Haven't found the Essay You Want?
GET YOUR CUSTOM ESSAY SAMPLE
For Only $12.90/page

Emerging Technology Essay

The purpose of this paper is to summarize the advantages of computers/software and the use of computer technology in investigations. Summarize the disadvantages to law enforcement with respect to the advancements of computers. Real cases will be researched in order to understand how computers can be utilized in criminal activities, as well as a case that the use of a computer was beneficial to the prosecution in a criminal case. A final conclusion paragraph will address my personal subjective opinion as to whether these technologies, in an overall sense are a benefit or hindrance to law enforcement efforts. Introduction

Since computers have become such a big part of our lives it is no surprise that even criminals now know how to hack into large computer networks. Obtaining electronic evidence may be one of the most difficult types of evidence to recover. Another issue is authenticating this evidence; however with the help of legal standards this evidence is admissible in court today. Even though computers are the most dominant form of technology that is used in a variety of situations, there are set backs to everything and computers are no exceptions as this paper will explain (Forensic Science, n.d.).

The Advantages of Computers and the Use of Computer Technology in Investigations In order to paint an accurate picture of the advantages of computers and technology relating to investigation we must start as close to the beginning as possible. This would be when President Johnson in his State of the union Address to Congress in 1968. This is where the President made the announcement “to bring the most advanced technology to the war on crime in every city and country in America” (Northrop, 1993). It was less than ten months when the congress along with the President, put into law the Omnibus Crime Control and Safe Streets Act of 1968.

This law created the Law Enforcement Assistance Association (LEAA), to handle and deliver on the promise of the President of technological assistance. During the next ten years the LEAA contributed meanly $50 million to state and local government criminal justice and law enforcement agencies for crime fighting. Otherfederal agencies like the FBI matched the funding as well as local and state governments themselves (Northrop, 1993). To demonstrate the usefulness of computers by police in the fight against crime, this pare to the paper will refer to results from a comprehensive repeated-measures field study that looked specifically at how useful computers are to police in the fight against crime.

The study focused on a particular class of computer use, which was the searches for vital information because this is the bulk of computer activity for officers and are valued by the police in their fight against crime. Between 1976 and 1988 the data did “show a clear improvement in both the use of and benefits from such systems” (Northrop, 1993). The only drawback is that “the investment in search systems and the promise they hold for improving police effectiveness is badly constrained by inadequate training of patrol officers and detectives” (Northrop, 1993). However, there is a very simple solution to this small glitch and that is to create an adequate training system and put all officers through that training program (Northrop, 1993).

The most notable problem facing officers was the chronic lack of information. This spans the range from the police chiefs shortage of information on how to use the departments limited resources to the patrol officers uncertainty over whom to stop and question regarding suspicious behavior. In the 1970’s and early 1980’s, this problem was addressed using a multi-facade management approach and there were big payoffs. The problem of improving how information was provided to police officers in the street or to the detective working a case was harder to fix. They soon realized the only way to specific individuals or cases was the existing records.

However, the only means of utilizing those records was to look them up (Northrop, 1993). From utilizing computers in cars so officers could run a license plate and social security number to see if there are any warrants out for the person they stopped, to more advances such as carrying cell phones, GPS tracking systems in cars, crime mapping tools, information sharing between state and local law enforcement, to even sharing information across countries.

Technology has come a long way in helping officers and other agents within the criminal justice system do their job. Just a bit more about the advantages of the things mentioned above and time to move on. The most interesting thing is Geographic Information Systems (GIS), which has become a most important tool for law enforcement agencies. GIS, othermapping software and desktop computers now are capable of mapping and data analysis that is way above and beyond what used to be possible with backroom mainframe computers (Rubley, 2011). Another great advancement is the widespread use of everyone using mobile devices. Many officers now use two to three cell phones. The invention of apps has made it easy for everyone to tap a button and instantly retrieve valuable information. Information that used to take several steps to obtain using a browser is now at the officer’s fingertips.

Mobile technology is evolving all the time and it is evolving fast, even in the past few years the government has been able to identify a suspect through a facial recognition app on the iPhone, look up a potential jurors social media profile during voir dire, and now they even have real time data streaming to mobile devices which can provide information on a fugitive or get instant news feeds. There is no doubt that computers and technology have taken law enforcement to a whole new level (Rubley, 2011). What Disadvantages Face Law Enforcement with Respect to the Advancements of Computers? One big disadvantage is that there is such a high volume of information being exchanged daily on the internet and while this is a convenient thing for most of us, there are also criminals taking advantage of the opportunity. There is corporate fraud, theft, intellectual property disputes, and even breach of contract and asset recovery issues.

These are some of the situations that use computers to commit the crime and use computer forensics to solve the crime (n.a., 2009). An additional disadvantage is making sure that the digital evidence is going to be admissible in court. Since data can be modified very easy, the analyst must be able to comply with the standards of evidence required by law. The analyst must make sure their investigation is fully documented and accounted for. Another real disadvantage is the cost of retrieving the data. Computer forensic experts are hired by the hour and the process of analyzing and reporting the data can take up to 15 hours depending on the nature of the case (n.a., 2009). Other disadvantages are really the same ones facing all users of technology.

If the system is down there is no information that can be retrieved. If the user is not trained in using the technological equipment at his/her disposal then this will be a waste of time. If the input of information is incorrect which sometimes occurs because of human error, then that will cause a problem for officers in the long run. The Case Chosen to be researched where the Computer was used to Aid in the Commission of a Crime. 3 NJ Students Charged in School Computer Hacking

On April 14, 2010, in Haddonfield N.J. three students hacked into one of the top preforming High Schools. They are now facing charges for attempting to change their grades once they were into the system. The three students are boys, ages 14, 15, and 16 but because they are minors their names have not been released. The Boys were found out when a staff member found one of the boys using keystroke capture software on one of the computers at the school in an attempt to steal a teacher’s password. That student then implicated the others in this crime.

The boys were charged with illegally obtaining information and were released to their parents (Associated Press, 2010). This is a wonderful example of how people, who might never have committed a crime in their lives, get ideas about computers as if this is not a crime. They get on the internet, explore places and things that are illegal and never think twice about it because they are either in their own home and feel protected, or they feel that it is easier to get away with computer related crimes and take their chances.

There is too much technology and it is dangerous in the wrong hands. People need to realize that especially crime on the internet will always be solved sooner or later because what you do on a computer leaves a print forever that can never be erased. Research Case Where a Computer was Beneficial to the Prosecution in a Criminal Case In this case a woman age 45, named Sonia Martin, from Nigeria and Chicago, Illinois was “manager of a Chicago cell in one of the most sophisticated and organized computer hacking and ATM cash out schemes ever perpetrated” (U.S. Attorney’s Office, 2012). On August 12, 2012 she was sentenced to serve two years and six months in a federal prison on charges of conspiracy to commit wore fraud. She will also serve five years of supervised release and $89,120.25 in restitution fees (U.S. Attorney’s Office, 2012). According the United States attorney Yates, in November of 2008 a group of hackers obtained unauthorized access into the computer system of a company called WorldPay US, Inc., then known as RBS WorldPay, which is a payment processor in Atlanta.

The hackers were very sophisticated and used some daring techniques to compromise the data encryption that WorldPay used to protect the customers data on payroll debit cards. These are used by more and more companies to pay their employees. This is convenient for employees as they can use the debit card right away or use it to withdraw their salaries right from an ATM (U.S. Attorney’s Office, 2012). Once they were in, hackers raised the balances and ATM withdraw limits on the compromised accounts. “They then provided a network of lead “cashers” with 44 debit card account numbers and their PIN numbers, which they used to withdraw more than $9 million from over 2,100 ATM;s in at least 280 cities worldwide, including cities in the United States, Russia, Ukraine, Estonia, Italy, Hong Kong, Japan, and Canada” (U.S. Attorney’s Office, 2012).

The whole thing, $9 million dollars, took less than 12 hours to pull off on November 8, 2008 (U.S. Attorney’s Office, 2012). Throughout the cash out the hackers monitored these fraudulent ATM withdraws in real-time from inside the computer systems of WorldPay. Once the transactions were complete the hackers sought to destroy data stored on the card processing network so they could cover up this illegal activity. WorldPay discovered the unauthorized activity and reported the breach (U.S. Attorney’s Office, 2012). Sonia Martin was working with one of the lead cashers and supervised a cashing crew in Chicago. Martin was given PIN codes, and payroll cards, and then manufactured counterfeit debit cards based on that information. So she handed out cards to her underlings that she recruited and supervised. Together they all withdrew approximately $80,000 from various ATM’s around Chicago, during the early morning hours of November 8, 2008. Martin’s primary address is Nigeria (U.S. Attorney’s Office, 2012).

This case was investigated by special agents of the federal bureau of investigations. Other who helped provide assistance included; numerous domestic and international law enforcement partners and WorldPay immediately reported the crime and substantially assisted in the investigation (U.S. Attorney’s Office, 2012). Conclusion

My belief is that the new technology and computers have really given law enforcement some spectacular tools to do their job. I feel that technology has aided in the increase of incarcerations. Anytime criminals can be taken off the streets or even out of the darkness of their homes where they are committing crimes, this is a good thing. Yes there are some disadvantages that can also be dealt with. The problems of officers being unaware of how to use some of this modern technology can be cured by sending them to some training programs. All officers need to be aware of what evidence to collect when it is possibly on a computer and the chain of custody that this type of technology requires.

As technology advances, unfortunately so will the crime that is being committed with that technology. Officers everywhere must be able to respond to these crimes effectively. This is why it is so important for every department to keep up with the fast paced computer technology, cell phone technology and any other technology that will aid in catching the bad guy. References

Associated Press. (2010). 3 NJ students charged in school computer hacking. Retrieved June 6, 2013, from abclocal.go.com: http://abclocal.go.com/wpvi/story?section=news/technology&id=7386890 n.a. (2009). Advantages and Disadvantages of Computer Forensics . Retrieved June 9, 2013, from anushreepatil.ewebsite.com: http://www.anushreepatil.ewebsite.com/articles/advantages-and-disadvantages-of-computer-forensics.html Northrop, A. (1993). Police of Computers.

Retrieved June 10, 2013, from Center for Research on Information: http://www.escholarship.org/uc/item/71x0h7hb#page-2 Rubley, S. (2011). How Has Mobile Evolved to Help the Investigative Community . Retrieved June 9, 2013, from Blog.Thomson Ruters.com: http://blog.thomsonreuters.com/index.php/how-has-mobile-evolved-to-help-the-investigative-community/ U.S. Attorney’s Office. (2012, August 12). Sentencing in Major International Cyber Crime Prosecution . Retrieved June 9, 2013, from FBI.gov: http://www.fbi.gov/atlanta/press-releases/2012/sentencing-in-major-international-cyber-crime-prosecution


Essay Topics:


Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email. Please, specify your valid email address

We can't stand spam as much as you do No, thanks. I prefer suffering on my own