CJUS_jan21

CJUS_jan21 - CJUS-P300 Notes January 21, 2010...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CJUS-P300 Notes January 21, 2010 Sending/Receiving E-Mail The ways people learn: Auditory Visual Through movement Header – essentially metadata Internet protocol address: 4 numbers separated by 4 dots (IP address) – doesn’t past 255 Resolving an email address! You need to have not only IP address but exact date and time. Tracing Internet Communications To locate an offender, you generally need seven things: An Internet Protocol (IP) address Date and time the IP address was used An unsophisticated offender Immediate preservation of server records describing how the IP address was used Rapid acquisition of data from servers Rapid link analysis of the evidence Detective and prosecutor working together Threatening Email Example What is threatening communication?nm 12 Objective standard Would a reasonable person in the position of the recipient understand that the words communicate a threat Example from US v Sullivan -
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

CJUS_jan21 - CJUS-P300 Notes January 21, 2010...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online