Tuesday, April 16, 2019

The Future of Criminology Essay Example for Free

The Future of Criminology EssayOver the past several years criminology has made leaps, bounds, and advances to enhance capturing criminals. delinquent to the increasing technology at the fingertips of criminals and terrorists law en fightment has been forced to step of their resources and intelligence. The regimen is constantly go about with newly methods citizenry perplex created to commit criminal offense. Technology is infiltrating every aspect of the criminal hardlyice system, from the investigation to the criminal prosecution of horrors and raze to attempts to predict them. What steps is law enforcement and the government taking to ensure our safety and to catch the criminals and terrorists? biostatisticsAfter the attacks on 9/11 the government discovered America was non truly disposed(p) for anything. America lacked the technology and resources to stop terrorists attacks. Suddenly, the United States government became acutely aw be that it didnt go through exa ctly who was pass awaying in and out of the country. After 9/11, the U.S. Congress decided we must kick in some way of securing our borders. What did the government do to try to protect the landed estate? They looked into security measures much(prenominal) as biometrics. Biometric is the most secure and convenient authentication tool. It can non be borrowed, stolen, or forgotten and forging one is a great deal impossible. Biometrics measure individuals unique physical or behavioral characteristics to recognize or authenticate their identity. common manoeuvre physical biometrics include fingerprints, hand or palm geometry, retina, iris, and facial characteristics.Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Of this crime syndicate of biometrics, technologies for signature and voice atomic number 18 the most developed (Biometric Security Technology, n.d.). Today, our identities ar verified almost exclusively by things that you c arry with you and things you remember.Drivers licenses social security cards, birth certificates and passports are common documents spate carry with them, and passwords and PINs are common security measures people remember. Physical desig demesne is easy to fake, and passwords are easy cracked by hackers, who then have nearly unfettered access to our credit cards, bank accounts, and individualised data. muckle make fake drivers licenses, social security cards, birth certificates and even expiration certificates.Hackers scarcely need limited tuition about a person to abstract their identity. It is mind boggling to approximate what little data criminals need that can turn a persons life elevation down in a matter of seconds. Something needs to change and biometrics could be that change. Biometrics are a fundamental shift in the way people are identified. Unlike traditional identification which individuals must either remember or carry with them, biometrics is the individual , it is a spokesperson of who you are so to speak. Fingerprints, voice analysis, iris patterns, vein matching, gait analysis, and so on. Such traits are unique to an individual and often, though not always, incredibly difficult to fake. United States government has poured money into research, development, and acquisition of biometric identification systems.The Department of homeland Security has spent over $133 million on biometrics since 2003, and the Defense Department is predicted to spend $3.5 one thousand thousand on the technology between 20072015. The Federal Bureau of Investigations has rapidly expanded its fingerprint database and is currently maturation a more sophisticated system that will add iris scans, palm scans, and facial fruition to the mix (De Chant, 2013). Just because biometrics cannot be lost or misplaced does not mean they cannot be misused. Privacy concerns loom large with biometrics. A biometric security measure by itself is not threatening, though they are easily linked to other, potenti solelyy sensitive info, and thats when people grow uneasy.Biometrics are a part of person and not something that can easily be discarded like a Facebook rapscallion or a password. This causes a lot of anxiety for some people. The government would have part of everyone on file at their disposal and would it always be used correctly or will Americans suit violated by this extra power the government would have? There is already a lot of mistrust in the government it would be difficult to get the American nation as a whole on board with the government having access to our fingerprints, retinas, faces, and palms. There are peopleeven in our criminal justice system that abuse their power and give out information that should not be given to certain people, who is to say that same would not happen with should racy information as biometrics.SpywareAs rates of cybercrime continue to increase exponentially, law enforcement agencies will have to enhance their cyber-defenses to efficaciously fight online attacks. tonic technologies promise to play an important role in this battle for cybersecurity. The war on cybercrime and cyberterrorism has given a major boost to the IT and security industries. In the coming years, the fields could experience even greater growth, possibly generating hundreds of billions of dollars in the US alone. Cyber criminals can be computer geeks looking for bragging rights, to businesses attempt to gain an upper hand in the marketplace by hacking competitor websites, from rings of criminals wanting to steal your personal information and sell it on black markets and even spies and terrorists looking to rob our nation of vital information. In this day and age of advanced technology, we have become accustomed to all the benefits that computers give us in terms of convenience. dapple most of us would never want to go back to doing things the previous(a) spirted way, it is very important to be aware that an yone can become a victim of cybercrime.To in effect detect and deter cyber criminals, it is vital for our law enforcement agencies and our legal community to look beyond our nations borders and work with their international colleagues in order to have a global framework of cybercrime statutes. One of the new devices to alleviate detect cyber criminals is a Wi-Fi Investigator. The Wi-Fi Investigator is a tool designed to help law enforcement officials condition locations in order to apprehend suspect devices, including laptops and smart telecommunicates. Another featured gadget produces powerful magnetic pulses in order to instantly erase sensitive data in the event of a security open frame (Brown, 2010). Another useful tool for law enforcement is the Global Positioning System or GPS. This is used to help track criminals on probation and parole.This can too be useful in court to show a suspects whereabouts during trial or in tracking down a kidnapped victim. The GPS has become a vital part of an investigation and something that some investigators may even rely on. The same can be said for cellphones since most of them now days are equipped to tell your location as well. Tools and devices are not the only thing that isused to try to deter cybercrimes, there are laws in place as well. Recently, chair Obama calls for a new law for cybersecurity. The new cybersecurity effort came a day after Mr. Obama called for mandate to force American companies to be more forthcoming when credit card data and other consumer information are lost in an online br for each one like the kind that hit Sony Pictures, Target and Home Depot pass away year. Concern about cybersecurity has increased after the hacking of Sony in December, which the United States government says was the work of the North Korean government.The president said that breach and an attack on the United States Central Commands chirrup account proved the need for an overhaul (Hirschfeld Davis, 2015). The cybe rsecurity measure Mr. Obama envisions would encourage companies to share threat information such as Internet Protocol addresses, date and time stamps, and routing information with the Department of Homeland Security, which would swiftly pass it on to other government agencies and industry groups voluntarily formed to share such material. Companies would get targeted financial obligation protection for doing so, as long as they took steps to protect consumers personal information (Hirschfeld Davis, 2015). President Obama also called for law enforcement tools to combat cybercrime, including to prosecute the sale of botnets, computer networks created to carry out cybercrime, and to give courts power to eject down those involved in denial of service attacks and other fraudulent activities (Hirschfeld Davis, 2015).Fighting cybercrime is not just the responsibility of the government it is everyones responsibility. Anyone at any time can be attacked by a cybercriminal there is no limits when it comes to cybercrime. The government and law enforcement does their best to protect everyone but it is difficult to protect against psyche you cannot see. There is still concerns that maybe technology is trying to take over good old fashion police work such as patrolling and even investigating itself. Is the government looking for the quick technological fix rather than to invest in what it takes to get communities to collaborate on their own safety?The problem is an over-reliance on technology with too little recognition that policing is primarily a people business. Law enforcement and topical anaesthetic anaesthetic communities often see technology as a panacea to make communities safer without asking the hard questions. While technology is good to have and it does help to solve some cases it will never replace a police officer. Peoplefind safety and security when they actually see someone protecting them. People need that reassurance.desoxyribonucleic acid CollectionT he Federal Bureau of Investigations maintains a national deoxyribonucleic acid database known as the Combined deoxyribonucleic acid Indexing System or CODIS. The pilot program for what became CODIS started with fourteen state and local laboratories. Today, there are over 180 public law enforcement laboratories that use CODIS. The FBI Laboratorys CODIS program allows federal, state, and local crime laboratories to store, search, and share DNA profiles electronically (The DNA Act, 2015). The practice of taking DNA samples from convicted criminals is now largely uncontroversial. The courts have routinely upheld laws that authorize DNA turn aroundion from both current and former convicts, and the resulting databases of DNA have become powerful tools to analyze forensic evidence collected from crime scenes. The databases help to clear innocent suspects and direct law enforcement officials away from unproductive investigations.They also help to convict guilty criminals and clear the w rongfully convicted. A trend that is causing significant debate is gathering DNA samples from people who are arrested but not convicted (Berson, 2009). About 20 states and the federal government have passed legislation that requires DNA collection upon arrest. This legislation has elevated concerns that crime laboratories may be unable to manage an influx of samples from a new source and that preconviction DNA collection may violate Fourth Amendment loneliness guarantees. Some people worry that collecting DNA creates the potential for abuse of genetic information stored in databases. Others point out that the federal and state privacy laws and penalties that apply to crime labs are stringent far more stringent than the rules governing private entities that collect blood and saliva for medical or insurance purposes (Berson, 2009).Although some states limit preconviction DNA collection to groundless offenses or sex crimes, other states include all felonies, and some extend the requ irement to misdemeanors as well. States legislation requiring preconviction DNA collection varies. Variations include the types of crimes for which samples are collected, applicability of the law to juveniles and procedures for deleting profiles. Some state laws have faced Fourth Amendment challenges in court. The Fourth Amendment ensures that the right of the people to be secure in theirpersons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized (The DNA Act, 2015). This is where the government will continue to have problems, most Americans live by the Amendments that the United States was founded upon. The Amendments were put in place to give the government limits and when it comes to mandating DNA the government appears to have reached its limits.ConclusionI n conclusion, the government and law enforcement have many challenges to face and batter in the new age of technology. Technology also makes it easier for criminals from around the globe to connect and partner with each other to pull off financial frauds, and the anonymity of the web can make it more dispute to locate and stop online perpetrators. There are legal obstacles as well as ethical obstacles that the government and law enforcement must overcome. At every corner there is a potential for a crime to happen whether it is a persons credit card, a computer, a bank, a smart phone or even a car. Cybercrime is a growing field and one that is hard to combat with all the technology. The problem the government is facing is what is considered too invasive and what is going too far to protect our nation?ReferencesBerson, S. (2009). Debating DNA Collection. Retrieved from http//www.nij.gov/journals/264/pages/debating-DNA.aspx Biometric Security Technology. (n.d.). Retrieved from http// www.peterindia.net/BiometricsView.html Brown, K. (2010). The Future of Cybercrime Detection Prevention. Retrieved from http//www.pctools.com/security-news/future-cybercrime-prevention/ De Chant, T. (2013). The Boring and Exciting World of Biometrics. Retrieved from http//www.pbs.org/wgbh/nova/next/tech/biometrics-and-the-future-of-identification/ Hirschfeld Davis, J. (2015). Obama Calls for New Laws to Bolster Cybersecurity. Retrieved from http//www.nytimes.com/2015/01/14/us/obama-to-announce-new-cyberattack-protections.html?_r=0 The DNA Act. (2015). Retrieved from

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.