There are various challenges that face law enforcement agencies, but the writer talks about two of them in this essay. First of all is the frequent change in computer technology, technology in computers keep on upgrading every generation and the means established by enforcement agencies to counter such crimes keep on getting expired. The second challenge is authority or jurisdiction. Computer crimes are hard to prevent because they can be committed from any part of the world, and the law enforcement agencies find a difficulty of a different jurisdiction. These are the two major problems especially the advancement in computer technology since and the public at large putting more reliance on technology.
There are a number of issues that deserve serious consideration when developing a search warrant of which these two need much attention. First, the warrant should specify whether the search is involving seizing hardware or it is concerned with only the information. It is important for the warrant to state the nature of the crime committed and describe the hardware ought to be seized. If the warrant is only targeting the information only then the physical computer of a person should be spared. The second consideration is supposed to be particularity of the things, place where the search is going to take place, and category of persons to be searched.
In conclusion, the implementation of the search warrant will infringe on USA citizens’ privacy. The law enforcement agencies will at some point wrongfully use the search warrant to violate the right to privacy. It is therefore advised that the search warrant should only be issued when need arise and not on a law enforcers wish.
Reference
Taylor W. R & Fritsch J.C (2014) Digital Crime and Digital Terrorism (3rd Ed). New York, Prentice Hall.
Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing.