predator justice systems describe an unbalance of righteousness. In other words, whereas the predator and associated parties receive minimal punishment, the victim on the other hand develops life-long emotional and financial hardships. In addition as the predator smirks toward the justice system, many bewildered victims lie confused to a chaotic justice system. In addition since litigators derail justice and experts become ignored, instances of predator crimes will continue unless predator laws are modified toward prevention of predator activities. Hence the following changes are recommended toward predator reform, which attempts toward eradicating the predator problem. Furthermore, conditions are based upon the individual being guilty using existing legal methods. Highlights of changes are:

1. Increased mental and jail time where (age + years) > 110 years.
2. Penalties for monitors who ignore laws and create early release
3. Penalties for judges and prosecutors who ignore expert opinions
4. Confiscation of all predator’s assets
5. Confiscation of predator’s social security and other pension assets
6. Creation of a National Victims Fund
7. Establish predator retro-activity lengthening jail times
8. Penalties for predator associates including fines and jail times

For example:

Increased jail time: A mentally deranged individual or predator may not under stand crime acknowledgment. Therefore, the predator or mentally unstable individual, after one crime, must be secured in a predator facility, which will cure his mentally unstable condition. In essence no second legal chances are given toward predator monsters. Furthermore, being secured in a mental facility may be indefinite depending upon a doctor’s acknowledgment and acceptance of responsibility. However, after a doctor has successfully acknowledged treatment of the unstable predator, can the predator be moved to jail facility to receive his proper jail time. In other words, a mentally unstable individual or predator may not understand the crime, however being unstable does not provide an excuse to commit a crime. In any event, the minimum term for sentencing after the predator is deemed fit for jail time is based on age after predator recovery and shall be (recovered_age + jail years) equal to and greater than 110. Thus, if the individual is 30 years old after mental-health treatment and verified mentally stable, then minimum sentencing will be 80 years using the formula provided.

For example, the recent predator incidents should not have occurred if the predator was locked in a predator or mental facility until “cured.” Afterwords, the predator can perform his jail time acknowledging fault to his actions. Unfortunately, not listening to expert testimony or specialists creates baffled justice. In addition, public opinion warrants remedies toward justice. Furthermore, since existing parole monitoring techniques are obsolete lacking acknowledgment or responsibility, then alternate long-term solutions require replacement from existing methods. Thus, life-long sentences for predators, who kidnap and molest under-aged children. Capital punishment for predators, who kidnap, molest, and kill underage children. Of course, a positive connection must be made through various DNA or other scientific methods, which connects the predator to the victim.

Assets: Predators will be spending many years behind prison walls without requiring use of acquired assets. Thus, predator’s assets will be confiscated and acquired funds will be transferred to a national victim’s organization. In addition any acquired social security benefits upon eligibility will be transferred to the victims fund until death of the predator. Thus, while predator’s assets are being confiscated, victims can draw from these funds to provide long-term mental health, stability, and other unforeseen future expenses to themselves and their required medical needs. In essence providing a balanced justice system where predators receive life-time sentencing whereas victims are eligible for lifetime financial support. Access to the National Victims Fund (NVF) should be through on-line or snail mail applications intended toward minimal victim’s burdens, which may be similar to filing an online claim form.

Legal: Current justice system is defective combined with derailed justice attorneys. In addition recommendations by experts are ignored creating limited predator punishment. A recommended 11 year sentenced was reduced to just six years. In essence justice was not served while the victim suffers. Therefore, predator legal representatives, whose predator created additional crimes and or ignored experts’ recommendation, will be fined and penalized if maximum predator justice was not established. In addition if the predator was placed in a mental institution prior to serving his or her recognized jail time, then predator repeat instances would not occur. Unfortunately, lack of responsibility for decisions can lead to further predator incidents.

Retroactive feature: Currently the parole board is overworked and understaffed. Thus, having an overworked and understaffed workforce creates problems for our society. On the other hand, having existing predators, which are wandering, are outside the jail system or not in a locked facility, and unknown to society should be re-entered into the jail system using the formula provided. In essence laws will be changed to protect the innocent. Furthermore, as other policies may change without notice, predator laws may change without predator notice. In any event, an argument might occur that a law is being changed after the crime and the new law is applied. Point being, common sense should rule where “Thou shall not molest children” is applied before or after a horrendous crime is committed. Furthermore, since Constitutionality may apply and the Constitution is based on GOD’s law, then retro activity should occur. Unfortunately, as stated by Diederich (2000), “The Constitution bars both state and federal legislatures from passing ex post facto laws” (p. 1). In essence challenges remain toward predator retro activity.

Family or associated child abuse organizations: Children are not born as predators. However, children through their upbringing and surrounding through family abuse develop into predators. In essence, parents or associates of children who through neglect and abuse create predators and should be held accountable for creating predators. In essence if the parents did not abuse the child, then the child does not become a predator. Abuse conditions may be starvation, isolation, excessive punishment, or any deemed abnormal condition. As stated by Hickey, Ph. D. (2010), “The early recognition of these signs can save a child from growing up an angry and isolated adult who turns to violence as a way to relieve his childhood pain.” In essence the predator is relieving his childhood pain through violence and prior neglect and uses violence toward recognition. Thus, associated adults who were parents to predators must pay through monetary and jail time sending messages of predator intolerance. Hence, through discovery, predator creators can be brought to justice.

Note: The above article was written in response to the Amber Dubois and Chelsea King slaying combined with using acquired educational training. In addition writing to the King family produced no results, thus hopefully King or Dubois family direction will be guided toward this site for enhanced justice system. In addition further references toward the aforementioned can be acquired from the author providing further insight toward justice. Contact email is [email protected].

References:

Hickey, E. Ph. D. (2010). Eric W. Hickey, Ph.D. Criminologist – Consultant. Retrieved March 18, 2010, from website http://erichickey.com/

Diederich, B. R. (2000). Risking Retroactive Punishment: Modifications of the Supervised Release Statute and the Ex Post Facto Prohibition. Social Science Research Network. Retrieved March 20, 2010, from website http://papers.ssrn.com/sol3/papers.cfm?abstract_id=212878

[Top]

Computer Forensics and Legal Aspects

Posted on February 5, 2019 in Uncategorized

The rate of crimes on internet and networks is increased to an alarming state by hackers, contractors, intruders and employees. Laws are enforced and computer forensics is practiced to avoid and prevent these crimes. Using computer forensics investigators use latest techniques of science and technology to find some evidence against crimes. The evidence will be collected for legal purposes when criminal matters are dealt. Investigation by using latest techniques of science and technology along with computer sciences to collect evidence in criminal and civil courts is called computer forensics. Experts use advanced tools to recover deleted, corrupted or damaged files from hard discs, flash drives and other storage media. A complete examination of windows registry, drives, cookies, deleted files, emails and all other relevant locations is done to find any clue to prosecute the case in law courts.

The first step in collecting evidence is to obtain warrant to search the suspected system. This warrant includes not only seizing and investigating the suspected computer but any devices connected with the crime are also included in it. A printer, scanner or any other device may be used with computer in making crime so these devices are also seized for investigation. Person who examines the computer system is not only an IT expert but a detective. He detects clues to find out the story or details of the crime. The main aim of an investigator or expert is to find out evidence not the culprit. Using computer forensics large amounts of money are recovered by following the law suits in civil and criminal courts.

Computer forensics specialist revealed frauds, crimes and corruptions in insurance companies, criminal prosecutors, large corporations and law enforcement office. The standards, methods and laws of computer forensics are different in different countries. Some evidence is acceptable in some countries but not in others while dealing with crimes at international levels. There is no boundary of internet so it is a problem while investigating and collecting evidences because different countries have different laws.

Personnel, Network administrators and security staff should have knowledge about computer forensics and its legal aspects. An expert should have authority to monitor and collect evidence related to intrusions and computer crimes. The use of security tools should be legal and according to the policies of the company and rules of the country. Computer forensics is a new discipline so the use of existing laws is instable while prosecuting computer crimes. Website of United States Department of Justice’s Cyber Crime is the reliable source of information and rules to apply it. Standards of computer forensics and list of recent cases which are in proceeding are given on the website. Evidences are collected in a way which is accepted by the court. Laws are being approved in the favor of personal data security in organizations.

Organizations have to prove that they have applied necessary securities. So when data is theft or affected then there will not be any lawsuit on the company if proper security applications and policies are installed and implemented.

Computer security law has three areas which one should know. First is in United States Constitution; it protects against unreasonable search, attacks and self-incrimination. These were written before problems occurred but tell how to practice them.

In the second area anyone practicing computer forensics should know the effect of three U.S. Statutory laws.

Wiretap Act

Pen Registers and Trap and Trace Devices Statute

Stored Wired and Electronic Communication Act

During the practice of computer forensics violations of any one of the above statutes lead to fine or imprisonment. If a company feels any doubt about that it has committed mistake it should consult with its attorney.

In third area U.S. Federal rules about computer crimes must be understood. There are two areas which affect cyber crimes

1. Authority to collect and monitor data

2. Admissibility of collection methods

If network or system administrators know about the legal and technical complexities of computer forensics or they are able to preserve critical data of the organization then it would be an asset of the organization.

[Top]