.

Sunday, January 27, 2019

Emerging Technology Essay

The purpose of this paper is to summarize the expediencys of calculators/softw ar and the utilise of figurer engine room in investigations. Summarize the disadvantages to impartiality enforcement with respect to the advancements of com regorgeers. Real upshots exit be researched in order to understand how com regulariseers peck be use in criminal activities, as well as a case that the use of a electronic computer was beneficial to the prosecution in a criminal case. A final conclusion paragraph go forth manner of speaking my personal subjective opinion as to whether these technologies, in an overall smell ar a benefit or hindrance to truth enforcement efforts. launchSince computers defy be sleep together such a big part of our lives it is no surprise that even criminals right off know how to hack into large computer ne bothrks. Obtaining electronic evidence may be one of the most ticklish fonts of evidence to re hug. an opposite(prenominal) issue is authenticatin g this evidence however with the help of well-grounded standards this evidence is admissible in court today. Even though computers are the most dominant form of applied science that is employ in a variety of situations, there are set backs to everything and computers are no exceptions as this paper will explain (Forensic Science, n.d.).The Advantages of Computers and the Use of Computer Technology in Investigations In order to paint an accurate picture of the advantages of computers and technology relating to investigation we must(prenominal) start as close to the beginning as possible. This would be when President Johnson in his State of the union Address to Congress in 1968. This is where the President made the announcement to bring the most advanced technology to the war on discourtesy in every city and country in America (Northrop, 1993). It was less than ten months when the congress along with the President, put into law the Omnibus criminal offence Control and Safe Str eets Act of 1968.This law created the Law Enforcement Assistance Association (LEAA), to handle and deliver on the see of the President of technological assistance. During the next ten years the LEAA contributed meanly $50 one million million million to state and local anesthetic anesthetic government criminal justice and law enforcement agencies for disgust contradicting. Otherfederal agencies like the FBI matched the funding as well as local and state governments themselves (Northrop, 1993). To demonstrate the usefulness of computers by police in the fight against criminal offense, this pare to the paper will refer to results from a comprehensive repeated-measures athletic field study that looked specifically at how useful computers are to police in the fight against crime.The study focused on a particular soma of computer use, which was the searches for vital info because this is the bulk of computer activity for officers and are valued by the police in their fight against crime. Between 1976 and 1988 the breeding did show a clear improvement in both the use of and benefits from such clays (Northrop, 1993). The only drawback is that the investment in search systems and the promise they throw a style for improving police effectiveness is badly cons accomplished by deficient training of patrol officers and sc show ups (Northrop, 1993). However, there is a very simple resoluteness to this small glitch and that is to create an adequate training system and put all officers through that training program (Northrop, 1993).The most not adequate to(p) trouble facing officers was the chronic lack of information. This spans the range from the police chiefs shortage of information on how to use the departments limited resources to the patrol officers uncertainty over whom to demote and question regarding suspicious behavior. In the 1970s and early 1980s, this worry was turn to using a multi-facade management approach and there were big payoffs. The pro blem of improving how information was provided to police officers in the street or to the detective working a case was harder to fix. They soon realized the only way to specific individuals or cases was the existing records.However, the only means of utilizing those records was to look them up (Northrop, 1993). From utilizing computers in cars so officers could run a license plate and kind security number to see if there are any warrants out for the person they s gratuityped, to more advances such as carrying cell phones, GPS tracking systems in cars, crime mapping tools, information sharing between state and local law enforcement, to even sharing information across countries.Technology has come a long way in helping officers and other agents at bottom the criminal justice system do their job. Just a good turn more about the advantages of the things mentioned above and season to move on. The most fire thing is Geographic Information Systems (GIS), which has become a most of t he essence(p) tool for law enforcement agencies. GIS, othermapping software and desktop computers now are able-bodied of mapping and data analysis that is way above and beyond what used to be possible with backroom mainframe computers (Rubley, 2011). Another great advancement is the widespread use of everyone using mobile devices. Many officers now use two to lead cell phones. The invention of apps has made it easy for everyone to tap a button and instantly retrieve valuable information. Information that used to matter several steps to obtain using a browser is now at the officers fingertips.Mobile technology is evolving all the time and it is evolving fast, even in the past few years the government has been able to identify a suspect through a facial actualisation app on the iPhone, look up a potential jurors social media compose during voir dire, and now they even have real time data be adrift to mobile devices which tail provide information on a flitting or get instant i mpertinentlys feeds. There is no uncertainty that computers and technology have restitutionn law enforcement to a whole new level (Rubley, 2011). What Disadvantages Face Law Enforcement with Respect to the Advancements of Computers? One big disadvantage is that there is such a high volume of information world exchanged daily on the internet and while this is a well-off thing for most of us, there are also criminals taking advantage of the opportunity. There is corporate fraud, theft, intellectual property disputes, and even split of narrow and asset recovery issues.These are about of the situations that use computers to charge up the crime and use computer forensics to solve the crime (n.a., 2009). An additional disadvantage is do sure that the digital evidence is going to be admissible in court. Since data can be modified very easy, the analyst must be able to comply with the standards of evidence required by law. The analyst must make sure their investigation is fully do cumented and accounted for. Another real disadvantage is the cost of retrieving the data. Computer forensic experts are chartered by the hour and the process of analyzing and reporting the data can take up to 15 hours depending on the nature of the case (n.a., 2009). Other disadvantages are really the same ones facing all users of technology.If the system is d birth there is no information that can be retrieved. If the user is not trained in using the technological equipment at his/her disposal then this will be a waste of time. If the input of information is incorrect which sometimes occurs because of human error, then that will cause a problem for officers in the long run. The effort Chosen to be researched where the Computer was used to care in the Commission of a Crime. 3 NJ Students Charged in School Computer HackingOn April 14, 2010, in Haddonfield N.J. three students hacked into one of the top preforming High Schools. They are now facing charges for attempting to change the ir grades once they were into the system. The three students are boys, ages 14, 15, and 16 but because they are minors their names have not been twistd. The Boys were embed out when a staff member found one of the boys using keystroke capture software on one of the computers at the school in an attempt to steal a teachers password. That student then implicated the others in this crime.The boys were charged with illegally obtaining information and were released to their parents (Associated Press, 2010). This is a wonderful example of how people, who might never have attached a crime in their lives, get ideas about computers as if this is not a crime. They get on the internet, explore places and things that are illegal and never think twice about it because they are either in their own home and feel protected, or they feel that it is easier to get away with computer related crimes and take their chances.There is too much technology and it is terrible in the wrong hands. People need to realize that especially crime on the internet will always be solved sooner or later because what you do on a computer leaves a print forever that can never be erased. look for Case Where a Computer was Beneficial to the Prosecution in a pitiful Case In this case a woman age 45, named Sonia Martin, from Nigeria and Chicago, Illinois was handler of a Chicago cell in one of the most advanced and organized computer hacking and aura cash out schemes ever perpetrated (U.S. lawyers Office, 2012). On August 12, 2012 she was sentenced to serve two years and sixsome months in a federal prison on charges of conspiracy to commit wore fraud. She will also serve five years of supervised release and $89,120.25 in restitution fees (U.S. Attorneys Office, 2012). According the United States attorney Yates, in November of 2008 a group of hackers obtained unauthorized access into the computer system of a company called WorldPay US, Inc., then known as RBS WorldPay, which is a defrayal proces sor in Atlanta.The hackers were very sophisticated and used some brass techniques to compromise the data encryption that WorldPay used to protect the customers data on payroll debit carte du jours. These are used by more and more companies to pay their employees. This is convenient for employees as they can use the debit display board right away or use it to withdraw their salaries right from an aura (U.S. Attorneys Office, 2012). Once they were in, hackers raised the balances and ATM withdraw limits on the compromised accounts. They then provided a network of lead cashers with 44 debit card account numbers and their PIN numbers, which they used to withdraw more than $9 million from over 2,100 ATMs in at least 280 cities worldwide, including cities in the United States, Russia, Ukraine, Estonia, Italy, Hong Kong, Japan, and Canada (U.S. Attorneys Office, 2012).The whole thing, $9 million dollars, took less than 12 hours to pull off on November 8, 2008 (U.S. Attorneys Office, 2012 ). Throughout the cash out the hackers monitored these fraudulent ATM withdraws in real time from inside the computer systems of WorldPay. Once the transactions were complete the hackers sought to repeal data stored on the card processing network so they could cover up this illegal activity. WorldPay discovered the unauthorized activity and reported the breach (U.S. Attorneys Office, 2012). Sonia Martin was working with one of the lead cashers and supervised a cashing crew in Chicago. Martin was given PIN codes, and payroll cards, and then make counterfeit debit cards based on that information. So she hand out cards to her underlings that she recruited and supervised. Together they all withdrew approximately $80,000 from various ATMs around Chicago, during the early morning hours of November 8, 2008. Martins primary mention is Nigeria (U.S. Attorneys Office, 2012).This case was investigated by special agents of the federal office of investigations. Other who helped provide assi stance included numerous domestic and world(prenominal) law enforcement partners and WorldPay immediately reported the crime and substantially assisted in the investigation (U.S. Attorneys Office, 2012). ConclusionMy belief is that the new technology and computers have really given law enforcement some spectacular tools to do their job. I feel that technology has aided in the increase of incarcerations. Anytime criminals can be taken off the streets or even out of the loathsomeness of their homes where they are committing crimes, this is a good thing. Yes there are some disadvantages that can also be dealt with. The problems of officers being unaware of how to use some of this modernistic technology can be cured by sending them to some training programs. All officers need to be aware of what evidence to roll when it is possibly on a computer and the chain of custody that this type of technology requires.As technology advances, unfortunately so will the crime that is being commit ted with that technology. Officers everywhere must be able to serve to these crimes effectively. This is why it is so important for every department to keep up with the fast paced computer technology, cell phone technology and any other technology that will aid in catching the bad guy. ReferencesAssociated Press. (2010). 3 NJ students charged in school computer hacking. Retrieved June 6, 2013, from abclocal.go.com http//abclocal.go.com/wpvi/story? sectionalisation=news/technology&id=7386890 n.a. (2009). Advantages and Disadvantages of Computer Forensics . Retrieved June 9, 2013, from anushreepatil.ewebsite.com http//www.anushreepatil.ewebsite.com/articles/advantages-and-disadvantages-of-computer-forensics.html Northrop, A. (1993). Police of Computers.Retrieved June 10, 2013, from Center for Research on Information http//www.escholarship.org/uc/item/71x0h7hbpage-2 Rubley, S. (2011). How Has Mobile Evolved to Help the Investigative association . Retrieved June 9, 2013, from Blog. Thomson Ruters.com http//blog.thomsonreuters.com/index.php/how-has-mobile-evolved-to-help-the-investigative-community/ U.S. Attorneys Office. (2012, August 12). Sentencing in Major International Cyber Crime Prosecution . Retrieved June 9, 2013, from FBI.gov http//www.fbi.gov/atlanta/press-releases/2012/sentencing-in-major-international-cyber-crime-prosecution

No comments:

Post a Comment