Monday, March 11, 2019
Emerging Technology Essay
The purpose of this paper is to iterate the advantages of reckoners/softw be and the usage of computer technology in investigatings. Summarize the disadvantages to rightfulness enforcement with respect to the advancements of computers. Real cases will be researched in order to say how computers burn be utilized in criminal activities, as tumefy as a case that the use of a computer was full to the prosecution in a criminal case. A final cultivation paragraph will address my personal subjective opinion as to whether these technologies, in an over all(prenominal) sense ar a benefit or hindrance to equity enforcement efforts. IntroductionSince computers have suffer such a big part of our lives it is no surprise that even criminals now acknowledge how to hack into large computer networks. Obtaining electronic show up may be integrity of the most difficult types of narrate to recover. other issue is authenticating this evidence however with the help of legal standards t his evidence is admissible in motor inn today. Even though computers atomic number 18 the most dominant form of technology that is utilize in a variety of situations, thither are roach backs to everything and computers are no exceptions as this paper will explain (Forensic Science, n.d.).The Advantages of calculating machines and the apply of Computer Technology in Investigations In order to paint an unblemished picture of the advantages of computers and technology relating to investigation we mustiness start as jam to the beginning as possible. This would be when President Johnson in his State of the due north Address to Congress in 1968. This is where the President make the announcement to turn the most advanced technology to the war on execration in every city and country in America (Northrop, 1993). It was less than 10 months when the congress along with the President, put into constabulary the Omnibus Crime delay and Safe Streets Act of 1968.This law created the Law Enforcement Assistance Association (LEAA), to maintain and deliver on the promise of the President of technological assistance. During the next decennium years the LEAA contributed meanly $50 million to state and local regime criminal justice and law enforcement agencies for plague fighting. Otherfederal agencies like the FBI matched the funding as well as local and state governments themselves (Northrop, 1993). To demonstrate the utilizableness of computers by police in the fight against crime, this pare to the paper will adjoin to results from a comprehensive repeated-measures field study that looked specific bothy at how useful computers are to police in the fight against crime.The study foc utilise on a particular class of computer use, which was the searches for vital development be realize this is the legal age of computer activity for take awayicers and are valued by the police in their fight against crime. Between 1976 and 1988 the data did show a clear good in both the use of and benefits from such systems (Northrop, 1993). The only drawback is that the investment in search systems and the promise they hold for improving police effectiveness is disadvantageously constrained by in tolerable training of patrol officers and detectives (Northrop, 1993). However, on that point is a very simple solution to this small glitch and that is to create an adequate training system and put all officers by means of that training platform (Northrop, 1993).The most notable problem lining officers was the chronic lack of selective information. This spans the value from the police chiefs shortage of information on how to use the departments limited resources to the patrol officers uncertainty over whom to stop and question regarding suspicious behavior. In the 1970s and early 1980s, this problem was addressed utilize a multi-facade management admission and there were big payoffs. The problem of improving how information was provided to police offi cers in the street or to the detective working a case was harder to fix. They curtly authoritativeized the only appearance to specific individuals or cases was the existing records.However, the only means of utilizing those records was to look them up (Northrop, 1993). From utilizing computers in cars so officers could run a license plate and social security number to see if there are any warrants out for the person they stopped, to more advances such as carrying cell borders, GPS tracking systems in cars, crime mapping in any casels, information manduction between state and local law enforcement, to even sharing information across countries.Technology has come a long way in helping officers and other agents within the criminal justice system do their job. Just a bit more about the advantages of the things mentioned above and meter to move on. The most interesting thing is Geographic Information Systems (GIS), which has become a most important tool for law enforcement agencie s. GIS, othermapping software and backdrop computers now are capable of mapping and data analysis that is way above and beyond what use to be possible with backroom mainframe computers (Rubley, 2011). Another great advancement is the widespread use of everyone using mobile devices. numerous officers now use two to three cell phones. The invention of apps has made it easy for everyone to tap a button and instantly retrieve invaluable information. Information that used to take several steps to obtain using a browser is now at the officers fingertips. rambling technology is evolving all the time and it is evolving fast, even in the past few years the government has been able to identify a suspect through a facial recognition app on the iPhone, look up a potential jurors social media profile during voir dire, and now they even have real time data streaming to mobile devices which can provide information on a fugitive or wank instant tidings feeds. There is no doubt that computers and technology have taken law enforcement to a whole new level (Rubley, 2011). What Disadvantages Face Law Enforcement with pry to the Advancements of Computers? One big disadvantage is that there is such a mellow volume of information being exchanged daily on the profits and while this is a convenient thing for most of us, there are also criminals taking advantage of the opportunity. There is corporate fraud, theft, intellectual lieu disputes, and even breach of contract and asset recovery issues.These are somewhat of the situations that use computers to commit the crime and use computer forensics to solve the crime (n.a., 2009). An additional disadvantage is making sure that the digital evidence is handout to be admissible in court. Since data can be limited very easy, the analyst must be able to comply with the standards of evidence required by law. The analyst must make sure their investigation is fully documented and accounted for. Another real disadvantage is the cost of retrieving the data. Computer forensic experts are hired by the hour and the process of analyzing and insurance coverage the data can take up to 15 hours depending on the nature of the case (n.a., 2009). Other disadvantages are really the same ones facing all users of technology.If the system is down there is no information that can be retrieved. If the user is not trained in using the technological equipment at his/her disposal then this will be a waste of time. If the stimulus of information is incorrect which sometimes occurs because of human error, then that will cause a problem for officers in the long run. The Case Chosen to be researched where the Computer was used to Aid in the Commission of a Crime. 3 NJ Students Charged in School Computer HackingOn April 14, 2010, in Haddonfield N.J. three students hacked into one of the top preforming High Schools. They are now facing charges for attempting to change their grades once they were into the system. The three students are boys, ages 14, 15, and 16 but because they are minors their names have not been released. The Boys were found out when a staff member found one of the boys using keystroke capture software on one of the computers at the schooling in an attempt to distract a teachers password. That student then implicated the others in this crime.The boys were charged with illegally obtaining information and were released to their parents (Associated Press, 2010). This is a wonderful example of how people, who great power neer have committed a crime in their lives, get ideas about computers as if this is not a crime. They get on the internet, search places and things that are illegal and never think twice about it because they are either in their own home and touch protected, or they feel that it is easier to get away with computer related crimes and take their chances.There is too much technology and it is dangerous in the wrong hands. People ingest to realize that especially crime on the inte rnet will constantly be solved sooner or later because what you do on a computer leaves a print forever that can never be erased. Research Case Where a Computer was Beneficial to the pursuit in a Criminal Case In this case a woman age 45, named Sonia Martin, from Nigeria and Chicago, Illinois was manager of a Chicago cell in one of the most cultivate and organized computer hacking and ATM immediate payment out schemes ever perpetrated (U.S. Attorneys Office, 2012). On August 12, 2012 she was sentenced to come two years and six months in a federal prison house on charges of conspiracy to commit wore fraud. She will also serve quintette years of supervised release and $89,120.25 in restitution fees (U.S. Attorneys Office, 2012). According the United States attorney Yates, in November of 2008 a group of hackers obtained unlicenced access into the computer system of a company called WorldPay US, Inc., then know as RBS WorldPay, which is a payment processor in Atlanta.The hackers were very sophisticated and used some daring techniques to compromise the data encryption that WorldPay used to protect the customers data on payroll debit cards. These are used by more and more companies to pay their employees. This is convenient for employees as they can use the debit card right away or use it to withdraw their salaries right from an ATM (U.S. Attorneys Office, 2012). Once they were in, hackers brocaded the balances and ATM withdraw limits on the compromised accounts. They then provided a network of hold up cashers with 44 debit card account numbers and their rowlock numbers, which they used to withdraw more than $9 million from over 2,100 ATMs in at least 280 cities worldwide, including cities in the United States, Russia, Ukraine, Estonia, Italy, Hong Kong, Japan, and Canada (U.S. Attorneys Office, 2012).The whole thing, $9 million dollars, took less than 12 hours to pull off on November 8, 2008 (U.S. Attorneys Office, 2012). Throughout the cash out the hacker s monitored these dishonest ATM withdraws in real-time from inside the computer systems of WorldPay. Once the proceeding were complete the hackers sought to destroy data stored on the card affect network so they could cover up this illegal activity. WorldPay discovered the unauthorized activity and reported the breach (U.S. Attorneys Office, 2012). Sonia Martin was working with one of the lead cashers and supervised a cashing crew in Chicago. Martin was given PIN codes, and payroll cards, and then manufactured counterfeit debit cards found on that information. So she handed out cards to her underlings that she recruited and supervised. Together they all withdrew approximately $80,000 from various ATMs around Chicago, during the early first light hours of November 8, 2008. Martins primary address is Nigeria (U.S. Attorneys Office, 2012).This case was investigated by special agents of the federal bureau of investigations. Other who helped provide assistance include numerous domes tic and international law enforcement partners and WorldPay immediately reported the crime and substantially assisted in the investigation (U.S. Attorneys Office, 2012). windupMy belief is that the new technology and computers have really given law enforcement some spectacular tools to do their job. I feel that technology has back up in the increase of incarcerations. Anytime criminals can be taken off the streets or even out of the darkness of their homes where they are committing crimes, this is a good thing. Yes there are some disadvantages that can also be dealt with. The problems of officers being unconscious of how to use some of this modern technology can be senior by sending them to some training programs. All officers need to be aware of what evidence to collect when it is possibly on a computer and the chain of custody that this type of technology requires.As technology advances, unluckily so will the crime that is being committed with that technology. Officers everyw here must be able to respond to these crimes effectively. This is why it is so important for every department to keep up with the fast paced computer technology, cell phone technology and any other technology that will aid in catching the bad guy. ReferencesAssociated Press. (2010). 3 NJ students charged in school computer hacking. Retrieved June 6, 2013, from abclocal.go.com http//abclocal.go.com/wpvi/story?section=news/technology&id=7386890 n.a. (2009). Advantages and Disadvantages of Computer Forensics . Retrieved June 9, 2013, from anushreepatil.ewebsite.com http//www.anushreepatil.ewebsite.com/articles/advantages-and-disadvantages-of-computer-forensics.html Northrop, A. (1993). practice of law of Computers.Retrieved June 10, 2013, from Center for Research on Information http//www.escholarship.org/uc/item/71x0h7hbpage-2 Rubley, S. (2011). How Has Mobile Evolved to divine service the Investigative Community . Retrieved June 9, 2013, from Blog.Thomson Ruters.com http//blog.thoms onreuters.com/index.php/how-has-mobile-evolved-to-help-the-investigative-community/ U.S. Attorneys Office. (2012, August 12). Sentencing in study International Cyber Crime Prosecution . Retrieved June 9, 2013, from FBI.gov http//www.fbi.gov/atlanta/press-releases/2012/sentencing-in-major-international-cyber-crime-prosecution
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment