New Technologies in Criminal Investigation: Using GPS to go where police officers cannot go
The computer age has brought on a whole new set of criminals: Hackers, virus perpetrators, business secret pilferers, identity thieves and more. The computer age has also changed the way in which traditional crimes are perpetrated too. As we saw in the horrific terrorist attacks of September 11, the Al Queda henchmen stayed in contact with their shadowy bosses over email, and were well aware of planes' schedules and fuel capacities significantly ahead of time via usage of the wide variety of information sources on the Internet.
True, technology has changed the way we live our lives in many positive ways, but it has also enabled criminals to attack their work from entirely different and more potent angles. Fortunately, similar technological advances are also available to the criminal investigation elements of our society as well.
One such advance is the global positioning system. Known as GPS, this paper will explore how the technology is revolutionizing the way criminal investigators do business.
Keeping track of paroled criminals
The primary use of using GPS in criminal investigation work is to keep track of paroled criminals. Often, parole officers and other criminal investigators will use GPS systems in congruence with many other advances in technology, including voice recognition systems and systems designed to work with existing radio / cellular networks.
Criminal investigation experts feel that the GPS systems are the most effective. Not only can they inform authorities when parolees or criminals are not where they should be, but they can actually proactively inform the operators where the person is. These systems have been used by law enforcement agencies for some years and are starting to be planned for monitoring the elderly, mentally challenged, and children. The opponents of monitoring individuals worry about the methods used to fairly decide who will be tagged for monitoring, and the itinerant privacy issues (discussed below). The opponents claim the slippery slope argument: They predict that once it starts it will not stop until everyone is tagged and monitored using a GPS system.
In this age of the Patriot Act, GPS technologies -- and the resulting constitutional conflicts -- are even more at the forefront....
Criminal Identification Procedures The dawn of the twenty-first century has become the era of George Orwell's "1984." Technology that was found only in science fiction a few decades ago, is part of today's standards and procedures. The world today is filled with cameras that can film an individual wherever he goes, his cell phone signal can pinpoint his location, and even one glance can reveal his true identity (Shenk 2003). Iris-recognition technology,
These breath-testers use a range of technologies including electrochemical fuel cells, infrared absorption, metallic oxide semiconductors and disposable color-change testers. The disposable breath-testers are cheap to purchase and very useful in detecting alcohol in a person's system. When the test is positive, to check for other drugs in his system, the person is required to give a blood sample for confirmation by a laboratory. In addition his urine sample is
New Regulatory Framework for Telecommunications in Jordan Jordan Telecommunications QUANTITATIVE RESULTS AND ANALYSIS Chapter X presented the pre-test results of the pilot study that used qualitative data collected from the interviews with Jordanian dignitaries. This chapter presents the quantitative results from the survey administered to the larger representative sample of respondents from Jordanian businesses. The interviews conducted for the pilot study and a review of the literature supported the development of questions used in
, 2005) In the same way that traditional techniques of criminal identification have enabled law enforcement authorities to establish national fingerprint information databases for the purposes of connecting evidence to possible previous offenders, DNA-based forensic evidence has allowed the creation of similar databases greatly expanding the types of forensic evidence used to increase the security of sensitive facilities and restricted areas. When combined with the ever-increasing power of modern computer technology to
S. law. Legislation such as many elements of the U.S.A. PATRIOT ACT are problematic because they do not provide adequate controls to ensure that investigative methods and procedures appropriate under some circumstances cannot be used in circumstances where they are inappropriate under U.S. law. 4. What is the FISA Court? Explain how it works. What authorities can it grant law enforcement? How is it different from traditional courts? What concerns exist
E., the company) that has technical control over telecommunications networks and thus technical ability to access communications, versus a party that is duly authorized to actually access those communications via a warrant (Mares, 2002). Although, as is consistent with the British model of legal evolution that relies heavily on interpretation of judicial action and precedent rather than overt legislative action, there have been no new statues issued in the intervening
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now