.

Monday, February 25, 2019

Future Criminology Essay

The advancements in engineering conduct pop off natural rightfulness enforcement tallyicers to the rescue of an abducted child. Couple of decades ago law enforcement agencies did non hasten the technical resources such(prenominal) as the amber broodly ashes as they do today. technology has enables the joined States of America to drug ab drug abuse up positive changes in socialization of Ameri canful citizens. Technology has also support the United States in preventing domestic terrorism. Law enforcement agencies squander spent billions of dollars on technical logical equipment to aid in the defense of the coun undertake. Law enforcement agencies location heavy emphasis on advancing communication. As law enforcement officials try to improve communication dvirtuoso engine room, criminals be advancing in cyber law-breakings. umpteen identity thefts be committed to the profit scammers employ phishing techniques to gather individualized information from people rathe r than criminals who rob mail boxes in post to gather protest(prenominal) information.As technology advances criminals adapt as intumesce. This composing give display the positive aspect of future curse conflict as well as highlight the negative aspects. The direction of evil trash has already been displayed by law enforcement agencies who argon currently utilizing mature technology. Law enforcement agencies have shifted focus on to social net utilizations that have no limitations. Cyber nuisance has become precise common in the American culture. In pass on everyday life people utilize some source of technical logical communication device, which leaves the door open to advanced criminals. Cybercriminals posses the abilities to disassemble persons life, through personal information hive awayd on communication devices. Cyber criminals usually assay for social security numbers, names, birthdays, bank account numbers, and pin numbers. The perceptions of cybercrimes b e considered to be an evolution of combined advancements in technology as well as identity theft, which has spread throughout the world. Cybercrime victimizers, target people who ar less k right offledgeable to the advancements of technology. Before the internet was realized identity theft was as simple as stealing personal mail, and rummaging through trash cans. Cybercrime enables advanced criminals to make a fast profit with less chances of world caught. estimatorhackers have the ability to hack prohibited information such as bank servers, with the overall goal of achieving large amounts of m whizzy. Online scams such as phishing for personal information have become the trend among advancing criminals. Cybercriminals atomic number 18 typically known for thievery of personal info spell trying to execute a financial gain. Cybercriminals have designed websites that appear to be legitimate, just now actually is quite the opposite. Cybercriminals have been gathering personal in formation through fake server windows with surveys, or something that would require all your personal information. concord to National Crime Prevention, An information broker, Choice post Inc., announced that an identity thief had hacked into their database and gained advance to hundreds of thousands of documents. Some stolen information included full names, social security numbers, office addresses and credit reports (NCP, 2011).A key to repugning off these advanced online crimes is aw beness. adept must(prenominal) be aw be that the Internet is a powerful pawn and is utilise in galore(postnominal) unscrupulous ways. natural law agents currently impart an entire unit toward dealing with cybercrime. Private Citizens must also be proactive when dealing with their identity. For example, be aw atomic number 18 of illegitimate companies, which wait for someone to let his or her personal information. It is always a good mind to raise security on computing devices that sca n for hackers and other(a) odd activity. closely important, be cautious when providing personal information to anyone on the Internet. The world we live in learnd to the point that we cannot assume an individual is trustworthy. That whitethorn be a sad reality, but taken very poorly. Cyber-criminals and their serves will currently create social policy implications. For example, crime fighting whitethorn soon fit that of a movie production. Crimes altogether become more technologically advanced, while cyber-crimes begin to resemble crimes from a sci-fi atmosphere. fit in to Reyes, a team of researchers from Santa Clara University atomic number 18 engendering predictive policing software (Reyes, 2011).Essentially, the high-tech software design is utilize to stop crime before it occurs. The high-tech software give ups advancement and the speed hand on the criminal. The software also allows law enforcement to pinpoint a precise area where speculated crimes may occur. The c rime is isolated or all told stopped before the damage begins. The software updates daily and provides current data, allowing constabulary forces to position themselves before anyillegal activity begins. This may grave like an innovative alikel that brings only a positive element, however, are these tools a way to cyber-profile individuals and allow law enforcement to make illogical assumptions establish on probability? nonpareil must be aware that individuals are innocent until proven guilty, not innocent unless they meet a mathematical formula. The advancement in specific crime fighting methods is spanking to the changing methods of criminal activity.Criminals are always looking for a ways to eudaimonia themselves, so law enforcement agencies must shift to advance policing in ordination to stay a step ahead of criminal offenders. Deoxyribonucleic acid (desoxyribonucleic acid) is a genetic material of a cells nucleus, which is a aggregation program that has become a grea t precision tool for law enforcement agencies to hear an alleged perpetrator or an alleged victim. The use of the deoxyribonucleic acid database is well known by alliance, because of the popular television shows such as Crime Scene Investigators (CSI), and Naval Criminal Investigative Service (NCIS), which have provided parliamentary procedure with examples as to how the deoxyribonucleic acid data base is utilized. The desoxyribonucleic acid data base is simply a tool to identify alleged criminals and or victims. According to forensic specialist, The database may include profiles of suspects awaiting trial, people arrested, convicted offenders and identifying unknown mud and even members of law enforcement (Schmalleger, 2012).Biometrics is the scientific discipline of analyzing biological data such as fingerprints, DNA, voice pattern recognition, retina scans and seventh cranial nerve recognition programs for the purpose of kind-hearted identification. It is energeticly be coming the most accurate means to identify individuals. A typical biometric scanner consists of a scanning device, software that puts the scanned info into digital form and compares it against a database (NPR, 2013). Biometrics started back in China in the 14th century. They used ink to stamp young childrens palms and footprints on paper for identification purposes. In most of the world until the late nineteenth century, identifying a person relied upon a persons memory or the use of crude drawings. In about 1890 a constitution was used that relied on certain body measurements to identify criminals. This did not work very well as it was discovered that it was not uncommon for some(prenominal) persons to have the same measurements. This system was replaced by Richard Edward Henry of Scotland Yard, whose fingerprint system provided a very accurate method of identification (Schmallager, 2012).The next generation of cleverness phones fromthe orchard apple tree Corporation has a newf ound operating system that lams biometric science into the consumer market. This new system uses a fingerprint scan technology to allow only the authorized user to operate it. Nowadays consumers unit lives are contained on phones including personal information, financial and credit information and addresses. Apple purchased a high-tech company named Authentec which specializes in fingerprint technology to develop this technology. This technology along with iris scan programs will surely have great impact on law enforcement agencies such as who has entre to sensitive areas, beneficials, thumb drives or documents. This may lead to limiting bother to firearms and maybe even who can fire a specific appliance (CBC News, 2013).Another new biometric technology that is being used in chime ins is facial recognition programs. Some upscale stores use these to recognize wealthy or famous customers as they enter a store and relay this to store employees. This program recognizes a specific person entering a store and compares it against a database of celebrities, sports stars and wealthy customers. It also gives the buying histories, clothing sizes and potential new products they may want to the sales persons. This program is strictly voluntary by most stores as the potential VIP customers want to save sequence or just be pampered. New technology allows two dimensional images to be converted to three dimensional that can make well-nigh foolproof identifications. This technology is being used by agencies in several cities in various ways to passively monitor the public for precious individuals. Law enforcement has adopted these methods for their own use. It appears that in some cases they are let the private sector engineer these technologies then apply them for their own use (CBC News, 2013).Law enforcement needs to stay ahead of these new biometric technologies as criminals are now working on ways to defeat some of these technologies. One way criminals use to obtain a persons fingerprints is off of a glass surface to gain plan of attack to computers or other fingerprint access systems. Another one is creative ways to screen your face from facial recognition programs (CBC News, 2013). Computer crimes have risen dramatically in recent years. These are usually referred to as cybercrime. Spyware is most oftentimes used to gain access to information contained on a computer or computer system. Spyware is de amercementd as software that sends information from a computer to a third party without consent ofthe owner that is unwanted, unwelcome or annoying. This can come with free software, file sharing applications or even games. Just visiting certain websites, also called drive-by, can install this software without your experience. Spyware is designed to find out what a person prefers buys and what they search for on the internet and allow its authors to make money from this information or possibly gain sensitive data from law enforcement or mil itary machine computers (CBC News, 2013).The Computer Fraud and Abuse venture of 1986 and amended in the 2002 patriot Act define computer espionage, trespassing and stealing information. These acts say it is a crime to knowingly counterfeit a device that allows unauthorized access to computer or telecommunication system, receive payments from persons with the intent to commit travesty or using illegally obtained credit card numbers (CBC, 2013). The section of Homeland Security is working on new programs and having success in countermeasures for cybercrimes. In 2011 they prevented $1.5 billion in business losses and made 72 arrests for people involved in sexual abuse of children on the internet. Police agencies have been reluctant in the past to combat cybercrime as it is high-ticket(prenominal) and time consuming to investigate but some are now getting involved in identity theft, child molesting using the internet to gain access to children and credit card fraud (DHS, 2013).Man datory DNA collection programs exist in all 50 states in one form or another. Most have laws mandating DNA collection for certain felony convictions and some for juvenile arrests. Some even allow collections prior to convictions as in California. California is being challenged in court by lawsuits by the ACLU. They feel that innocent persons are being forced to provide DNA samples. in that location is a DNA database called CODIS where agencies can browse data to identify suspects in crimes. This system allows agencies to positively identify or eliminate suspects (Legal Match, 2013). Unfortunately, the indicate that law enforcement evolves is often due to an unforeseen tragedy.For example, after the 9/11 tragedy the Homeland Security Advisory System was introduced. It was a color-coded system that communicated a terrorist threat level to federal and local agencies and throughout communities. The system was introduced in 2002 by Security Chief Tom Ridge (Reclaim Democracy, 2011). As is often the case when such controversial initiatives are brought forth, mixed views are common. Every U.S. citizen maintained a heightened sense of awareness andfear in regard to terrorism. In that sense, this initiative allowed for both federal and local agencies to work together toward their goal of eliminating terrorist threats, and allowed a roadmap for daily operations. Threat levels were assigned to separately suspect and federal agencies would act depending upon the level of the individual threat by implementing protective measures. Obviously, advocates of this plan argue that it leads to a safer environment because security agencies are adequately informed. However, one must also consider if these measures protect citizens or instill fear in them.One cannot argue that technology and attainment levels have not evolved. However, just because the technology and skill exists, does that mean that order of magnitude is better when they are put into action? One could argue tha t it is haughty to label individuals based on a color code, what does it take for them to blend in to the next category? One must also be assured that the individuals in charge of determining the color coding system may have had their own political agenda. For example, raising the terror threat level to extreme on the one-year anniversary of 9/11 may have been necessary, but may have been a political move to gain confidence of the public? Some critics argue the system drummed up support for wars and additional federal powers. As security technology overcompensates to evolve one document must not be overlooked, The Security sweetening Act. While the document design was to improve homeland security and provide comfort to the citizenry, its consequences raise many questions.The act revoked portions of the Freedom of Information Act in which society posses the right to achieve information pertaining to a champ or family member who is detained by the federal political science for a ny action that can be considered to be terrorism. The American government can polity whether or not they think citizens deserve information. Also, an individual could lose their citizenship upon fighting(a) in or providing material support to a terrorist (Reclaim Democracy, 2011). A vital element of this act is that it would allow the government to force citizens to submit to DNA samples if they are a suspected terrorist. Evolving technology provides a wealth of knowledge and understanding in regard to halting criminal activity. It provides methods that allow for quick response and action and can lead to a safer environment for people. However, one must consider the difference between technological advances and invasion of privacy.There is little doubt that getting a mouth swab for a DNA sample isan effective method but it is certainly not perfect. It would be foolish not to consider that many DNA samples flaw easily by not following procedures. This must be considered because c orrupted humans are collecting the data. Also, because of the large amount of samples tested, at what point does the sample become outdated and need resubmission. If an individual submitted to an initial test, is it thoroughgoing or ethical to mandate that they retest? There are constitutional amendments that are discussed and not disregarded because our nation suffered a tragedy. That tragedy must not be forgotten, but it is ill-advised to use one event as a predictor of all future events. That is why law enforcement must be careful when they seek to predict crime before it occurs.If the crime does not occur taxpayer funds go to waste. There is a fine line between protecting society and intruding upon its citizens. There must be awareness that while technology has advanced and aided society, the tests are still administered by humans who may serve his or her own needs over that of society. No matter how far individuals evolve technologically, society must proceed with caution beca use society may never be able to measure the intent of those operating the equipment. Evolving technology advancements and the future of crime fighting does not come without a fight. There are many individuals who question the intent of ethics of using proactive crime fighting methods. For instance, some individuals may feel that their rights are violated with the use of DNA, the government having access to personal information, and wide databases of information that have the chance of being hacked.It is not the intent of the government to have technology used against society however, it is possible. Different groups and organizations claim that the use of advanced technology is just the setoff of a new conspiracy act. It is not only the concerned citizens of the United States who struggle with the openness of private information but also worldwide groups as well as policy makers. It is thought that as technology advances policymakers will have to go the extra step to be proactive in the different inventions and programs to cheat or confuse technological advancements. According to Schmalleger (2012) Opposing ideological lines have divided our efforts to develop comprehensive anticrime programs. wooden-headed fissures in our social fabric have contributed to conflicting attitudes about crime and its control. Countries that pride themselves in advanced technology, feared by othernations. Just as the Bush administrations proved, technological warfare is on the brink of mass crushing devices (National Crime Prevention Council, 2012).While many individuals use technology as a way to prevent crime, some countries may ultimately use technology for total destruction. Whether society is fighting cybercrimes, using technology to fight future crimes, using technological advancements to predict crime, or allowing technology to lead the efforts of policymakers, technology has proved to be an advancement that does not come without deficits. Technology can make or break a country, but it can also divide nations and leave room for doubt. As technology advances, the stripe of crimes must also advance. It is not enough to assume that technological programs and breakthroughs will be enough to control crime.Crime control taken seriously and proactive steps taken to keep each breakthrough safe and ethical will wreak many benefits. In conclusion, law enforcement agencies are pointing in the positive direction for combating future crimes. The advancement of technological equipment in law enforcement is designed to enhance communication in aspects of imagery, and audio. Law enforcement agencies are already utilizing advanced imagery to resurrect a crime scene. The resurrection of a crime scene could possibly yield elaborate information lead to the apprehension of the offender. The overall perception in law enforcement will continue to be the same philosophy to apprehend alleged criminals. Technology assist local law enforcement officials in community poli cing, with surveillance placed in social common areas in aspiration to deter crime too also act as a witness to committed crimes in the radius view of the camera. Law enforcement agencies will continue to strive for improvements in combating crime.ReferencesCBC News, (2013). New Apple Iphone Pushes Biometrics into the Mainstream. Retrieved fromhttp//www.cbc.ca/news/technology/new-apple-iphone-pushes-biometrics-into-the-mainstream-1.1702041 part of Homeland Security, (2013). Combating Cyber-Crime. Retrieved from http//www.dhs.gov/combat-cyber-crimeLegal Match, (2013). Mandatory DNA Sampling. Retrieved fromhttp//www.legalmatch.com/law-library/article/mandatory-dna-sampling-in-a-cri

No comments:

Post a Comment