StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Technologies in Identifying Crime - Case Study Example

Cite this document
Summary
As the paper "Technologies in Identifying Crime" tells, the introduction of technology in lawsuits has made it easy for security agencies to devise ways of curbing criminal activities in their regions. Different departments have embraced technology in their working areas in different perceptions. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Technologies in Identifying Crime
Read Text Preview

Extract of sample "Technologies in Identifying Crime"

Case Study Case Study The introduction of technology in lawsuit has made it easy for security agencies to devise ways of curbing criminal activities in their regions. It is essential to note that different departments have embraced technology in their working areas in different perceptions. This means that different technologies can be used in identifying crime differently (Hsu, 2013). These technologies can be studied differently as per the works of different scholars in the academic fields. The first case study involves the guides for the first respondents using electronic crime scene investigation. The second case study involves the need for the use of computer forensics in general. Case Study 1 The first case study is titled Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. The intention of the guide is to enable individuals understand the importance of using electronic devises during criminal investigations at the scenes (Ec-Council, 2009). It intends to make work easier for the forensics to know the cause of the crime easier at the scene without taking the samples to the lab for analysis. This would mean that they would have all the required electronic devises at the crime scenes. The guide starts by introducing individuals to digital evidence to be the data, which is important during investigation and is transmitted and received through electronic devices (Holland, 2004). They may include DNA evidences and fingerprints. The importance of securing these digital evidences is because of their vulnerability of crossing to the wrong jurisdictions and borders. It is also explained that these evidences might be altered, destroyed and damaged if they are not secured properly. It has been noted that criminal scenes are sometimes complicated for the first respondents at the scene. The use of electronic devices would enable the adjustments of the practical situations and circumstances at the scenes. These situations can be viewed from different perceptions. For instance, the investigation officer at the scene might not have the experience for such situations. The use of electronic devices would make it easy for them to make comparison of the situation to the identical criminal activity, which is on the database. The first responders may require the digital devices and evidences at the crime scene through application of different principles required by the police divisions of different regions. The collection of the digital evidence is applicable to the agents who ensure that everything follows the correct regulations. This means that securing, collecting and transportation of the digital evidences should not give room for distortion or changing of the collected data (National Institute of Justice, 2010). It is also essential to ensure that the trained professionals who are aware of the entire process should handle the examination and collection of the digital evidence. There should be documentation of the evidence during storage, seizure and transportation (Casey, 2010). This makes it easy for reviewing and referring to certain situations. The data collected by the first responders are required to be stored with a lot of caution to avoid violation of federal laws. One of the laws that might be violated involves the electronic piracy act, which was established in 1986 (National Institute of Justice, 2010). This also includes the act indicated in the 1980 enactment (Kizza, 2005). This means that there are individuals who are vulnerable to access the information without permission or without having authorization to the data. This makes the first responders obtain legal authorization before seizure of the evidence. This makes it difficult for the information to be distorted or changed by unauthorized individuals. The prosecution attorney is usually consulted for the important jurisdiction for legal authorization of the evidence at the criminal scene (Jones et al, 2005). The guide also shows the importance of responders to understand the fragility of the documents stored in computers. This involves the easy accessibility information by unauthorized individuals (National Institute of Justice, 2010). This makes them enact proper measures of ensuring that this does not happen through having secure passwords and access lines. Case Study 2 This case study looks at The Need for Computer Forensics. This is the title given to the guide to the authorities on understanding the importance of computer forensics in criminal investigations. The reason why individuals in this field advocate for the use of this mechanism is its vulnerability of making work easier of the officers (Santanam et al. 2011). Investigators have found it possible to exchange information through the internet with the aim of curbing the increasing number of hi-tech criminal activities. This has also made numerous private investigation companies to initiate computer forensics in their services. The same is applicable to military who have initiated their intelligence in investigations with computer forensics, which has been seen to be proficient (Volonino et al. 2007). The main concept of the idea was intended give insight in investigations through technical, legal and experiences in the law enforcement agencies. This has changed as the investigation departments in governments, private and military departments have employed their expertise in this field in order to attain effective results. The study indicates that computer forensics to be the application of techniques involved in forensic science in identification, analysis, preservation and presentation of digital evidence through the legal procedures. The process may involve artistic nature rather than science while at sometimes it might be vice versa (Solomon et al. 2005). For an individual to be proficient in the process of computer forensic, it is essential to be learned in the knowledge of computer software, hardware and proper techniques in the new technologies. This is important for refraining from destruction and compromising the evidence. Individuals engaging themselves in this field are expected to have vast knowledge in national, regional, local and international laws, which might interfere with the manner in which retention and collection of evidence, take place. This helps in engaging criminal activities, which might be enacted in systems, which are distributed widely in separate locations. Computer forensics can also be classified as the critical analysis of a computer hard disk after a criminal activity has taken place. This involves the use of specialized procedures and software tools that helps in analyzing data stored in computers (Kizza, 2009). This usually takes place during the retrieving data that might have been deleted from servers and hard drives seized by law enforcement agencies. This process also helps in understanding electronic discovery otherwise known as e-discovery, which is involved in production of documents and data during litigation (Solomon et al. 2005). Information that might be stored on computers and networks of the system will be included in the e-discovery. These are included in the system in form of database files, word processing documents, emails, presentations and spreadsheets (Volonino et al. 2007). Individuals that are proficient in computer forensics techniques usually have the ability and knowledge in computers, which are essential in logically dissecting the computer network and system. This is necessary in obtaining evidence easily in any part of the system. References Casey, E. (2010). Digital evidence and computer crime: Forensic science, computers and the Internet. London: Academic. EC-Council. (2009). Penetration Testing: Network Threat Testing Procedures in Security. Clifton Park, New York: Course Technology. Ec-Council. (2009). Investigating Networking Intrusions and Cybercrime. Course Technology Ptr. Hsu, D. F. (2013). Advances in cyber security: Technology, operations, and experiences. Holland, J. W. (January 01, 2004). Digital Government and Criminal Justice. Jones, K. J., Bejtlich, R., & Rose, C. W. (2005). Real digital forensics: Computer security and incident response. Upper Saddle River, NJ [u.a.: Addison-Wesley. Kizza, J. M. (2009). A guide to computer network security. London: Springer. Kizza, J. M. (2005). Computer Network Security. New York, NY: Springer. National Institute of Justice (U.S.). (2010). Electronic crime scene investigation: A guide for first responders. Darby, PA: Diane Publishing. Santanam, R., Sethumadhavan, M., & Virendra, M. (2011). Cyber security, cyber crime and cyber forensics: Applications and perspectives. Hershey, PA: Information Science Reference. Solomon, M., Barrett, D., & Broom, N. (2005). Computer forensics jumpstart. San Francisco, Calif: SYBEX. Volonino, L., Anzaldua, R., & Godwin, J. (2007). Computer forensics: Principles and practices. Upper Saddle River, N.J: Pearson/Prentice Hall. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Project 1 Case Analysis (CCJS321) Digital Forensics Study”, n.d.)
Project 1 Case Analysis (CCJS321) Digital Forensics Study. Retrieved from https://studentshare.org/information-technology/1627801-project-1-case-analysis-ccjs321-digital-forensics
(Project 1 Case Analysis (CCJS321) Digital Forensics Study)
Project 1 Case Analysis (CCJS321) Digital Forensics Study. https://studentshare.org/information-technology/1627801-project-1-case-analysis-ccjs321-digital-forensics.
“Project 1 Case Analysis (CCJS321) Digital Forensics Study”, n.d. https://studentshare.org/information-technology/1627801-project-1-case-analysis-ccjs321-digital-forensics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Technologies in Identifying Crime

Discuss and analyze DNA and fingerprinting technologies used in law enforcement today

Because of the above characteristic of fingerprints, fingerprint investigations can help the investigating officers in identifying the criminals.... Even though 99% of the human DNA is identical, 1% of DNA has unique characteristics which help the investigating officers in identifying different people.... DNA and fingerprinting technologies used in law enforcement today DNA and fingerprinting technologies used in law enforcement today Current criminals are smarter than the criminals in the past and they have the ability to conduct crimes without leaving any evidences at the crime site....
3 Pages (750 words) Essay

Car Crime in London; Selling Car Parts and Exporting Overseas

This essay "Car crime in London; Selling Car Parts and Exporting Overseas" discusses car crime has evolved as a major problem over the years.... In this regard, various schemes were initiated such as Sold Secure and VIC scheme in order to prevent car crime in London and entire the UK.... The primary objectives of the schemes were to facilitate good practice in the field of auto crime.... Consequently, car crime has emerged as one of the most frequent categories of crime in the UK....
14 Pages (3500 words) Essay

Computer Crimes in the USA

In the paper 'Computer Crimes in the USA' the author analyzes cyber crimes, which have assumed frightening proportions throughout the world.... In fact, it is relatively easier to indulge in cyber crimes as the perpetrators of such crimes are not restrained by their geographical locations.... ... ...
8 Pages (2000 words) Article

GIS applications and Juvenile crimes in Philadelphia

GIS is of significant importance in the field of crime analysis, since it provides the team with necessary information that not only assists in the detection of the crime but at times might also prevent the occurrence of several crimes (Johnson).... GIS or Geographical Information Systems combines the three aspects of geography, information and systems and uses the available data and advancements in technology for the knowledge of different geographical aspects....
5 Pages (1250 words) Research Paper

Technology and Crime

Additionally, the paper "Technology and crime" describes various areas of technology-based crimes.... The variety of technology-based crime is always growing, both as a result of technological alteration and in terms of social interactions with new technologies.... Cyberstalking is a crime in which the aggressor threatens a user of the internet using electronic sources, such as e-mail or instant messaging, or messages commented to a Web site or a group....
7 Pages (1750 words) Term Paper

Car Crime in London: Selling Car Parts and Exporting Overseas

This term paper "Car crime in London: Selling Car Parts and Exporting Overseas" discusses the intensity of car crime witnessed in recent times that have immensely demanded more stringent efforts to prevent such crimes.... Cars are attractive that makes car crime an easy target for criminals.... According to the British crime Survey (BCS), car theft contributes a substantial proportion of total crime within the country....
14 Pages (3500 words) Term Paper

Effectiveness of System in Preventing Drug-Related Crimes in Tel Aviv

It determines whether there is a geographic relationship between particular forms of drug channels or availability of drugs and crime.... ver the recent decade, developments in computer technology have started to considerably affect the manner policymakers and criminologists assess crime.... One of the most important technological developments has been the invention of geographic information systems (GIS) and crime mapping.... The implementation of computer mapping technologies by numerous criminal justice departments has contributed to the movement of criminal justice policymaking and implementation into the path that gives greater importance on the connection between crime and the environment setting wherein it takes place (Chainey & Ratcliffe, 2013)....
11 Pages (2750 words) Research Proposal

Internet and Digital Crimes

urthermore, the studies are not a substitute for the information-gathering methodologies and applications in crime intelligence that sustain solid criminal investigations.... The police agencies ought to apply computers in mapping crime and also in improving the strategies and methods in crime-fighting.... The middle managers and local commanders should be accountable for their activities in fighting against crime by explaining to executives the steps they prospect to take to reduce crime and plans they have set correct a particular crime to improve life quality....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us