issc 451 forum question

I need a 150 word reply to two separate forum questions.

forum 1:

1. Which federal law enforcement agency has assumed primary responsibilities in the area of access device fraud, including the fraudulent use of credit card numbers, personal identification numbers, and computer passwords? Find and cite a case in reference to one of the above online crimes. Please give your opinion on whether you agree or disagree with the verdict or charges. (Use Findlaw or other online

With emphasis on access device fraud which is categorized as the illegal use of credit card numbers, personal identification numbers, and computer passwords. In the aspect of digital crimes we recognize more with Title 18 of the United States Code (USC) § 1029 the United States Secret Service is responsible for criminal acts of fraud as they are related to communications, financial institutions, false identification documents, access device, electronic funds transfers, and money laundering” (U.S.C., 2011). Which people are charged for phishing or spam emails in order to retrieve information or passwords.

In the case United States vs. Edward Allison, Allison and co-defendant Peralta were charged with one count of conspiring to defraud using an unauthorized access device and four counts of using an unauthorized device.  Eventually, it was the co-defendant Peralta, who used her permissions as loan processor for the Bank of Hawaii to gain access to credit cards that was not supported by applications to acquire services and cash advances.  Overall, they collected over $40K in unaccredited transactions.  Allison was charged with four months’ imprisonment and house arrest.  In my opinion, I think the sentence was very light.  I would only agree on the maximum sentence of 10 years in jail.  

2. When preparing for an investigation, what is the most important factor in determining the level of skill and resources required to investigate a potential crime? Explain each of the possible options for planning the investigation.

The most important factor when determining the level of skill and resources needed to investigate a crime scene is a person ability “to distinguish a crime as either a single-scene, multiple-scene, a network crime scene” (Taylor, 2014).  In other words, the involvement of the crime scene when it comes to computer technology.  For example, does the crime take place in a residence, in multiple locations, or in large structures such as Microsoft.  All of these factor in on the level of law enforcement which is imperative on investigation on a crime scene. The digital crime scene is a new and uncharted area for local and mid-level investigators.  However, everyone must have knowledge on how to manage a crime scene and to be able to collect evidence.

Very Respectfully,

Chrissy

References

Taylor, R., W., Fritsch, E., J., & Lieder Bach, J. R. (2014). Digital Crime and Digital Terrorism. Prentice Hall – Pearson. 3rd Edition. ISBN-10: 0133458903. ISBN-13: 978-0133458909.

United States Code. (2011). Title 18 – Crimes and Criminal Procedure, Sec. 1029: Fraud and related activity in connection with access devices. Retrieved from https://www.gpo.gov/fdsys/pkg/USCODE-2011-title18/…

United States Court of Appeals. (1996). United States of America, Plaintiff-Appellee, v. Edward Allison, Jr., Defendant-Appellant, No. 95-10289. Ninth Circuit. Retrieved from http://caselaw.findlaw.com/us-9th-circuit/1052712….

Forum 2:

Which federal law enforcement agency has assumed primary responsibilities in the area of access device fraud, including the fraudulent use of credit card numbers, personal identification numbers, and computer passwords? Find and cite a case in reference to one of the above online crimes. Please give your opinion on whether you agree or disagree with the verdict or charges. (Use Findlaw or other online 

In the United States, it is very difficult for local and state law enforcement to take lead on device fraud cases, mainly because jurisdiction restriction may come into play, making it difficult for these law enforcement agencies. According to Title 18 Federal agencies like the Secret Service has been deemed the head agency when it comes to cases of this sort, because they can work inside and outside state and local jurisdictions. The Secret Service may also utilize the local and state law enforcement agencies to assist in their specific jurisdictions, as well as the utilization of the private and public sector (Taylor, Robert W., Fritsch, Eric J., & Liederbach, John, 2015).

On November 5, 2017 the Chambersburg police reacted to a call that took place from the F&M bank, regarding access device fraud. Law enforcement learned that a white male suspect had attempted to gain access of funds through the utilization of a fraudulent ATM card. There had been a reported seven other fraudulent access attempts related to this same incident. The same suspect has been identified in other nearby jurisdictions. The suspect has been seen on bike as well as utilizing a 2017 GMC Terrain in one of the jurisdictions. This suspect is still at large, but if caught would most likely be convicted of his wrong doings (Chambersburg Police Department, 2017). 

In another case I found, a woman from Illinois had stolen over 53 million dollars in a money laundering scheme from the city of Dixon. She was using the funds to fund her quarter horse farm and for other personnel uses. She faces a maximum of 20 years in prison, but many feel she will only serve 15 years or possibly less. I believe that this is an incredible amount of money stolen from hard working people and she should receive a harsher punishment Laws, 2012).       

When preparing for an investigation, what is the most important factor in determining the level of skill and resources required to investigate a potential crime? Explain each of the possible options for planning the investigation. 

The most important factor that criminal investigators must prove before knowing what tools and resources will be needed to properly investigate a crime is gaining a search warrant. The criminal investigator must be able to prove that there is enough evidence within the place or thing needed to be searched to begin with, along with knowing if it’s a single-location crime scene, multiple-location crime scene, or network crime scene. The distinction between the crime scenes can be the functional differences needed for the proper lead investigative measures (Taylor, Robert W., Fritsch, Eric J., & Liederbach, John, 2015).  

Nate    

Chambersburg Police Department. (2017). Multiple Access Device Fraud Incidents. Retrieved from https://franklin.crimewatchpa.com/chambersburgpd/21193/cases/multiple-access-device-fraud-incidents

Laws. (2012). Former Comptroller Stole $53 Million from City of Dixon. Retrieved from https://fraud.laws.com/fraud-news/former-comptroller-stole-53m-from-city-of-dixon-35477.html

Taylor, Robert W., Fritsch, Eric J., & Liederbach, John. (2015). Digital Crime and Digital Terrorism. Retrieved from https://online.vitalsource.com/#/books/9781323288689/0

"Is this question part of your assignment? We can help"

ORDER NOW