StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Role of Contemporary Digital Media in Criminal Investigations - Research Paper Example

Cite this document
Summary
The paper "Role of Contemporary Digital Media in Criminal Investigations" asserts digital technology and its advances have improved the security details of many countries all over the world. The technology makes it possible to investigate scenes of crime and collect primary information digitally…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Role of Contemporary Digital Media in Criminal Investigations
Read Text Preview

Extract of sample "Role of Contemporary Digital Media in Criminal Investigations"

The Role of Contemporary Digital Media in Criminal Investigations Introduction In contemporary society, digital media finds use globally in various platforms including business, communication, and politics. Whenever one mentions digital media, most people immediately imagine of cell phones, computers or internet. However, digital media refers to any modern technology that provides basic information applicable in various purposes. One major application of digital media is in the criminal investigations department. Criminals in the modern day have enhanced their techniques by using digital media to communicate. For example, criminals most often use hand held games to carry encrypted or coded information. Police officers have therefore also turned to digital technologies to obtain information and evidence against criminals. As a result, contemporary media has led to enhancement of security details especially in the criminal investigations departments all over the world. The study provides a critical scrutiny of the role of contemporary digital media in criminal investigations. Research carried out by various scholars has proven that digital technology is the major source of evidence whenever detectives are carrying out investigations. The paper further discusses how digital media is associated with digital technology and structural hierarchies of power, diversity, digital evidence, its privileges, demerits and misconceptions. In addition, it gives an in-depth discussion of the various issues that affect digital media as a source of criminal evidence. Consequently, the study concludes that contemporary digital media is authoritative in combating various criminal activities through enhancement of criminal investigation services and expertise. Digital evidence Digital evidence refers to any information or data considered to be of value in a criminal investigation. The evidence is stored on, transmitted and received through electronic devices. Retrieval of information takes place when the gadgets remains seized, examined and analyzed. Digital evidence acquired from digital media is easily damaged or altered. It is latent and time sensitive (Nelson, Phillips & Steuart, 2015). The information also quickly crosses jurisdictional borders. The evidence thus requires skilled personnel to decode the information. Digital media serves as the source of the digital evidence. The term digital is used because information is stored electronically in the device and has to be broken down into digits during decoding. The digits are in form of binary units of ones and zero. Special programs and software are able to decode the digits and provide the necessary information. Information of any kind ranging from photographs to spreadsheets to words can remain coded and transmitted electronically. The use of coded information as digital evidence has led to the growth of forensic studies, which aims at retrieving, exploiting and manipulating the coded information. Sources of Digital Evidence Digital media and devices are widely used to provide information for investigative purposes. This research paper discusses several categories of digital media used for forensics. They include internet-based devices, mobile devices and standalone or computer devices. The digital media devices differ in methods of evidence collection from them, their tools and mode of operation. Internet Based Media In the mid 1990’s, launching of internet took place. The establishment of internet ushered in a new era of technology that saw an increase in accessibility of information globally. The world as a result is now a global village whereby one can communicate all over the within very little time. Contemporarily, acts as a significant information and resources source of any kind. Internet usage remains restricted to scholars and detectives. Additionally, criminals, traffic illegal espionage, and photographs or data use such internet sources. Criminals are able to hack and gain access to financial records and communication systems of major organizations, government agencies and corporations. They steal huge amounts of money, sabotage the systems and steal critical information and personal identities. As a result, criminal investigators have undergone rigorous trainings on the use of software to retrieve information from digital devices. It enables them to be way ahead of the criminals in terms of digital technology to curb the vice. However, internet has been a great challenge since the technology keeps on changing and advancing into systems that are more complex. The criminal investigation departments therefore, have to keep upgrading their systems and software according to the latest trends. The internet consist an interconnection of various networks to a main internet service provider, which enables sharing of information globally (Eorghan, 2011). Mobile Phones Hand held voice transmission devices, also referred to as walkie-talkie were in existence since the 1940’s. They utilized radio transmission frequencies to pass voice messages from one person to another. However, introduction of cell phones took place in the early 1980s. Since then cell phones and use of wireless technology have found various applications globally. The criminal investigation has used these digital media gadgets to source out information as evidence. Previously, society used mobile phones exclusively for communication. However, the modern cell phones perform various tasks such as taking of digital photographs, sending of instant messages and browsing the internet. The main advantage of using mobile phones is that they can keep a record of messages or any activity (Bowser, Lewis, Fuller, & Emerson, 2011). Therefore, criminal activities carried out using phones can remain easily tracked down by the investigators. Mobile phones thus are a major source of digital evidence during criminal investigations. Computers Many institutions, organizations and corporations use computers for information storage and efficient operations. However, computer crimes have been on the rise. During criminal investigations, information obtained from such computers act as major digital evidence (Eorghan, 2011). The information is retrieved from the binary units used for coding using specific software. Computers also contain data from activities carried out on the web, copyright infringement, counterfeiting, and extortion among many other crimes. Digital cameras Digital cameras can encode digital imageries and videos that are stored within the device’s memory for future reproduction. These digital cameras are also incorporated in mobile phones, PDAs, vehicles or on CCTV cameras. Digital cameras are an important source of evidence in criminal investigations. They help to gather and keep an imagery record of what occurred at a particular time (Holt, Bossler & Seigfried-Spellar, 2015). The cameras operate using an optical system that allows focusing of images. The detectives make use of the optical system to obtain fine images of the crime scene. The cameras operate using an optical system that allows focusing of images. The detectives make use of the optical system to obtain fine images of the crime scene. Thomas et al 2015). For example, when criminals raid a bank which has been installed with CCTV cameras, the identity of the criminals can be easily revealed by decoding the information on the camera. The cameras operate using an optical system which focuses on the object. The image is enlarged or made smaller depending on an individual’s liking. Therefore it is possible to collect images of fine detail from the cameras. The focus is dependent on the image sensors on the camera. The image sensors can either be CCD or CMOS. Social Networking A research carried out shows that about 72 percent of young adults cannot go a day without being online in the social networks (Boyd, 2010). The social networks enable people to interact and share ideas all over the world. People often reveal, conceal or disclose personal information with the aim of creating connections with others. However, the social networks are also be used by criminals to pass on information, steal identity and for carrying out fraud. The criminal investigation department therefore often relies on social networks as source of digital evidence. The social networking sites include Facebook, twitter, WhatsApp, 2go, google chats amongst many others. Types of Crimes Solved using digital evidence Digital evidence may be required during criminal investigations such as rape, murder, child abuse, extortion, burglary, stalking, gambling, counterfeiting, terrorism, property crimes and piracy. Digital evidence from media is applicable in providing pre or post information. In most cases, when the crime is committed, a trail of electronic information remains. This information serves as evidence usable by investigators to identify, seize and for exploitation. When gathering this evidence, specific procedure are followed to avoid loss, distortion or damage of the data that would render it disqualified in court. For example, in rape cases, the detectives seize the victim’s mobile phone and retrieve any information on it. Threatening texts or conversations made using the phone may serve as evidence and lead to the identification of the perpetrators of the crime. The mobile phones, a form of digital media has thus aided in tracking down criminals. The use of surveillance cameras has also led to the advancement of criminal investigations. Surveillance cameras placed at strategic places, give footage of any activities taking place within that given location. The surveillance cameras thus offer digital evidence used by detectives when they are carrying out their investigations. Global Positioning System involves the use of satellite bodies placed in the space for navigation purposes. It is used during criminal investigations to provide information about the location of a substance and time details. Most often, detectives sought after the GPS to identify where the criminals are located and at what time they carried out the crime. Who Conducts Analysis Only qualified personnel examine digital evidence on digital devices. Certified digital media examiners are investigators who mandated with the role of manipulation digital evidence. They are highly trained and have experience on handling of investigative information. Among the areas they have specialized in include data recovery, legal issues, pre examination procedures, media assessment, data analysis, documentation, reporting and presentation of findings from their research. Digital forensics certification board certifies investigators who have qualified in their trainings. Most countries contain at least a department that deals with digital forensics for criminal investigations. In addition, they may also have other agencies such as joint terrorism task force, all of which provide additional protection against crime (Pave, Andrew, & Ibrahim, 2013). For example, in USA, FBI is an agency that carries out investigative roles on crimes. The investigators in FBI have excellent training and certification to perform such roles. Limitations of Evidence from Digital Devices The major limitation in investigation using digital media is the presence of encrypted and proprietary systems that require decoding for the retrieval of information. Decoding of encrypted passwords requires use of very complex software and can take long time to unravel. However, television crime shows portray a very different perspective. Encrypted data decoding thus requires an input of time and professional skills (Holt, Bossler & Seigfried-Spellar, 2015). Laws governing use of digital media vary from state to state. Actions considered as a digital crime in one country maybe acceptable in another country. Thus, technical and legal limitations affect the use of digital evidence in criminal investigations. Digital crimes can simply cross authorities causing regularization to be an increasingly precarious law implementation issue. Data owner is also a limitation in criminal investigations using digital evidence. On can easily that data retrieved is not his. In such instances, impossibility exists in ascertaining who owns that data that has been retrieve from the digital device. Wiretapping laws also limit the use of digital evidence especially when seizing someone’s phone. Stopping a call without an order from the court is a violation of privacy expectations. In addition, if a call or message comes through after confiscation of the phone, it cannot be used as evidence since the people holding the phones are not the intended. Privacy laws limit use of digital evidence. Only authorized examiners seize the devices. Otherwise, the gadgets cannot be used as source of information in a court of law. Internet and personal device privacy laws keep changing from one nation to another. In addition, people have different understanding of the privacy laws. Young people claim to have freedom of access any information and any movements or communications they make are private. However, the older people believe tracking of their movements is necessary. Their expectation is very little on privacy. Quality Control and Assurance Just like other forensic specialties in a laboratory, digital evidence requires control and assurance to ensure provision of quality evidence. In the U.S, the SWGDE connects agencies involved in digital and media evidence gathering. This ensures quality evidence is developed. The minimum requirements by SWGDE for Quality assurance when processing both multimedia and digital data involve following of quality management system documented on a quality manual. The Quality management system contains details about the procedures, resources, processes, structure and documentation of the digital evidence. Reporting and Interpretation of Digital Evidence A report is submitted by the investigator to prove the authenticity of the digital evidence. The report contains information on how the data was retrieved and analyzed. In a courtroom, information such as text messages are presented on actual digital device. However, other evidence such as emails require a print out to be prepared. The print out shows a track record of the information exchanged using the device, the hash value and hash code which serve as a mark of authenticity. These hashes require support and an in-depth explanation to the courtroom and the participants (Eorghan, 2011). Hash value is derived from calculation that is performed on electronic files, texts and the contents on the hard drive. They recognize and filter duplicate files from the original source of digital evidence. The value proves if the information obtained is real and is of forensic importance. For example, a hash task performed on the hard drive of a suspect should create a hash value report that precisely match the report produced by using a set of rules on the hard drive’s image. This information is then used as digital evidence during criminal investigations. Harsh values are fast, reliable and serve as a secure way of comparing data from media and individual files. The data is obtained from both single text files to large amounts of information of about five terabytes present on a server. Calculation of hash value is a vital process for evidence confirmation in electronic detection and computer forensics (Eorghan 2011). Misconceptions about Digital Evidence Retrieval and use of digital evidence experiences various misconceptions. Firstly, people believe that any data on a hard drive or any other electronic media is easily and always retrievable. However, this is not true. Overwritten and destroyed cannot be read. If the device containing the information is physical damaged, the data may not be retrieved. Some forensic laboratories contain clean rooms in which examination of hard drive components and reconstruction of data takes place. The process is often tedious and highly expensive. Others believe decryption of passwords using specific software is easy and fast. Passwords nowadays have become more complex with people opting to use symbols, numbers, capital letters and very long words. There exist billions of words used as passwords. This makes it complex to decrypt them. It requires a longer period for someone to try to come up with the right password whether using software or any available resources. However, to solve this issue, people get involved in the criminal case to reveal the passwords. People believe that conversion of any digital image captured by digital devices into pictures of high quality is easy. However, not all images can be refined for clarity and quality. Images are essential sources of evidence. It is not possible to add pixels after the image is captured. Therefore, if the image is of low quality, it is not possible to refine it to a better quality. Manipulation of high-resolution photos is easy and provides the necessary information. Digital evidence requires more than just staring at a crime scene or the time of crime. On the other hand, looking into the files of the digital evidence can easily tamper with the original information. For example when an investigator decides to look at a message from the chat room, it changes the status about the date of access of the files or even the profile information about the user. In a court of law, the information is inadmissible once such changes are noted. Investigators who are highly trained are however able to decode information to give all the necessary dates and locations which are required as evidence. Investigators need regular training on ways of obtaining digital evidence depending on the changes and advancements in the digital technology. Such training and advancements in knowledge and skills remains imperative in improving their expertise in crime investigation and familiarity in effective use of contemporary technology. Otherwise, they will lag behind and thus will not capture important details when investigating criminal activities. For example, the investigators should be aware of the possibility of thumb drives or SD cards used to carry information getting easily discarded. Information on them is easily distorted thus making it harder to obtain relevant crime evidence. Conclusion Contemporary digital media is of great importance in providing digital evidence during criminal investigations. Digital technology and its advances have improved the security details of many countries all over the world. The technology makes it possible to investigate scenes of crime and collect primary information digitally. However, the criminal investigation departments should strive to keep up the changes that take place day to day in the digital technology world. The criminals too are getting enlightened on how to commit their crimes digitally. Therefore, for purposes of security, criminal investigation department must always remain ahead in terms of technology and software required. Such advancement remains a possibility through regular training in contemporary digital media platforms and skills in dealing with crime. Bibliography Nelson, Bill., ‎ Phillips, Amelia and Steuart, Christopher. Guide to Computer Forensics and Investigations. London: Cengage Learning Publishers, 2015. Bowser, Mark., Lewis, Ben., Fuller, Jan, and Emerson, James. 2011. Computer Crime and Digital Evidence: What Every Police Chief Should Know. Technology Talk. The Police Chief 78 (2011): 84-85 Boyd, Dana. Social Network Sites As Networked Publics: Affordances, Dynamics And Implications: In A Networked Self Identity, Community And Culture On Social Network. London. Routledge Publishers, 2010. Eorghan, C. Digital Evidence and Computer Crime: Forensic Science, Computer And Internet. Waltham: Academic Press, 2011. Holt, Thomas J., Bossler, Adam M, and Seigfried-Spellar, Kathryn C. Cybercrime and Digital Forensics: An Introduction. London. Routledge Publishers, 2015. Pave, G., Andrew, M and Ibrahim, B. Digital Forensics and Cyber Crime. Fifth International Conference, ICDF2C 2013, Moscow Russia. September 26-27 (2013). . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Associated with digital technology and structural hierarchies of power Research Paper”, n.d.)
Associated with digital technology and structural hierarchies of power Research Paper. Retrieved from https://studentshare.org/english/1694759-associated-with-digital-technology-and-structural-hierarchies-of-power-and-privilege-diversity-and-homogeneity
(Associated With Digital Technology and Structural Hierarchies of Power Research Paper)
Associated With Digital Technology and Structural Hierarchies of Power Research Paper. https://studentshare.org/english/1694759-associated-with-digital-technology-and-structural-hierarchies-of-power-and-privilege-diversity-and-homogeneity.
“Associated With Digital Technology and Structural Hierarchies of Power Research Paper”, n.d. https://studentshare.org/english/1694759-associated-with-digital-technology-and-structural-hierarchies-of-power-and-privilege-diversity-and-homogeneity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Role of Contemporary Digital Media in Criminal Investigations

Crime Scene Investigations and Death Investigations

Contemporary Issues in Law Enforcement: Crime Scene investigations and Death investigations Abstract This research paper attempts to review the procedures that occur in murder crime scenes, including those that also have electronic crimes connected with the case.... Conclusion 40 Appendix 43 References 47 Introduction With the population of television shows dealing with criminal activity, either real or imagined, the public has taken on quite a bit of ‘knowledge' about what goes on when investigating a crime scene and dealing with all the varied components of forensics (“Bones”) and the DNA left behind by the perpetrators....
52 Pages (13000 words) Research Paper

Does the Press Have Too Much or Too Little Freedom

41) development and application of criminal justice technology for the purpose of individual liberty is possible only in communities that share and perpetuate democratic norms.... Introduction: The press has always played a very important part in the political, social and cultural life of the country, along with other media such as television, and radio; and the present day internet.... ??Freedom of the press is the right to speak, broadcast, or publish without prior restraint by or permission of the It may also encompass legal guarantees of access to information, protection of journalists, public's limited access to the media and right of reply or correction”....
10 Pages (2500 words) Essay

Are DNA Databases Crossing the Line

This paper "Are DNA Databases Crossing the Line" discusses issues that are hotly being contested as regards the moral obligations as well as the technicalities involved in the processes of development of a DNA database to and as it is applicable to a criminal investigation.... ... ...
9 Pages (2250 words) Essay

The Place of Public Police in Contemporary Security

he aim of this paper is to discuss the place of the role of Policing within the context of this rapidly changing modern society.... The paper concludes by stating that the role of the police is still important today though like all other organizations, the Police need to change constantly to cope with modern emergent forms of crime.... n contemporary society, Police still play an important role in primarily maintaining law and order but they have also been assigned other duties including controlling the flow of persons at disaster sites and carrying out first aid....
15 Pages (3750 words) Essay

Challenges Faced by Cyber Forensic Experts in Search of Digital Evidence

This paper "Challenges Faced by Cyber Forensic Experts in Search of digital Evidence" examines cyber forensics, by looking at the process and its applicability in contemporary society.... Cyber forensics is the use of scientifically verified techniques to collect, develop, deduce, and to apply digital proof to give a convincing depiction of cybercrime tricks (Saks & Koehler, 2005).... Cyber forensics also comprise the act of making digital information appropriate for addition to a scandalous investigation (Rowlingson, 2004)....
18 Pages (4500 words) Research Paper

The Scope of Job and Role of a Forensic Investigator

The paper "The Scope of Job and role of a Forensic Investigator" states that with significant endeavours by forensic experts in volatile memory, the anonymity will slowly erode since investigators are now able to extract past information and can reconstruct early conversations.... For this reason, the central role of any forensic investigator is not only in executing investigation to unearth the truth about a mystery but also to apply his or her prowess to seize and safeguard obtained evidence....
12 Pages (3000 words) Coursework

Investigations and Digital Forensics

The paper 'investigations and Digital Forensics' focuses on local and national law enforcement agencies commencing their career in law enforcement.... Cybercrime refers to all criminal activities, which specifically target computers or networks used for infiltration or damage.... In cybercrime, computers are the main tools of criminal activities.... This vastly enhances the effects and reach of criminal activities since criminals do not require being in physical proximity with their victims in order to commit crimes....
7 Pages (1750 words) Term Paper

How Important is the Media in the Investigation of Serious Crime

60) ascertain that media in the presence of serious crime can be used to offer assistance to the generation of data.... The figurative role of the Corps in the war against crime remains upheld for scrutiny and valued by the media besides being recognizable by the previous police agents.... Further, it acts as a link between the public and the audience as a means of reporting the investigations carried out on crime.... On the other hand, a criminal investigation is a process of ascertaining, collecting, organizing, identifying....
12 Pages (3000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us