Computers have evidently revolutionized the criminal investigations in many ways (Vacca, 20 1 5) . For example, at the site of the crime, law enforcement officers with notebook computers that are located in the squad cars can comfortably access databases which helps them in checking the credentials of individuals and motorists they are interviewing at crime scenes. In this way, the investigators can write and send the data while the events are still fresh (Easttom & Taylor, 2010) . They can as well use mobile electronics in cataloging evidence at the site and managing it after it is transferred to the police facility for further analysis in a computer (Vacca, 20 1 5) . Using portable computers, investigators can not only identify fingerprints but also other evidence on the crime scene allowing them to move quickly to apprehend the perpetrators.
Further, computers have played an instrumental role of necessitating and facilitating communication for crime investigators (Vacca, 20 1 5) . Through computers, investigators are able to make use of emails in communicating across agencies’ lines in order to work together and solve a given problem. For example, fugitive alerts, missing person’s reports, as well as unresolved crimes are posted on secure law enforcement websites necessitating, national, international or regional cooperation (Easttom & Taylor, 2010) . At the same time, gang related activities such as sex offenses or terrorist activities are easily broadcasted to the law enforcement agencies immediately, which limits the amount of energy and time that would have been used in responding to criminal activities across the globe.
Delegate your assignment to our experts and they will do the rest.
In tracking, investigators have been able to use computers in analyzing data through the global positing satellite (GPS) technology as well as cell phone ubiquity which has provided the law enforcement officials with more resources in tracking as well as investigating activities (Vacca, 20 1 5) . By using tower triangulation, investigators are able to track cell phone users to locations that are relatively accurate. Further, investigators can utilize the Geographic Information Systems (GIS) in mapping the movements of criminals including their activities, whereby this information can be stored for future reference (Easttom & Taylor, 2010) . Notably, most of the wireless phones have been embedded with GIS technology making it easier to trace the movements of criminals.
Moreover, computer technology has played a pivotal role in ensuring that law enforcement officials are able to connect information databases from different agencies in the law enforcement (Vacca, 20 1 5) . Other advantages of computers in the criminal investigation include the application of DNA technology, facilitating surveillance through modern cameras, internet searches, and the use of bullet identification technology.
Disadvantages Computers/Software Have On Law Enforcement
Despite the fact that computer technology has been greatly beneficial to the crime investigators, it has been noted that retrieval of data is usually a costly affair (Vacca, 20 1 5) . The experts on computer forensics are hired on an hourly basis and in most cases, depending on the nature of data being retrieved, analyzing as well as reporting could take more than fifteen hours.
At the same time, when analyzing and retrieving the data, an individual in the team may inadvertently disclose privileged documents (Vacca, 2015). In such cases, the investigation or the case is corrupted and the case maybe not bears fruits. However, it is important to underscore the fact that any electronically stored data is prone to misuse or leakage especially if it is accessed by more than one person. In fact, there are many instances in which people have interfered with the investigations by accessing confidential information in court cases.
Another disadvantage is that legal practitioners are also rewired to have knowledge of computer forensics (Vacca, 2015). If this is not the case, it might be challenging for them to cross-examine the witnesses. In most cases, this is also expected of judges, barristers, and solicitors. Notably, computer forensics is one of the fairly new disciplines making it hard for many people to understand it. However, during the presentation of reports, analysts are expected to communicate in ways that other parties in a case will understand.
Using Computers/Software Programs as Tools for Criminal Enterprise
Over the years, criminals have used computers or computer software in advancing their enterprises. (Vacca, 20 1 5) One way is through the installation of malware, which refers to computer viruses such as Trojans that get into one’s computer without knowing. In some cases, after the malware has been installed on one’s computer, it may ask for money or subscription for its removal. Another way is through identity theft, which is the use of another person’s confidential information to benefit financially or in any other way (Vacca, 20 1 5) . For example, one can hack one’s details to access bank account information and use the same to get money from the account. Cyberstalking is also common nowadays due to the personal information that people provide on online platforms (Vacca, 20 1 5) . Cyberstalking is using the internet in harassing another person. Criminals use this method in attacking organizations, institutions, or individuals. In most cases, they use proxies or anonymous identities to pose threats. Other ways include child pornography and spam.
Advantages of Computers/Software Programs to the Prosecution
Computer software programs have been essential in convicting criminals in courts (Easttom & Taylor, 2010) . For examples, many criminals including terrorists have been unable to cover their tracks since their computer data and files are left in hard drives even after they have deleted them (Vacca, 20 1 5) . In this way, investigators are able to easily apprehend them and present the data as evidence. Further, the GPS software in smartphones and satellite systems helps prosecutors in tracking the suspects and avail them in courts. At the same time, prosecutors use encryption to hide their evidence against hackers. They can as well use encryption techniques in retrieving data for prosecution in courts cases.
References
Easttom, C., & Taylor, J. (2010). Computer crime, investigation, and the law . Boston, MA: Course Technology, a part of Cengage Learning.
Vacca, J. R. (20 1 5). Computer forensics: Computer crime scene investigation . Hingham, Mass: Charles River Media.