11 Jul 2022

57

Emerging Technologies: Computers/Software

Format: APA

Academic level: University

Paper type: Essay (Any Type)

Words: 853

Pages: 3

Downloads: 0

Computers have evidently revolutionized the criminal investigations in many ways (Vacca, 20 1 5) . For example, at the site of the crime, law enforcement officers with notebook computers that are located in the squad cars can comfortably access databases which helps them in checking the credentials of individuals and motorists they are interviewing at crime scenes. In this way, the investigators can write and send the data while the events are still fresh (Easttom & Taylor, 2010) . They can as well use mobile electronics in cataloging evidence at the site and managing it after it is transferred to the police facility for further analysis in a computer (Vacca, 20 1 5) . Using portable computers, investigators can not only identify fingerprints but also other evidence on the crime scene allowing them to move quickly to apprehend the perpetrators. 

Further, computers have played an instrumental role of necessitating and facilitating communication for crime investigators (Vacca, 20 1 5) . Through computers, investigators are able to make use of emails in communicating across agencies’ lines in order to work together and solve a given problem. For example, fugitive alerts, missing person’s reports, as well as unresolved crimes are posted on secure law enforcement websites necessitating, national, international or regional cooperation (Easttom & Taylor, 2010) . At the same time, gang related activities such as sex offenses or terrorist activities are easily broadcasted to the law enforcement agencies immediately, which limits the amount of energy and time that would have been used in responding to criminal activities across the globe. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

In tracking, investigators have been able to use computers in analyzing data through the global positing satellite (GPS) technology as well as cell phone ubiquity which has provided the law enforcement officials with more resources in tracking as well as investigating activities (Vacca, 20 1 5) . By using tower triangulation, investigators are able to track cell phone users to locations that are relatively accurate. Further, investigators can utilize the Geographic Information Systems (GIS) in mapping the movements of criminals including their activities, whereby this information can be stored for future reference (Easttom & Taylor, 2010) . Notably, most of the wireless phones have been embedded with GIS technology making it easier to trace the movements of criminals. 

Moreover, computer technology has played a pivotal role in ensuring that law enforcement officials are able to connect information databases from different agencies in the law enforcement (Vacca, 20 1 5) . Other advantages of computers in the criminal investigation include the application of DNA technology, facilitating surveillance through modern cameras, internet searches, and the use of bullet identification technology. 

Disadvantages Computers/Software Have On Law Enforcement 

Despite the fact that computer technology has been greatly beneficial to the crime investigators, it has been noted that retrieval of data is usually a costly affair (Vacca, 20 1 5) . The experts on computer forensics are hired on an hourly basis and in most cases, depending on the nature of data being retrieved, analyzing as well as reporting could take more than fifteen hours. 

At the same time, when analyzing and retrieving the data, an individual in the team may inadvertently disclose privileged documents (Vacca, 2015). In such cases, the investigation or the case is corrupted and the case maybe not bears fruits. However, it is important to underscore the fact that any electronically stored data is prone to misuse or leakage especially if it is accessed by more than one person. In fact, there are many instances in which people have interfered with the investigations by accessing confidential information in court cases. 

Another disadvantage is that legal practitioners are also rewired to have knowledge of computer forensics (Vacca, 2015). If this is not the case, it might be challenging for them to cross-examine the witnesses. In most cases, this is also expected of judges, barristers, and solicitors. Notably, computer forensics is one of the fairly new disciplines making it hard for many people to understand it. However, during the presentation of reports, analysts are expected to communicate in ways that other parties in a case will understand. 

Using Computers/Software Programs as Tools for Criminal Enterprise 

Over the years, criminals have used computers or computer software in advancing their enterprises. (Vacca, 20 1 5) One way is through the installation of malware, which refers to computer viruses such as Trojans that get into one’s computer without knowing. In some cases, after the malware has been installed on one’s computer, it may ask for money or subscription for its removal. Another way is through identity theft, which is the use of another person’s confidential information to benefit financially or in any other way (Vacca, 20 1 5) . For example, one can hack one’s details to access bank account information and use the same to get money from the account. Cyberstalking is also common nowadays due to the personal information that people provide on online platforms (Vacca, 20 1 5) . Cyberstalking is using the internet in harassing another person. Criminals use this method in attacking organizations, institutions, or individuals. In most cases, they use proxies or anonymous identities to pose threats. Other ways include child pornography and spam. 

Advantages of Computers/Software Programs to the Prosecution 

Computer software programs have been essential in convicting criminals in courts (Easttom & Taylor, 2010) . For examples, many criminals including terrorists have been unable to cover their tracks since their computer data and files are left in hard drives even after they have deleted them (Vacca, 20 1 5) . In this way, investigators are able to easily apprehend them and present the data as evidence. Further, the GPS software in smartphones and satellite systems helps prosecutors in tracking the suspects and avail them in courts. At the same time, prosecutors use encryption to hide their evidence against hackers. They can as well use encryption techniques in retrieving data for prosecution in courts cases. 

References 

Easttom, C., & Taylor, J. (2010). Computer crime, investigation, and the law . Boston, MA: Course Technology, a part of Cengage Learning. 

Vacca, J. R. (20 1 5). Computer forensics: Computer crime scene investigation . Hingham, Mass: Charles River Media. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Emerging Technologies: Computers/Software.
https://studybounty.com/emerging-technologies-computers-software-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Cruel and Unusual Punishments

Since the beginning of society, human behaviour has remained to be explained by the social forces that take control. Be it negative or positive, the significance of social forces extend to explain the behaviour of...

Words: 1329

Pages: 5

Views: 104

Serial Killers Phenomena: The Predisposing Factors

CHAPTER 1: INTRODUCTION _Background information _ Ronald and Stephen Holmes in their article _Contemporary Perspective on Serial Murder_ define a serial killer as anyone who murders more than 3 people in a span...

Words: 3648

Pages: 14

Views: 441

Patent Protection Problem

A patent offers inventors the right for a limited period to prevent other people from using or sharing an invention without their authorization. When a patent right is granted to inventors, they are given a limited...

Words: 1707

Pages: 6

Views: 275

General Aspects of Nonprofit Organizations

Nonprofit organizations are prone to the long and tedious legal process of start-up as compared to their for-profit organizations. However, there are similar rules that govern the startup and the existence of both...

Words: 294

Pages: 1

Views: 73

Contract Performance, Breach, and Remedies: Contract Discharge

1\. State whether you conclude the Amended Warehouse Lease is enforceable by Guettinger, or alternatively, whether the Amended Warehouse Lease is null and void, and Smith, therefore, does not have to pay the full...

Words: 291

Pages: 1

Views: 134

US Customs Border Control

Introduction The United States Border Patrol is the federal security law enforcement agency with the task to protect America from illegal immigrants, terrorism and the weapons of mass destruction from entering...

Words: 1371

Pages: 7

Views: 117

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration