Sunday, May 26, 2019

Emerging Technology Essay

The purpose of this paper is to summarize the advantages of ready reckoners/softwargon and the apply of computer applied science in probes. Summarize the harms to law enforcement with respect to the advancements of computers. Real cases provide be researched in order to understand how computers can be utilized in criminal activities, as well as a case that the use of a computer was beneficial to the prosecution in a criminal case. A final conclusion paragraph will address my personal personal opinion as to whether these technologies, in an oerall sense are a benefit or hindrance to law enforcement efforts. IntroductionSince computers have become much(prenominal)(prenominal) a big part of our lives it is no surprise that evening criminals at a time know how to hack into large computer networks. Obtaining electronic evidence may be one of the most difficult types of evidence to recover. Another issue is au whenceticating this evidence however with the help of legal standards this evidence is admissible in court today. up to now though computers are the most dominant form of applied science that is utilize in a variety of situations, at that place are set backs to everything and computers are no exceptions as this paper will explain (Forensic Science, n.d.).The Advantages of Computers and the Use of Computer Technology in Investigations In order to paint an accurate picture of the advantages of computers and engineering relating to investigation we must start as close to the beginning as possible. This would be when electric chair Johnson in his State of the union Address to Congress in 1968. This is where the President made the announcement to bring the most advanced technology to the war on offensive natural action in every city and country in the States (Northrop, 1993). It was less than ten months when the congress a foresighted with the President, put into law the Omnibus Crime Control and Safe Streets Act of 1968.This law created the Law Enf orcement Assistance crosstie (LEAA), to handle and deliver on the promise of the President of technological assistance. During the next ten years the LEAA contributed meanly $50 million to state and local politics criminal justice and law enforcement agencies for crime fighting. oppositefederal official agencies like the FBI matched the funding as well as local and state governments themselves (Northrop, 1993). To demonstrate the usefulness of computers by police in the fight against crime, this pare to the paper will refer to results from a comprehensive repeated-measures field study that looked specifically at how useful computers are to law in the fight against crime.The study focused on a particular class of computer use, which was the searches for vital teaching because this is the bulk of computer activity for officers and are valued by the police in their fight against crime. Between 1976 and 1988 the selective information did show a clear improvement in both the use o f and benefits from such systems (Northrop, 1993). The lone(prenominal) drawback is that the investment in search systems and the promise they hold for improving police effectiveness is badly constrained by inadequate schooling of police officers and detectives (Northrop, 1993). However, in that respect is a very simple solution to this small glitch and that is to create an adequate training system and put all officers through that training program (Northrop, 1993).The most notable problem facing officers was the chronic lack of information. This spans the range from the police chiefs shortage of information on how to use the departments limited resources to the patrol officers uncertainty over whom to s return and question regarding suspicious behavior. In the 1970s and early 1980s, this problem was addressed using a multi-facade management approach and there were big payoffs. The problem of improving how information was provided to police officers in the street or to the detec tive working a case was harder to fix. They soon realized the only way to specific individuals or cases was the existing records.However, the only means of utilizing those records was to look them up (Northrop, 1993). From utilizing computers in cars so officers could run a license plate and favorable security number to see if there are any warrants out for the person they stopped, to more advances such as carrying cell phones, GPS tracking systems in cars, crime mapping tools, information sharing between state and local law enforcement, to even sharing information across countries.Technology has come a long way in helping officers and other agents within the criminal justice system do their job. Just a bit more about the advantages of the things mentioned preceding(prenominal) and time to move on. The most interesting thing is Geographic Information Systems (GIS), which has become a most important tool for law enforcement agencies. GIS, othermapping software and backcloth comput ers now are capable of mapping and data analysis that is way above and beyond what used to be possible with backroom mainframe computers (Rubley, 2011). Another extensive advancement is the widespread use of everyone using mobile devices. Many officers now use two to three cell phones. The invention of apps has made it easy for everyone to hydrant a button and flashbulbly retrieve valuable information. Information that used to take several steps to obtain using a browser is now at the officers fingertips.Mobile technology is evolving all the time and it is evolving fast, even in the past few years the government has been able to pick up a suspect through a facial recognition app on the iPhone, look up a potential jurors social media profile during voir dire, and now they even have real time data streaming to mobile devices which can provide information on a fugitive or conduct instant news feeds. There is no doubt that computers and technology have taken law enforcement to a wh ole new level (Rubley, 2011). What Disadvantages Face Law Enforcement with love to the Advancements of Computers? One big disadvantage is that there is such a high volume of information being exchanged daily on the internet and spell this is a convenient thing for most of us, there are also criminals taking advantage of the opportunity. There is corporate fraud, theft, intellectual property disputes, and even bruise of contract and asset recovery issues.These are some of the situations that use computers to commit the crime and use computer forensics to solve the crime (n.a., 2009). An additional disadvantage is fashioning sure that the digital evidence is going to be admissible in court. Since data can be modified very easy, the analyst must be able to comply with the standards of evidence required by law. The analyst must make sure their investigation is fully documented and accounted for. Another real disadvantage is the cost of retrieving the data. Computer forensic experts are hired by the hour and the process of analyzing and reporting the data can take up to 15 hours depending on the nature of the case (n.a., 2009). Other disadvantages are really the same ones facing all users of technology.If the system is down there is no information that can be retrieved. If the user is not trained in using the technological equipment at his/her disposal thus this will be a waste of time. If the input of information is incorrect which sometimes occurs because of human error, then that will cause a problem for officers in the long run. The skid Chosen to be researched where the Computer was used to Aid in the Commission of a Crime. 3 NJ Students Charged in School Computer HackingOn April 14, 2010, in Haddonfield N.J. three students hacked into one of the top preforming High Schools. They are now facing charges for attempting to change their grades once they were into the system. The three students are boys, ages 14, 15, and 16 but because they are minors their n ames have not been released. The Boys were found out when a staff member found one of the boys using keystroke capture software on one of the computers at the school in an attempt to steal a teachers password. That student then implicated the others in this crime.The boys were charged with illegally obtaining information and were released to their parents (Associated Press, 2010). This is a wonderful exercise of how people, who might never have committed a crime in their lives, get ideas about computers as if this is not a crime. They get on the internet, search places and things that are illegal and never think twice about it because they are either in their own home and feel protected, or they feel that it is easier to get away with computer related crimes and take their chances.There is too much technology and it is dangerous in the wrong hands. People need to realize that specially crime on the internet will always be solved sooner or later because what you do on a computer l eaves a print forever that can never be erased. Research Case Where a Computer was Beneficial to the Prosecution in a Criminal Case In this case a woman age 45, named Sonia Martin, from Nigeria and Chicago, Illinois was manager of a Chicago cell in one of the most sophisticated and organized computer hacking and standard atmosphere cash out schemes ever perpetrated (U.S. lawyers Office, 2012). On August 12, 2012 she was sentenced to serve two years and six months in a federal prison on charges of conspiracy to commit wore fraud. She will also serve five years of supervised release and $89,120.25 in restitution fees (U.S. Attorneys Office, 2012). According the United States attorney Yates, in November of 2008 a group of hackers obtained unauthorized access into the computer system of a company called WorldPay US, Inc., then known as RBS WorldPay, which is a payment processor in Atlanta.The hackers were very sophisticated and used some daring techniques to compromise the data encrypt ion that WorldPay used to protect the customers data on payroll debit menus. These are used by more and more companies to pay their employees. This is convenient for employees as they can use the debit card right away or use it to withdraw their salaries right from an ATM (U.S. Attorneys Office, 2012). Once they were in, hackers raised the balances and ATM withdraw limits on the compromised accounts. They then provided a network of lead cashers with 44 debit card account numbers and their PIN numbers, which they used to withdraw more than $9 million from over 2,100 ATMs in at least 280 cities worldwide, including cities in the United States, Russia, Ukraine, Estonia, Italy, Hong Kong, Japan, and Canada (U.S. Attorneys Office, 2012).The whole thing, $9 million dollars, took less than 12 hours to clear off on November 8, 2008 (U.S. Attorneys Office, 2012). Throughout the cash out the hackers monitored these fraudulent ATM withdraws in real-time from inside the computer systems of Wo rldPay. Once the proceedings were complete the hackers sought to destroy data stored on the card processing network so they could cover up this illegal activity. WorldPay discovered the unauthorized activity and reported the breach (U.S. Attorneys Office, 2012). Sonia Martin was working with one of the lead cashers and supervised a cashing crew in Chicago. Martin was given PIN codes, and payroll cards, and then manufactured counterfeit debit cards based on that information. So she handed out cards to her underlings that she recruited and supervised. Together they all withdrew approximately $80,000 from various ATMs around Chicago, during the early morning hours of November 8, 2008. Martins primary address is Nigeria (U.S. Attorneys Office, 2012).This case was investigated by special agents of the federal bureau of investigations. Other who helped provide assistance included numerous domestic and international law enforcement partners and WorldPay immediately reported the crime and substantially assisted in the investigation (U.S. Attorneys Office, 2012). ConclusionMy belief is that the new technology and computers have really given law enforcement some spectacular tools to do their job. I feel that technology has aided in the increase of incarcerations. Anytime criminals can be taken off the streets or even out of the darkness of their homes where they are committing crimes, this is a good thing. Yes there are some disadvantages that can also be dealt with. The problems of officers being unaware of how to use some of this modern technology can be cured by sending them to some training programs. All officers need to be aware of what evidence to collect when it is possibly on a computer and the chain of men that this type of technology requires.As technology advances, unfortunately so will the crime that is being committed with that technology. Officers everywhere must be able to act to these crimes effectively. This is why it is so important for every depart ment to keep up with the fast paced computer technology, cell phone technology and any other technology that will aid in catching the bad guy. ReferencesAssociated Press. (2010). 3 NJ students charged in school computer hacking. Retrieved June 6, 2013, from abclocal.go.com http//abclocal.go.com/wpvi/story?section=news/technology&id=7386890 n.a. (2009). Advantages and Disadvantages of Computer Forensics . Retrieved June 9, 2013, from anushreepatil.ewebsite.com http//www.anushreepatil.ewebsite.com/articles/advantages-and-disadvantages-of-computer-forensics.html Northrop, A. (1993). Police of Computers.Retrieved June 10, 2013, from Center for Research on Information http//www.escholarship.org/uc/item/71x0h7hbpage-2 Rubley, S. (2011). How Has Mobile Evolved to Help the Investigative Community . Retrieved June 9, 2013, from Blog.Thomson Ruters.com http//blog.thomsonreuters.com/index.php/how-has-mobile-evolved-to-help-the-investigative-community/ U.S. Attorneys Office. (2012, August 12). Sentencing in Major International Cyber Crime Prosecution . Retrieved June 9, 2013, from FBI.gov http//www.fbi.gov/atlanta/press-releases/2012/sentencing-in-major-international-cyber-crime-prosecution

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.