Technology Based Crime and Modern Investigative Methods Essay Sample

Free Articles

Great technological progresss in our clip have put a batch more force per unit area on modern-day jurisprudence enforcement. Unlike the past decennaries. felons and violators are no longer restricted to town robberies. local pack wars. interstate drug trafficking. and other geographically based offenses. Due to many unfastened chances being presented by modern engineering. offense has now expanded to an international and practical graduated table. and the trouble of following perpetrators has accordingly increased dramatically. Fingerprints. blood samples. and dental records seem hard to get ( and even irrelevant to the probe ) from technologically based offense scenes. such as hacked webs and virus infected web sites. Because of the grounds mentioned above. offense probe. sensing and prosecution has been harder than of all time. The lone manner to decrease and stamp down engineering based offense is to react with engineering based fact-finding methods every bit good.

The trouble of deciding engineering based offense arises from its wide range. For illustration. it is really difficult to specify a offense committed online. Lots of new misdemeanors are being made everyday. runing from invasion of privateness to terrorist act. It is non easy to put standard steps to forestall these offenses. much more solve instances and prosecute the culprits. Therefore. engineering based offense is one of the hardest challenges being faced by the offense committee in these modern times.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Internet hacking is one country of engineering based offense that needs to be given much concern. In bulk of instances. successful hacking ( interrupting through secure computing machine webs ) cost an atrocious sum of money and belongings harm to the victims. Rast ( 2004 ) studies that “in one ( particular ) instance. 26. 000 recognition card Numberss were stolen and in another instance harm was estimated at $ 3 million” . Clearly. choping should non be taken lightly but dealt with through concentrated agencies and to the fullest extent of the jurisprudence.

There are many ways and agencies by which hackers perform their offenses. Some do it on a little graduated table by opening other people’s electronic mails or interrupting through secure office webs. while some drudge on a broad graduated table by stealing watchwords of commercial sites and assailing authorities establishments such as the Pentagon and the FBI itself. Many hackers have been prosecuted and convicted to the maximal grade possible. and surprisingly. tonss of these hackers were comparatively younger than other felons. For illustration. Fragomeni ( 1998 ) paperss the prosecution of a 15 twelvemonth old computing machine ace who tried to “fraudulently ( usage ) a computing machine system with purpose to derive improper entree to password files. path entree. and Internet access” from the U. S. military. The immature male child. whose name was hidden because of juvenile age. pleaded guilty and subsequently suffered the effect of his offense.

Online fraud and scamming is another country that modern jurisprudence hatchet mans need to concentrate on. Under this class of engineering based offense. the culprits normally assume fabricated names. direct mass electronic mail to 100s or 1000s of guiltless receivers. and by agencies of manipulative diction backed up by deceitful paperss. successfully convert the victims to pay money or reveal critical personal information. Frequently. online frauds and cozenages are performed by people who work offshore. doing it difficult for jurisprudence hatchet mans to follow them and cover with them harmonizing to American Torahs. One illustration of this type of offense is the popular Nigerian 419 cozenage. Harmonizing to Financial & A ; Tax Fraud Associates. Inc. ( 2002 ) . the Nigerian cozenage operates as follows: “The cozenage starts with a majority mailing or majority faxing of a clump of indistinguishable letters to business communities. professionals. and other individuals who tend to be of greater-than-average wealth” . The electronic mail or facsimile ever contains a bogus narrative that promises a immense amount of money to the email receiver. in exchange for a little ‘processing fee’ . Due to the turning figure of this sort of fraud go oning over the cyberspace. the U. S. authorities has passed a jurisprudence called the SPAM Act of 2003. Under this jurisprudence. email transmitters are non allowed to direct insistent. unasked commercial electronic mails to entire aliens.

Wiretapping is another dismaying country of engineering based offense. Unlike the two offense facets mentioned above. wiretapping can be done either online and offline. It involves the meddling of secure lines of telecommunication to listen in on private conversations. This can be really detrimental. particularly in the higher echelons of authorities. as wiretapping is being used to border and imply respected functionaries. Some people argue that wiretapping is necessary to expose anomalousnesss in authorities. However. it is still considered a offense to this twenty-four hours because it violates the privateness of citizens and via medias secret conversations aimed at implementing national security.

Piracy. interim. seems like a petit larceny or minor offense facet compared to the 1s we have already discussed. However. it should be taken into serious consideration as good. Piracy is the illegal reproduction and distribution of copyrighted stuff. By agencies of buccaneering. copyrighted pieces of art. music. and literary stuffs are being virtually smuggled in great measures everyday. Some states have begun to move against buccaneering. but still it remains a turning job for content manufacturers all over the universe and accordingly. for jurisprudence hatchet mans every bit good.

Technology based terrorist act presents the most unsafe menace to our citizens and the biggest challenge to modern jurisprudence hatchet mans. By utilizing advanced engineering. it is possible for terrorists to descry on extremely classified authorities information. assemble arms of mass devastation. explode bombs from great distances. and interrupt into critical. secure and encrypted authorities webs. Highly funded and intelligent terrorists can make all these with about the impossibleness of being traced. For this ground. jurisprudence hatchet mans in the offense committee should besides utilize modern engineering and employ trained specializers in order to conflict the turning menace of terrorist act.

Law enforcement bureaus have developed some modern fact-finding methods in response to technological offense. As we have mentioned earlier. the lone manner to conflict technological based offense is to turn the tabular array on the criminals and confront them with better and modern fact-finding techniques.

Information sharing is the act of utilizing informations warehouses. analytical package and portal engineering to garner informations and critical info about criminals and felons. By the usage of this method. jurisprudence hatchet mans can follow the on-line activities of a suspected felon. track his or her personal history and recover grounds that might be utile for prosecution. Koenig ( 2002 ) proposes a National Central Repository. where condemnable tendencies and culprit information should be stored for future usage of all offense research workers.

Modern offense research workers besides use Caller Identification and location hints. The end is to track a suspect’s IP reference or telephone figure. If the fishy uses a cloaked IP or unafraid line. the jurisprudence enforcers ‘hack’ it and try to find the location of the felons. This requires expertness and proper timing.

Live system informations assemblage can besides be used as an fact-finding method. By the usage of this method. jurisprudence hatchet mans and research workers can roll up different sorts of information such as follows: name of users who are logged in a certain router. computing machine version information. all the possible users linked to the device. which IP references are subnet masked. the day of the month of when the device was last laden and reloaded. Furthermore. unrecorded system informations assemblage can find whether a certain host or IP reference is being used by the registered user. or if it has been hijacked ( Horenbeeck. 2006 ) . These pieces of information are critical to look intoing computing machine offense scenes.

Furthermore. it is now possible to utilize malicious codification analysis. This can be really utile to analyse virus onslaughts. By agencies of proper decryption. the research workers can really obtain information about the beginning of the codification and develop leads and hints for the instance.

Last. modern jurisprudence hatchet mans have developed an enhanced version of the polygraph trial. called SCAN or Scientific Content Analysis. This advanced prevarication sensor trial allows the suspect to compose down the replies to specific inquiries. Then. his replies. behavior during the trial. and even his script are studied and used for the probe ( Horenbeeck. 2006 ) .

Continued technological promotions will certainly supply more chances for jurisprudence enforcement bureaus to stamp down engineering based offenses. Furthermore. proper preparation of forces must besides be a top precedence. Acknowledging endowment and passing a just budget for modern equipment and research should be one of the government’s chief concerns.

Plants Cited:

Financial and Tax Fraud Associates. Inc. ( 2002 ) . Nigerian 4-1-9 cozenage.Quatloos. com.Retrieved June 11. 2008. from hypertext transfer protocol: //www. quatloos. com/scams/nigerian. htm

Fragomeni. C. ( 1998 ) . Adolescent hacker pleads guilty to choping into U. S. Military.The Hamilton Spectator. A3.Retrieved June 11. 2008. from hypertext transfer protocol: //efc. ca/pages/media/spectator. 24oct98. hypertext markup language

Horenbeeck. M. V. ( 2006 ) . Technology offense probe.Daemon. be.Retrieved June 10. 2008. from hypertext transfer protocol: //daemon. be/maarten/forensics. hypertext markup language

Koenig. D. ( 2002 ) . Probe of cybercrime and technology-related offense.The Leadership Bulletin.Retrieved June 11. 2008. from hypertext transfer protocol: //www. neiassociates. org/cybercrime. htm

Rast. P. H. ( 2004 ) . Computer related offense.Michaelguth. com.Retrieved June 12. 2008. from hypertext transfer protocol: //michaelguth. com/economist/computercrime. htm

Post a Comment

Your email address will not be published. Required fields are marked *

*

x

Hi!
I'm Katy

Would you like to get such a paper? How about receiving a customized one?

Check it out