StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Criminal Profiling And Remote Monitoring Of A Computer - Essay Example

Cite this document
Summary
Nowadays, the lives of people have become so busy and hectic that they have come to rely heavily on technology. From simple to the most complex of tasks can now be performed using the technology of today…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Criminal Profiling And Remote Monitoring Of A Computer
Read Text Preview

Extract of sample "Criminal Profiling And Remote Monitoring Of A Computer"

? Criminal profiling and remote monitoring of a computer Criminal profiling Discuss the criminal profiling application in network forensic investigations. Nowadays, the lives of people have become so busy and hectic that they have come to rely heavily on technology. From simple to the most complex of tasks can now be performed using the technology of today; this way is quicker and more efficient. Although technology has most definitely benefitted us in every possible way, there are some areas in which it has created numerous problems for us. One of these main problems is criminal activity, which has become even more common due to the technological advancements of today’s world. It has also become challenging for the police or investigators to trace the criminals or solve the crime, as now instead of just physical evidence like eyewitnesses and statements, the scene of the crime now consists cybercrimes, spam’s, frauds etc. on computers or a network. Due to this, the sector of digital forensics investigation has been opened and is in continuous development, in order to come to date with the digitally advanced types of crimes. Criminal profiling has been present for some time now. The earliest effort to practice criminal profiling was done in the early twentieth century. During World War II, criminal profiling was used and a profile on Adolf Hitler was prepared, which helped in his eventual capture. Criminal profiling can be divided into two categories: inductive and deductive. Inductive profiling of criminals is done by studying different types of behavior, gathered from various data. It is a type of profiling where conclusion is reached based on observation and determines a general behavior from a group of criminals. This type of profiling allows using information from the data collected on a group of criminals, and is then used to guess the personality or characteristics of the whole group. This plays a critical role in understanding the mind of the criminals and their next move. Deductive profiling is more specific as compared to inductive profiling. While inductive profiling is more general in nature, deductive logic requires a more precise approach. A single case is studied, and then a behavioral profile is formed on that case. But no matter which type of profiling is used, this method usually does not single out the suspect but reduces the number so that it becomes easier to identify the suspect. (Marc Rogers). Both the types of criminal profiling help in the digital forensic investigations. The number of suspects or the amount of evidence gathered in a network check leads to the collection of lot of data. From this data, the suspect needs to be identified and criminal profiling helps the investigator in doing that. The results acquired during criminal profiling aid in carrying out a distinctive search and the focus can be easily placed on a particular area. (Criminal Profiling in Digital Forensic, 2011) Discuss tools that could be used to remotely monitor a computer (with or without the computer owner’s awareness). You can discuss the technical solutions and the legal impacts. Also will this kind of evidence admissible? Are they admissible under which conditions? Monitoring different computers in an area and examining the activities on those computers is called remotely monitoring a computer. This supervision of a network of computers is used extensively by investigators nowadays, but it is a fairly new practice, which began less than a decade ago. To monitor different computers, various Internet or computer management tools were introduced, which have now developed into mechanized practices used by forensics experts to find evidence from computers during an investigation. The courts have allowed the authorities to monitor the computers of people under probation, so that their activities are kept under check. Different types of software and tools have been developed since the monitoring of computers started. Field Forensic Tools remains the foremost software, and they automatically carry out many of the different forensics techniques used by investigators in order to review different computers in an area. Computer Management Tools is more advanced software. It is installed in the suspect’s or the criminal’s computer and his activities are kept under check. It collects relevant information while operating in the background, and lets the investigators know the activities on the computer and the Internet, being done by the suspect or the criminal. This software allows the investigator to manually check what types of activities are being carried out by the person using the computer. This software not only allows inspecting the computer but also allows controlling it. Remote Computer Management System is software used to carry out monitoring computers. This software allows the officers or investigators to remotely monitor and control a computer through the Internet. This software makes use of forced gateway techniques to send relevant information to a different Internet server, where it is analyzed and reviewed. Although this technique of remotely monitoring computers is very helpful, it does have certain limitations. Laws have to be passed in order to implement the use of this software carefully, so that the rights of the offenders or suspects, as mentioned in the Fourth Amendment are not provoked. In a number of different states, laws have been passed which allow the lawyers or investigators to access the computers of various suspects and criminals, to collect only relevant information and not to breach their rights. Financial resources and aid should also be provided in this area so that these management or remotely monitoring tools can be used properly and accurately. (Richard C. LaMagna and Marc Berejka). Different types of monitoring tools have been introduced, which are accessible to the public as well, thus creating privacy issues. There is much software in which some of them are: Remote Pass Access, Easy Remote Access, Sniper Spy, NTSClient and many more. The NTSClient software sends the current screenshot of the computer to a different computer and thus, a thorough check can be kept on anyone. This is widely used in offices, to keep a check on the employees. (Mary Smott, 2012). Bibliography Free Remote Monitoring Tool Downloads - Remote Monitoring Tool Software. [online] Download Solutions – Software Informer. Available at: [Accessed October 13, 2012] LaMagna, Richard C. , and Marc Berejk. Remote Computer Monitoring: Managing Sex Offenders’ Access to the Internet. [online] Remote Computer Monitoring. Available at: [Accessed January 1, 2009] Rogers, Marc. The role of criminal profiling in the computer forensics process.[online]. The role of criminal profiling in the computer forensics process. N.p., n.d. Available at: [Accessed January 1, 2009] tecode. Technology and Information Security: Criminal Profiling in Digital Forensic.[online]. Technology and Information Security. Available at: [Accessed October 13, 2012]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Criminal Profiling And Remote Monitoring Of A Computer Essay”, n.d.)
Criminal Profiling And Remote Monitoring Of A Computer Essay. Retrieved from https://studentshare.org/information-technology/1458580-week6dq6
(Criminal Profiling And Remote Monitoring Of A Computer Essay)
Criminal Profiling And Remote Monitoring Of A Computer Essay. https://studentshare.org/information-technology/1458580-week6dq6.
“Criminal Profiling And Remote Monitoring Of A Computer Essay”, n.d. https://studentshare.org/information-technology/1458580-week6dq6.
  • Cited: 0 times

CHECK THESE SAMPLES OF Criminal Profiling And Remote Monitoring Of A Computer

Information Technology and Security

Describe and analyse the range of computer related crime, based upon this analysis, offer up some effective… h society is shifting from the production of goods to the production of services, and from a society based on the coordination of people and machines to a society organised around knowledge, according to Dutton and Peltu (1996) but the range of technologies introduced to the New information products and services available for use in organizations include teleconferencing, microcomputers, software packages, distributed data processing, automated offices, voice mail, networking, database management systems, and electronic mail (Braun, 2002)....
27 Pages (6750 words) Essay

Contract tender process in the work environment

Experts dealing with this major problem have attempted to give specific definitions of what is a computer crime.... It has also been discovered that computer crime is a crime that could be categorized as white-collar: for a computer... Its causes as well as the attributes and characteristics of those criminals responsible for this social malaise have been under scrutiny from different quarters: from the… This report takes a careful look at the what constitutes computer crime, the attributes and characteristics of computer criminals, the strategies to identify and prevent the criminals It is interesting that computer crime is compared with the crime of serial killing, but computer criminals are more subtle, erratic and evasive....
36 Pages (9000 words) Essay

Computer Forensics Challenges

Documents maintained on a computer are covered by different rules, depending on the nature of the documents.... An example would be if a warrant is issued for child porn on an individual's computer, but finds records of embezzlement, the embezzlement records could not be used in a court of law.... The exception is if the police could justify obtaining a warrant to search the computer for records of embezzlement.... It only applies to governmental actors and to criminal law [3]....
26 Pages (6500 words) Essay

Using GIS Profiling to Solve Serial Burglaries

Evidence also exists of terrorists who have formed operations centers for monitoring social networks, videos, and global news broadcasts.... The paper “Using GIS profiling to Solve Serial Burglaries” discusses the link between current advancements in technology and criminal activities.... It then elaborates on GIS tool and its appropriateness in solving serial crime using geographic profiling.... It then elaborates on GIS tool and its appropriateness in solving serial crime using geographic profiling....
11 Pages (2750 words) Research Paper

Effect of Technological Advances on the Validity and Reliability of Criminal Profiling

Furthermore, this paper will investigate the allegations that criminal profiling and the American criminal justice processes are flawed and skewed by human limitations leading to false confessions and improper convictions.... Known as offender profiling, criminal investigative analysis has come a long way, particularly with the invention of new and advanced technologies that have completely revolutionized the practice of criminal profiling (Winerman, 2004).... While providing criminal investigators with data and s, the new technologies have had a profound influence on the developments shaping the contemporary criminal profiling process and completely impacted both its validity and reliability at the same time....
9 Pages (2250 words) Research Paper

Apple Computer Analysis

The computer industry operates amidst tough competition.... While, at the corporate level, it is recognized that the company should be involved in both computer hardware and software development and sales, the business and operational level strategies have undergone un-intelligent makeovers during the organization's history.... he introduction of new products, aggressive advertising and strategic alliance with Microsoft proved profitable as iMac became the best-selling computer in the fall of 1998, and Apple's stock price escalated to over $130 per share in March 2000....
30 Pages (7500 words) Term Paper

Forensic Data Analysis

… Introduction One major drawback to technological innovations is computer crime.... This particular trend can be attributed to the Introduction One major drawback to technological innovations is computer crime.... These computer related crime pose a lot of threat to the global society because they are conducted in a very sophisticated, effective, and malicious matter.... Also spamming towards computer programs, instant messaging systems, weblogs, and mobile devices, make these technological products very vulnerable to worms, viruses, and fraud....
15 Pages (3750 words) Essay

Information Security - Risks, Security Plans, and Defensive Measures

As the paper "Information Security - Risks, Security Plans, and Defensive Measures" outlines, the aim of providing computer security may differ but it mostly entails protecting computer network information from corruption, hackers, theft, or its preservation.... These criminals are capable of designing software that will enable them to infiltrate computer systems and retrieve personal and confidential information.... These programs also cause great damage to computer systems....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us