Computers, software, and other digital technologies have revolutionized the ways in which we investigate crime. Technologies such as biometrics, body-worn cameras, and crime mapping and analysis software have provided both support and accountability to officers on the ground, while forensic technologies such as laser ablation inductively coupled plasma mass spectrometry (LA-ICP-MS), alternative light photography, high-speed ballistics photography, 3D forensic facial reconstruction, magnetic fingerprinting and automated identification (AFIS), and link analysis software for forensic accountants have greatly aided scientists in the compilation of evidence key to securing convictions.
Unfortunately, updates in technologies are not one-sided, and criminals and criminal groups have also benefitted from advancements in computers, software, and other systems. According to the FBI’s Crime Complaint Center, total Internet crime complaints have risen from 262,813 in 2013 to 298,728 in 2016, with losses ranging from $781.80M in 2013 to $1.4B in 2016. Identity theft complaints have also risen dramatically (100K to 400K since 2001). Technologies have afforded criminals new avenues to conduct familiar crimes such as identity theft, credit card fraud, and vehicular theft, while also creating new opportunities for crimes like “sextortion” (threatening to share compromising sexual photos of victims unless they meet certain demands), synthetic identity theft (creating an entirely new identity), credit card skimming, and illegal “dark web” internet marketplace transactions for sex, drugs, weapons, and murder.
One such case of computer use and criminal activity involves Justin Larson, a 30-year-old computer scientist who used encrypted communications to distribute drugs. After deeply researching drug classifications and how to distribute them illegally through digital means, Larson connected to a Chinese fentanyl dealer over the dark web, where he communicated via a sophisticated messaging system. Essentially, whenever Larson communicated with his supplier, he would type his message (a) in an encrypted platform that would (b) generate a self-destructing link, and then (c) send the link to the supplier through encrypted web-based e-mail systems, after which (d) the message would be destroyed.
In order for forensic investigators to piece together the digital evidence for Larson’s case, they needed to perform a range of detailed forensic digital investigations on Larson’s mobile devices and work with web-based e-mail providers to find people connected to Larson. Investigators determined that his girlfriend was signing for and accepting packages that had been shipped from a Chinese distributor and delivered via TNT, a private commercial carrier. On January 25, 2017, Larson was convicted of conspiracy to distribute narcotics; five counts of possessions or attempted possession of a controlled substance and controlled substance analogue with intent to distribute; one count of possession with intent to distribute; and one count of distribution of a controlled substance. He was sentenced to life in prison.
As you can see from Larson’s case above, the advancement of technology has created the opportunity for even the smallest criminal to interface with global criminal organizations. However, at the core of all these criminal activities is still a human element. While technologies may provide additional tools to disguise this fact, at the end of the day, there’s still a human behind the wheel, and human beings are particularly fallible. With crime, all it takes is one screwup, and you have compromised your security. Law enforcement operates with a much wider margin of error.
Instead of asking the question of whether technologies are a benefit or a hindrance to law enforcement, the smarter question might be how law enforcement can use the newly freed resources technologies provide to better intervene in at-risk populations, and hopefully reduce the development of criminal onset.
https://www.encyclopedia.com/science-and-technology/computers-and-electrical-engineering/computers-and-computing/computer-crime
https://www.policeforum.org/assets/ChangingNatureofCrime.pdf
Sunday, May 12, 2013
summarize the advantages of computers/software and the use of computer technology in investigations, summarize the disadvantages to law enforcement with respect to the advancements of computers, research a case where the computer was used to aid in the commission of a crime, research a case where the use of the computer was beneficial to the prosecution in a criminal case, and provide a final conclusion/paragraph that addresses your subjective opinion as to whether these technologies, in an overall sense, are of benefit or a hindrance to law enforcement efforts.
Subscribe to:
Post Comments (Atom)
Why is the fact that the Americans are helping the Russians important?
In the late author Tom Clancy’s first novel, The Hunt for Red October, the assistance rendered to the Russians by the United States is impor...
-
There are a plethora of rules that Jonas and the other citizens must follow. Again, page numbers will vary given the edition of the book tha...
-
The poem contrasts the nighttime, imaginative world of a child with his daytime, prosaic world. In the first stanza, the child, on going to ...
-
The given two points of the exponential function are (2,24) and (3,144). To determine the exponential function y=ab^x plug-in the given x an...
-
The only example of simile in "The Lottery"—and a particularly weak one at that—is when Mrs. Hutchinson taps Mrs. Delacroix on the...
-
Hello! This expression is already a sum of two numbers, sin(32) and sin(54). Probably you want or express it as a product, or as an expressi...
-
Macbeth is reflecting on the Weird Sisters' prophecy and its astonishing accuracy. The witches were totally correct in predicting that M...
-
The play Duchess of Malfi is named after the character and real life historical tragic figure of Duchess of Malfi who was the regent of the ...
No comments:
Post a Comment