1 / 31

18 – Future of Criminal Justice

18 – Future of Criminal Justice. technocrime. 1. 2. 3. Technocrimes. Police must understand: 1. __________ for use of technology 2. use technology in __________ 3. address __________ impact of this technology. Biocrime. Uses biologically active substances: 1. 2. toxins 3. organisms

lydie
Download Presentation

18 – Future of Criminal Justice

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 18 – Future of Criminal Justice

  2. technocrime 1. 2. 3.

  3. Technocrimes • Police must understand: • 1. __________ for use of technology • 2. use technology in __________ • 3. address __________ impact of this technology

  4. Biocrime • Uses biologically active substances: • 1. • 2. toxins • 3. organisms • 4. • 5.

  5. Cybercrime • 1. crime • 2. use of computer __________ • 3. violation of __________ law • 4. hacking • Transnational • 1. • 2.

  6. Social engineering Trick people into: Giving up __________ __________

  7. 1. theft of _____ 2. _____ 3. piracy 4. forgery 5. _____ 6. money _____ 7. terrorism 8. trespass 9. _____ 10. viruses 11. denial of _____ Cybercrime Treaty 1. 2001 2. Europe + U.S. / Canada / Japan 3. standardization of laws 4. detaining of cyber criminals for prosecution 5. exchange of intelligence Types of cybercrime

  8. Cybercrime statistics: 2004 • 75% of U.S. business had at least one incident of security violations: • 1. 65% _____ • 2. 25% _____ • 3. 19% _____ & vandalism

  9. malware • Malicious software • _____ • _____ Use • Stealth • Polymorphic codes

  10. Virus Malicious software that Virus signature

  11. Phishing • Relies on social engineering • Official looking emails to steal: • 1. _____ • 2. _____ • 3. user _____ • 4. _____

  12. Piracy – __________ software Losses: 1. $12.2 billion 2. 38% world-wide pirated Leading nations using pirated software _____ (97%) / _____ (95%) / _____ (92%) Spam 1. _____ 2. commercial advertisement CAN-SPAM Act ’04 Emails must 1. clearly advertisement 2. opt-out feature 3. valid address Software piracy / spam

  13. Terrorism & technology • WMD’s: • 1. • 2. • 3. • 4. • Bioterrorism - • intention use or threat • Viruses / bacteria / fungi / toxins from living organisms

  14. Crime control through technology • DNA fingerprinting • Vehicle tracking devices • Night vision optic finders • Digital imaging • Keystroke captures • Thermography • Automated plate recognition

  15. National Law Enforcement & Corrections Technology Center (NLECTC) 1. communications / electronics 2. forensic science 3. transportation & weapons 4. protective equipment Justice Technology Information Network (JUSTNET) 1. information exchange 2. notifies law enforcement of new technology Society of Police Futurists International (PFI) Predict future trends Futures Working Group (FWG) Coordinate government + academics on futuristics Technical organizations in criminal justice

  16. Local Police Departments Using In-field Computers or Terminals, 1990 and 2000 Source: Matthew J. Hickman and Brian A. Reaves, Local Police Departments, 2000 (Washington, D.C.: Bureau of Justice Statistics, 2003), p. iv.

  17. criminalistics • Applies technology & scientific technology to detection & evaluation of criminal evidence • Criminalist: _____ & _____

  18. Bertillion system 1. first modern system of: 2. some _____ didn’t change after maturity A. B. Skeletal _____ Fingerprints 1. 2. 3. 4. no two sets the same AFIS Criminalistics

  19. Biometrics 1. identification by 2. 3. Software to: 1. Retinal / iris scan 2. _____ recognition 3. _____ authentication 4. _____ geometry 5. _____ thermography Additional scientific fields 1. ballistics 2. pathology 3. forensic anthropology 4. forensic entomology 5. forensic photography 6. plaster / polymer casting 7. polygraphs 8. voice stress analysis 9. forensic dentristry Criminalistics

  20. The DNA Finger-printing Process

  21. DNA Constantly evolving On line data bases Can prove innocence & demonstrative guilt

  22. Daubert standard • Daubert v Merrell Dow Pharmaceuticals, Inc. • Criteria for admission of scientific evidence: • 1. • 2. • 3. • 4.

  23. DNA Identification Act - 1994 • Inference engine • 1. computer program • 2. compares: • Federal initiatives enhance use of DNA & databases

  24. Online Databases • Uses: • 1. routine storage of information • 2. cross-reference specific information to check for patterns • 3. crime prevention • 4. to find suspects

  25. Artificial intelligence programs • Make inferences based on information & draw conclusions • 1. _____ interface • 2. knowledge base of _____ information • 3. inference engine

  26. TIA – total information awareness information-sorting & pattern-matching software Scans known data bases Look for terrorist threats Data mining: the concept

  27. CBT – computer based training • 1. greater flexibility • 2. to deliver personalized training • 3. more familiarity with computers

  28. Border Technology (DHS) 1. vehicle 2. _____ detection 3. _____ detection 4. video systems 5. augmented realty systems 6. nanotechnology Augmented Reality (AR) 1. _____ intelligence about crime 2. _____ recognition 3. automatic scans: 4. _____ dimensional mapping 5. advanced optics 6. “friend or foe” software 7. robots Technology on the Horizon

  29. Problems 1. failure to use new technology 2. lack of knowledge on how to use technology 3. legal acceptability??? 4. violation of individual rights Prosecution 1. specific law not yet created 2. feds & states trying to keep up with legislation Problems in Implementing New Horizons / Prosecution

  30. Identify Theft • Need for secure identify management systems • 1. • 2.

  31. Technology & Individual Rights • Conflict with: • First Amendment • Second Amendment • Fourth Amendment • Fifth Amendment • Eighth Amendment • Fourteenth Amendment

More Related