Loading...
Please wait, while we are loading the content...
Similar Documents
Apprehending the Suspect and the Investigation that Follows
| Content Provider | Scilit |
|---|---|
| Author | Bandler, John Merzon, Antonia |
| Copyright Year | 2020 |
| Description | This chapter focuses on the practical and strategic aspects of planning a cybercrime arrest, ensuring that evidence is gathered at the time the suspect is apprehended, as well as the continuing steps of the post-arrest investigation. It discusses the arrest process of an identified cyber suspect. Once a cybercrime suspect is identified, and the proof and articulation of this identification can be established to the necessary degree, law enforcement officials, prosecutors can begin the process of planning the suspect's arrest. The court may consider whether the arrest warrant is valid, the suspect is the person named in the warrant, the wanting jurisdiction will come to arrest, transport the defendant. To arrest an identified suspect within a foreign country, that person has to be the subject of an arrest warrant on charges in the US for at least some of his criminal conduct. Investigators learn of the existence of new devices, storage spaces, criminal associates, and aspects of the suspect's activity. Book Name: Cybercrime Investigations |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2018-0-95855-6&isbn=9781003033523&doi=10.1201/9781003033523-17&format=pdf |
| Ending Page | 292 |
| Page Count | 8 |
| Starting Page | 285 |
| DOI | 10.1201/9781003033523-17 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2020-06-22 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Cybercrime Investigations Criminology and Penology Aspects Cybercrime Arrest Warrant Criminal Apprehending Investigators Identified Suspect |
| Content Type | Text |
| Resource Type | Chapter |