310 likes | 407 Views
18 – Future of Criminal Justice. technocrime. 1. 2. 3. Technocrimes. Police must understand: 1. __________ for use of technology 2. use technology in __________ 3. address __________ impact of this technology. Biocrime. Uses biologically active substances: 1. 2. toxins 3. organisms
E N D
technocrime 1. 2. 3.
Technocrimes • Police must understand: • 1. __________ for use of technology • 2. use technology in __________ • 3. address __________ impact of this technology
Biocrime • Uses biologically active substances: • 1. • 2. toxins • 3. organisms • 4. • 5.
Cybercrime • 1. crime • 2. use of computer __________ • 3. violation of __________ law • 4. hacking • Transnational • 1. • 2.
Social engineering Trick people into: Giving up __________ __________
1. theft of _____ 2. _____ 3. piracy 4. forgery 5. _____ 6. money _____ 7. terrorism 8. trespass 9. _____ 10. viruses 11. denial of _____ Cybercrime Treaty 1. 2001 2. Europe + U.S. / Canada / Japan 3. standardization of laws 4. detaining of cyber criminals for prosecution 5. exchange of intelligence Types of cybercrime
Cybercrime statistics: 2004 • 75% of U.S. business had at least one incident of security violations: • 1. 65% _____ • 2. 25% _____ • 3. 19% _____ & vandalism
malware • Malicious software • _____ • _____ Use • Stealth • Polymorphic codes
Virus Malicious software that Virus signature
Phishing • Relies on social engineering • Official looking emails to steal: • 1. _____ • 2. _____ • 3. user _____ • 4. _____
Piracy – __________ software Losses: 1. $12.2 billion 2. 38% world-wide pirated Leading nations using pirated software _____ (97%) / _____ (95%) / _____ (92%) Spam 1. _____ 2. commercial advertisement CAN-SPAM Act ’04 Emails must 1. clearly advertisement 2. opt-out feature 3. valid address Software piracy / spam
Terrorism & technology • WMD’s: • 1. • 2. • 3. • 4. • Bioterrorism - • intention use or threat • Viruses / bacteria / fungi / toxins from living organisms
Crime control through technology • DNA fingerprinting • Vehicle tracking devices • Night vision optic finders • Digital imaging • Keystroke captures • Thermography • Automated plate recognition
National Law Enforcement & Corrections Technology Center (NLECTC) 1. communications / electronics 2. forensic science 3. transportation & weapons 4. protective equipment Justice Technology Information Network (JUSTNET) 1. information exchange 2. notifies law enforcement of new technology Society of Police Futurists International (PFI) Predict future trends Futures Working Group (FWG) Coordinate government + academics on futuristics Technical organizations in criminal justice
Local Police Departments Using In-field Computers or Terminals, 1990 and 2000 Source: Matthew J. Hickman and Brian A. Reaves, Local Police Departments, 2000 (Washington, D.C.: Bureau of Justice Statistics, 2003), p. iv.
criminalistics • Applies technology & scientific technology to detection & evaluation of criminal evidence • Criminalist: _____ & _____
Bertillion system 1. first modern system of: 2. some _____ didn’t change after maturity A. B. Skeletal _____ Fingerprints 1. 2. 3. 4. no two sets the same AFIS Criminalistics
Biometrics 1. identification by 2. 3. Software to: 1. Retinal / iris scan 2. _____ recognition 3. _____ authentication 4. _____ geometry 5. _____ thermography Additional scientific fields 1. ballistics 2. pathology 3. forensic anthropology 4. forensic entomology 5. forensic photography 6. plaster / polymer casting 7. polygraphs 8. voice stress analysis 9. forensic dentristry Criminalistics
DNA Constantly evolving On line data bases Can prove innocence & demonstrative guilt
Daubert standard • Daubert v Merrell Dow Pharmaceuticals, Inc. • Criteria for admission of scientific evidence: • 1. • 2. • 3. • 4.
DNA Identification Act - 1994 • Inference engine • 1. computer program • 2. compares: • Federal initiatives enhance use of DNA & databases
Online Databases • Uses: • 1. routine storage of information • 2. cross-reference specific information to check for patterns • 3. crime prevention • 4. to find suspects
Artificial intelligence programs • Make inferences based on information & draw conclusions • 1. _____ interface • 2. knowledge base of _____ information • 3. inference engine
TIA – total information awareness information-sorting & pattern-matching software Scans known data bases Look for terrorist threats Data mining: the concept
CBT – computer based training • 1. greater flexibility • 2. to deliver personalized training • 3. more familiarity with computers
Border Technology (DHS) 1. vehicle 2. _____ detection 3. _____ detection 4. video systems 5. augmented realty systems 6. nanotechnology Augmented Reality (AR) 1. _____ intelligence about crime 2. _____ recognition 3. automatic scans: 4. _____ dimensional mapping 5. advanced optics 6. “friend or foe” software 7. robots Technology on the Horizon
Problems 1. failure to use new technology 2. lack of knowledge on how to use technology 3. legal acceptability??? 4. violation of individual rights Prosecution 1. specific law not yet created 2. feds & states trying to keep up with legislation Problems in Implementing New Horizons / Prosecution
Identify Theft • Need for secure identify management systems • 1. • 2.
Technology & Individual Rights • Conflict with: • First Amendment • Second Amendment • Fourth Amendment • Fifth Amendment • Eighth Amendment • Fourteenth Amendment