1 / 20

The Future of Criminal Justice

18. The Future of Criminal Justice. Use of Emerging Technologies. Officer safety Criminals using real-time surveillance of police operations using cell phones and social media Posting personal information and photos of officers using social media

ezuniga
Télécharger la présentation

The Future of Criminal Justice

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 18 The Future of Criminal Justice

  2. Use of Emerging Technologies • Officer safety • Criminals using real-time surveillance of police operations using cell phones and social media • Posting personal information and photos of officers using social media • Rapid advances in technology have ushered in a new era of criminal opportunities

  3. Emerging Technologies • Understanding these technologies is important • Anticipate their use by terrorists and criminals • Incorporate their use into police operations • Deal effectively with the social changes and cultural impact that will occur Thomas J. Cowper, “Foresight Update 49,” http://www.foresight.org/Updates/Update49/Update49.4.html (accessed August 5, 2011).

  4. Biocrime • A criminal offense perpetrated through the use of biologically active substances • Chemicals and toxins • Disease-causing organisms • Altered genetic material • Organic tissues and organs • Biocrimes unlawfully affect the metabolic, biochemical, genetic, physiological, or anatomical status of living organisms

  5. Biocrime • Attack on agricultural plants, animals, and human beings (agroterrorism) • Future use may involve illegal harvesting of human organs, human cloning, direct alteration of the DNA of living beings to produce a mixing of traits between species • Stem-cell harvesting is under debate

  6. Cybercrime • A criminal offense that focuses on information stored on electronic media • Hackers • Computer viruses • Malware • Phishing • Software • Spam

  7. Social Engineering • A nontechnical kind of cyberintrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures, such as giving passwords to a remote IT staffer • This is the most likely way for intruders to break into the system PiaTurunen, “Hack Attack: How You Might Be a Target,” CNN.com, April 12, 2002, http://www.cnn.com/2002/TECH/ptech/04/12/hack.dangers (accessed August 3, 2006).

  8. Transnational Cybercrime • Cybercrime can easily be cross-jurisdictional or transnational, which makes investigation and prosecution complicated • The 43-nation Council of Europe approved a cybercrime treaty in 2001 which standardizes legal issues of cybercrime • It was also signed by the U.S., Canada, Japan, and South Africa “Cybercrime Treaty Gets Green Light,” BBC News Online, November 12, 2001. Details for this section come from the Council of Europe, Convention on Cybercrimesignatorieswebsite, http://conventions.coe.int (accessed April 8, 2011).

  9. Cybercrimes • Fall into one of nine broad categories: 1. Theft of services 2. Communications in furtherance of criminal conspiracies 3. Information piracy and forgery 4. Dissemination of offense materials or extortion threats 5. Electronic money laundering and tax evasion

  10. Cybercrimes 6. Electronic vandalism, terrorism, cyberterrorism 7. Telemarketing fraud 8. Illegal interception of telecommunications 9. Fraud involving electronic funds transfer Peter Grabosky, “Computer Crime: A Criminological Overview,” paper presented at the Workshop on Crimes Related to the Computer Network, Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders, Vienna, Austria, April 15, 2000, http://www.aic.gov.au/conferences/other/compcrime/computercrime.pdf (accessed January 12, 2007).

  11. Terrorism and Technology • Handguns can be produced using 3-D printers with capability to fire armor-piercing bullets • Black market availability of liquid metal embrittlement • Backpack-type electromagnetic pulse generators Some of the technological devices described in this section are discussed in G. Gordon Liddy, “Rules of the Game,” Omni,January1989, pp. 43–47, 78–80

  12. Technology and Crime Control • Police departments are utilizing social networking sites such as Facebook and Twitter to capture wanted persons and communicate in a positive way with the citizens they serve • The same sites can remove the needed tactical element of surprise in police work Mike Levine, “Officials Warn Facebook and Twitter Increase Police Vulnerability,” FoxNews.com, May 10, 2011, http://www .foxnews.com/scitech/2011/05/10/officials-warn-facebooktwitter-increase-police-vulnerability/#ixzz1Otq6y5F0 (accessed June 10, 2011).

  13. Technology and Crime Control • DNA fingerprinting, keystroke captures, laser and night vision technology, digital imaging, and thermography are new tools in crime fighting • APR (automatic plate recognition) software can alert police to a stolen car or wanted subject • NYC Real Time Crime Center Alan Feuer, “Where Police Work Has a Tinge of Sci-Fi,” New York Times, January 1, 2009, http://www.nytimes.com/2009/01/01/nyregion/01roomsmet.html (accessed June 4, 2009).

  14. Criminalistics • The use of technology in the service of criminal investigation • The application of scientific techniques to the detection and evaluation of criminal evidence • Criminalist • A police crime-scene analyst or laboratory worker versed in criminalistics

  15. Criminalist Tools • AFIS: Fingerprint database • Biometrics: Retinal scanners, facial recognition software • Ballistics: Analyze weapons and projectiles • Forensic anthropology: Reconstruct the likeness of a body • Forensic entomology: Determine the time of death

  16. Criminalist Tools • DNA Identification/Fingerprinting • Online databases • Computer-Aided Investigations (expert systems) • Computer-Based Training (shoot/don’t shoot)

  17. Future Technology and Crime • Augmented Reality • Real-time and accurate overlay of digital information on a user’s real-world experience • Nanotechnology • Engineering & creating useful products on a molecular level to help fight crime • RFID Tags • Tags built with nanotechnology which are undetected by touch or feel but can send radio signals

  18. DHS • Use of high-technology equipment for border security • Trace detection technology • Radiation detection equipment • Advance Passenger Information System used at airports • Uses biographical information • Remote Video Inspection System used at border crossings

  19. Technology and Practicality • The appearance of “wired” officers may differ from other officers • Cost effectiveness of new technology • Databases must be secured • Legal issues will arise with new technological applications and due process and constitutional rights ensured

  20. The Future • It is predicted that databases will be used by the public and the police, such as sex-offender registries • Improvements in communications technology between agencies and between the public and agencies will lead to a decrease in criminal opportunities The material in this section is adapted from Nancy M. Ritter, “Preparing for the Future: Criminal Justice in 2040,” NIJ Journal, No. 255 (November 2006).

More Related