This website uses cookies to ensure you have the best experience. Learn more

Wildlife Forensics And Investigation Essay

917 words - 4 pages

Wildlife forensics is fairly uncharted territory to the investigation process of the criminal justice system today. This is because the criminal justice system has only recently discovered that wildlife crime is increasing and that the needs to successfully investigate a wildlife crime are quite different than those of a homicide. To understand the importance of wildlife forensics, what constitutes as “wildlife crime” must be distinguished. Also, knowing what makes wildlife crime so desirable is a good start at learning what preventative measures to take. What is considered wildlife crime, why this type of crime is rising, and the forensic scientist’s roles and significance of DNA are all ...view middle of the document...

Similar to the example used in bio-terrorism and domestic security, the selling of tusks or horns may finance weapons purchases of terrorist groups, which would be categorized within international terrorism. Poaching is a very broad term; poaching can mean hunting in an off-season, killing more deer than a hunter has tags for, etc. Food security can be a very harmful crime because of its ability to endanger a large population. An example of food security would be fraudulently labeled food being brought into the US for distribution. According to SWG “wildlife crime makes up the third largest form of illegal international trade” (SWG, 2012, p4). The two leading forms are drugs and weapons.
As discussed earlier, there are many things that are considered poaching. It can mean the taking or killing of an animal without a license or permit, taking over the allotted limit, trespassing, the use of a prohibited weapon or trap system, taking during an off-season or inside the land lines of a park, and the taking of a prohibited sex or life stage. According to the SWG article, “non-human crimes also include the theft of rare plants and commercially, ecologically, and culturally important timber species” (SWG, 2012, p5). The issue with poaching is that it diminishes the resources and limits the opportunities for genuine hunters to draw certain tags which are necessary to participate. Lawful hunting has established “over 700,000 jobs nationwide, generating $17 billion in salaries and wages” (SWG, 2012, p5). The illegal hunting of an animal or poaching can be very alluring to some people. Unfortunately, the fine associated with non-human crimes is considerably low. Furthermore, the profit margin is substantially high for certain wildlife life crimes such as the exploitation of rare plants. The most troubling matter concerning poaching is that “60 percent of poachers are people who are involved in other criminal...

Find Another Essay On Wildlife Forensics and Investigation

Short description and explanation of Forensics in the legal system

545 words - 2 pages , in which they process and give obscure, unique details about the possible suspect. Handwriting identification is done through experts that study a signature given to them and try to match it to that of a suspect captured by the police. These are most often used in false contracts and stolen identities. The art of photo enhancement was brought into the forensics world in the early 1990's. It is used to find minute details in a crime investigation

Computer Crime Investigations Forensics Research Essay

546 words - 2 pages presented an opportunity for research of my choice in Computer Crime Investigations Forensics and Tools and Technology by preparing keys points, to define the business research and its purpose, explain the business problem(s) under investigation, identify the parties involved in conducting the research and describing the method(s) used to conduct the research.Research and PurposeThe Computer Crime Investigation Forensic Tools and Technology research

Computer Forensics

1581 words - 6 pages , and analyzing the data. Acquiring the evidence in a computer forensics investigation primarily involves gaining the contents of the suspect's hard drive. Ideally, the forensic analysis is not done directly on the suspect's computer but on a copy instead. This is done to prevent tampering and alteration of the suspect's data on the hard drive. Authentication is the process of ensuring that the evidence has not been altered during the acquisition

CBSC301 Midterm

1236 words - 5 pages Companies Specializing in Computer Forensics and Updates on Computer Crime Prosecution Computer forensics is defined as the act of analyzing digital information in an attempt to discover evidence and report the findings in a legally admissible form. Computer forensics teams are highly trained individuals with ongoing training that helps them keep up with the current trends in computer crime. Certifications qualify these individuals to conduct

The NIST Computer Forensics Tool Testing Program

728 words - 3 pages In order for computer forensics findings to be admissible in a court of law, the tools and methods used to collect such data must ensure its integrity. According to Marie-Helen Maras (2012), “As with other forms of evidence, the original captured network traffic data must be kept intact. An investigator must ensure that any programs that are run to obtain evidence do not modify data on the system” (p.286). The National Institute of Standards

Criminal Justice Fields

978 words - 4 pages vessels visible from the surface of the skin. Though used by the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA), this method of identification is still in development and has not yet been universally adopted by crime laboratories as it is not considered as reliable as more established techniques, such as fingerprinting. (Watanabe, Shiohara, & Sasaki, 2005) Mobile device forensics is the newest branch of digital

A History of the FBI Regional Computing Forensics Laboratory

1219 words - 5 pages investigation and analysis techniques in the interest of determining potential legal evidence” [Nelson, Bill, Phillips, Amelia, Enfinger, Frand, and Stewart, Chris (2004)] and has been prevalent in the law enforcement fields and government agencies since the mid-1980s. [Daphyne Saunders Thomas, Karen A. Forcht(2004)] Yet still, the existence does not justify the cause for the creation, development, and the integration of computer forensics into daily life

Cloud Forensics

1033 words - 5 pages -Discovery and Cloud Computing: Control of ESI in the Cloud, 2010 Dan Morrill, Cloud Computing Making Forensics Easier , 2008 Dejan L, Cloud forensics:An overview, 2014 Dykstra J., Damien R, Forensic collection of electronic evidence from Infrastructure as a Service Cloud Computing, 2012 ELSEVIER, Digital Investigation 10, 2013 Gardner Inc, Cyber Forensics in the Cloud, 2010 Gartner Inc., Cloud Computing Will Be As Influential As E-business, June 26

Data Acquisition

1869 words - 7 pages determine which acquisition method to use for an investigation, consider the size of the source (suspect) disk, whether you can retain the source disk as evidence or must return it to the owner, how much time you have to perform the acquisition, and where the evidence is located. Acquisition Tools for Linux: Acquiring Data with a Linux Boot CD: The Linux OS has many features that are applicable to computer forensics, especially data acquisitions

Cobra Event Essay: What are the similarities between epidemiology and forensics?

781 words - 3 pages Epidemiology is the study of epidemics of disease. An epidemiologist, searches for the source of the disease in an epidemic, determines a preventive measure for the disease, and then finally searches for a cure. Forensics, while it is a completely different field, it too is a profession that tries to backtrack and scientifically find the answer in an investigation. However, forensics is the science of looking at physical evidence to analyze a

Research Conclusion

1770 words - 8 pages process. During the preparation stage of the investigation, an investigator trained in the conventional methods of digital forensics will usually obtain a comprehensive history and overview of the crime scene, and have a idea of what will be required from the organization in order to proceed with the investigation. However, in the case of network forensic investigations, there is a no comprehensive history and overview of the suspected crime scene

Similar Essays

Computer Forensics: Issues In Preserving Digital Evidence And Forensic Investigation

1931 words - 8 pages tools are not used and followed. An existing issue in FIT is computer forensics, in regards to preserving digital evidence and effectively conducting a computer forensics investigation. Computer forensics can be defined as the who, what, when, and how of digital (electronic) evidence and how techmology is used to preserve, authentic, and analyze the evidence collected (citation 17utah). If obtained evidence is not handled propely, this could

Forensics Anthropology Essay

914 words - 4 pages hospitals, schools, and other places throughout NewOrleans,Louisiana.The administration of human remains began,the remains must be mended. Archaelogist are also needed in the event of recovering remains. They help carefully record the information found at the scene of a mended body. The information recovered from Hurricane Katrina's forensics investigation was used to document information for insurance claims. Forensic Investigations

Critical Thinking Article & Critique Forensics Mgt350 Critical Thinking

612 words - 2 pages Recently, an article in the Wall Street Journal questioned whether forensics courses belong in the elementary and high school curricula. Is it possible that blood and gore could desensitize kids to crime, making them more prone to act violently in their schools and communities? (Palevitz, 10) According to Jeffery Tomberlin, a PhD forensic entomologist in Tifton, GA, the answer is no. "Students examining a forensic investigation are often asked

A Forensics Memory Study Of Malware In Android Operating Systems

2744 words - 11 pages , process caches, suspicious network connections, and other suspicious executed codes. Commercial Android tools like FTK and Encase [19,17] can be used for Android content recovery and forensics investigation, and these tools are fairly easy to deploy, but are expensive solutions for small to medium business. This research illustrates Android memory forensics using open source, freely available tools. We use the recently available, first stable