Technology in Criminal Justice

 

Brief Summary on Initial Knowledge Concerning Computer Applications in the Field of Criminal Justice

Before enrolling for this course, I thought that every sector in the country has advanced to use technology since it is an era of technology. Even though I did not know how, I thought that the criminal justice in each country and especially from the developed countries such as US knew how to use technology. This is because the criminals have advanced to use technology in their criminal activities in cybercrime and I expected that the criminal justice could do the same and apply technology to determine criminals. In fact, I thought use of computers was enough technology to help catch criminals. This means that I thought when the criminal justice system had computers in their offices, they were good to go and catch all types of criminals. This was the same with CCTV cameras, which I regarded among the best technological tools used to catch on criminals. I have heard of forensic tests that I presume uses technology to identify criminals and criminal acts. In fact, I thought the amount of technology applied in the criminal justice department was enough to deal with all sorts of crime.     

Brief Overview of the New Material Learned about Computer Applications in the Field of Criminal Justice

However, after enrolling in the course and reading a number of materials enlightening people on use of technology in in the criminal justice department, I now notice that what I knew is baseless. The computers used by criminal investigators, which I thought meant everything are not enough.According to Myers and Myers (2015), “there is not a comprehensive body of knowledge for the effective analysis of computer infrastructure threats and vulnerabilities” (p. 1). This implies that while organizations using computers and other forms of technology and thus at risk of cybercrime, there is insufficient knowledge to understand the threats they are exposed to and how to mitigate them. For instance, organizations are aware of the errors/ omissions that employees can make when feeding data to the computer systems. They also know how natural disasters can harm an organization. While there are measures in place to prevent these, there are no measures in place to prevent intentional acts of employees and other outsiders. As a result, it is noted that “Many organizations are not aware of the potential for losses or degree of their vulnerability to it, and sufficient and practical methods of deterrence, detection,prevention, and recovery have not yet been implemented or even found” (Myers & Myers, 2015, p. 2). It is also notable that the criminal investigation department that should be responsible for preventing technology crime is unable to do so because of lack of the required knowledge to do so. This is because technology crime is hard to detect, difficult to collect evidence, which is easy to destroy, and hard to identify the real culprits. It is thus notable that while technology has improved crime detection, police transportation, and communication among officers, the same technology has also the rate of cross-border crimes (Deflem, 2015).

Brief Statement on Topics to be Further Explored in the Area of Computer Applications in the Field of Criminal Justice

            With increased rate of technology crime, I would like to know what the issue has not been considered a serious crime and laws made to cover the issue. Once white collar crime was noted, there were laws that were created to deal with perpetrators of these laws. While cybercrime is a serious type of crime that results to unquantifiable amounts of losses to the victims, I would like this issue explored further. We should be provided with reasons as why laws have not been formulated and when they will be formulated. We should know what the government bodies responsible for creating laws have been waiting for and how deep they need the problem to go before they can come up with solutions. I would like this issue addressed because if there were laws on technology crime, I am certain there would be strategies to help the officers in the field as well. I would also wish this topic was explored further because as Myers and Myers (2015) notes, lack of laws governing technology crime makes it hard for prosecutors, law enforcers lack the required knowledge, and this type of crime is not a high priority for most legislators. This is also supported by Deflem (2015) who argue that police technology is so limited that it cannot handle technology crimes that it is responsible for addressing. This is an indication that police officers are not given the same extent of technology that would help fight high-technology crimes. People should thus be enlightened on this; why it is so currently, and what changes are likely to be done in the near future.

Current Events Addressing the New Things Learned Related to Computer Applications in the Field of Criminal Justice

            Currently, technology crime has increased with the recent target on mobile phones and banks. The virus sent on people phones is a type of technology crime. The latest threat report by McAfee on security threats on mobile devices calls for action by the investigation department. People’s mobile phones and other gadgets are under constant attack of malware, which is continuously devised. For instance, there was a 44% increase in malware creation between 2011 and 2012. Portable devices are seen as the latest hot targets because they contain financial and personal information that hackers can access using Trojan horse viruses. Visiting the internet is also a great risk since it is noted that much mischief happens without a person’s knowledge and even without downloading anything (Kelly, 2013). From these current events, it is evident that it is not easy to fight technology crime and the law enforcers are far from addressing the issue.

Brief Summary of the Key Points Addressed in the Current Events Located

From these events, it is evident that the criminals in technology crime are fast in applying technology in their activities. They do not stick to the same type of technology or crime and before people know it, they are using more sophisticated technology. The perpetrators are not easy to identify because they do not come into contact with their victims and in fact, they are not even in the system when the crime is taking place. For instance, a person will set viruses targeting people’s mobile phones and sit and watch waiting to get hold of his prey. It is also not easy to know when someone is falling a victim because one does not need to download anything and the dangerous sites visited to be caught. 

Compare and Contrast the Key Points Identified in the Current Event with Those Discussed in the Unit

From the current and the discussions in the unit, it is evident that technology crimes are on the increase. It is also clear that most people do not consider them serious and thus a person will ignore a virus on his phone. Further, these crimes are not easy to detect even with the involved of crime investigators. It therefore follows that the police department is far from dealing with technology crime.    

 

 

References

Deflem, M (2015). Technology and the internationalization of policing: A comparative-historical perspective. Proquest, 1-16.

Kelly, H. (2013). Cyber-criminals are targeting phones and bank info.Retrieved from http://edition.cnn.com/2013/02/21/tech/mobile/mcafee-threats-report/index.html.

Myers, L. J., & Myers, L. B. (2015).Identifying the required knowledge elements for the effective detection, investigation, and prosecutionof high technology crime: The perspective of academe.Proquest, 1-17.