Use Of Technology In The Boston Bombings Investigations Case Study

Technology Boston Bombings The Use of Technology in the Boston Bombings Investigations

The Boston Marathon bombing incident was an act of terror that took place on April 15th, 2013 during the annual Boston Marathon. During the event, bombs were positioned in proximity to the race's finish line. The bombs killed two individuals and injured over two hundred fifty others would where close by. Dzhokhar Tsarnaev and Tamerlan Tsarnaev were the primary suspects in the case that were identified by the Federal Bureau of Investigations (FBI). A day after the bombings a massive manhunt ensued to find the individuals. However, one of the interesting aspects about the case is how the FBI was able to identify the suspects. An unprecedented amount of digital data was available for use and the FBI and other organizations utilized crowdsourcing techniques to help funnel through the data.

The advent of digital technologies coupled with the falling costs of storage capabilities has led to a situation in which massive amounts of digital data can be generated at any given time. The power of crowds can be harnessed to help sift through troves of data to work towards a common objective. Crowdsourcing has been used in a wide array of different situations to complete many unrelated tasks that require more human resources than any one person, or even one team, could provide. For instance, a crowd can provide enough manpower to accomplish a goal in hours that an individual could not complete in many years. The work is divided up and if enough people are involved then the total contribution can reach staggering proportions. This analysis will consider all of the available technologies and opportunities that the FBI had at their disposal during the Boston Bombing and discuss how these technologies were used to apprehend the suspects and what ethical and legal implications may be relevant to this case.

Closed Circuit Television

Boston had a network of closed circuit surveillance cameras in place during the Boston Bombings. The camera network was able to capture images of the suspects that were described as "grainy" or being of a low resolution. Many major U.S. cities have implemented surveillance technologies to help patrol urban areas. These cameras increase the likelihood that a suspect will be caught on camera, however, at the same time, these technologies can create a massive amount of footage that is so enormous that it can be of little use. However, new advancements in facial recognition software and other technologies are increasing the ability for law enforcement officers to make more efficient use of the data being collected (Kelly, 2013 ).

Figure 1 - CCTV Footage of the Suspects (Kelly, 2013 )

Although the use of new technologies may be promising for law enforcement, it also creates a wide range of privacy concerns. The debate between national security and individual liberties, especially privacy, has reached new proportions as technology has increased the ability for the state to create mass surveillance programs. Terrorist events such as those that occurred on September 11th, 2001, have increase the government's use of different surveillance and monitoring activities through the Patriot Act and other legislations. After the tragedy that occurred on 9/11, the balance between privacy, individual liberties, and security was definitely tilted towards security.

The arguments in defense of curtailing various certain civil liberties were made in order try to prevent future acts of terrorism in the U.S. Although many countries took similar actions; most were not as comprehensive as some of the policies that the U.S. implemented. Edward Snowden, who worked for the National Security Agency through subcontractor Booz Allen in the NSA's Oahu office, alerted the world to the extent of the surveillance measures being conducted in the U.S. After Snowden fled to Hong Kong, China, newspapers began printing the documents that he had leaked to them, many of them detailing invasive spying practices against American citizens (Bio, 2014). Snowden was quoted as stating that his motivation stemmed from the following statement:

"I don't want to live in a society that does these sort of things ... I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under."

Snowden's, and others, leaks about the level of surveillance being conducted on the internet and through all communication mediums, coupled with the fact that CCTV cameras are now being used with facial recognition has sparked a national debate about the balance between privacy and security. Technology has allowed society to...

...

However, many question the effectiveness of these systems. For example, London has one of the most advanced CCTV systems in the world. However, in 2008, only one crime was solved for every 1,000 cameras, according to the city's police. CCTV cameras across Britain also cost authorities nearly $800 million over the past four years, according to civil liberties group Big Brother Watch (Kelly, 2013 ). If the surveillance systems are not effective in practice, then this would definitely tip the scales back towards the privacy position in the balancing act.
Crowdsourcing

It has been estimated that each day people around the world spend 600 years collectively playing Angry Birds. The power of processing in crowds is immense and this collective effort could potentially be turned to more rewarding work and there are many examples of people trying to do exactly that. Sebastian Seunga professor of computational neuroscience at the Massachusetts Institute of Technology, is attempting to harness the power of a crowd to build a "connectome" which is a map of the vast number of connections in the brain that underlie vision, memory, and disease (Johnson, 2012). The researchers have designed a game that lets players help map the brain by filling in colors that help create a map of the neural processes in the brain. The individuals who play the game are actually helping to create a data map of different slices of a brain image that have been taken with an electron microscope. In many cases there is no substitute for human perception. For example, it has been estimated that completing this work even with a computer program to assist would take one individual a thousand years to complete the map of the brain.

Crowdsourcing was definitely one of the tools that was implemented in the wake of the Boston Bombings as well. After the Boston Marathon Bombing, the FBI utilized the power of crowds to help them dissect the massive amount of data that was available. "There has to be hundreds, if not thousands, of photographs, videos, and other observations that were made down at that finish line yesterday," -Timothy Alben, superintendent of the Massachusetts State Police, said at a press conference (Powers, 2013). Many of the individual citizens that were present that day built websites that allowed them to collaborate, post, and analyze all of the digital data that was collected about the people in attendance.

Reddit's "Find Boston Bombers" forum had more than 1,700 users, who have highlighted suspicious persons and objects through collected photographs and videos and on -Imgur.com, dozens have uploaded snapshots of the crowd close to the 26-mile marker (Powers, 2013). The users could upload their private videos and then add annotations to show what they considered as being a potentially suspicious person or image. Thousands of potential leads were generated this way. However, one of the main problems is that people would identify people that were really not that suspicious. When the general population begins to investigate a crime on their own, it is often the case that they lack the training necessary to identify activity that could be considered truly suspicious. As a result, the crowds' collection of data was immense and difficult to sift through. It is unclear if crowdsourcing will be an effective investigation technique for any future incidents.

However, coordinating with the public was also listed among the best practices in the after action report. There were four press conferences held as the unified command center (UCC) decided early on that communications with the public was a critical success factor in mitigating the effects of the terrorism incident. The report states (Boston, 2014):

"The leadership of the organizations involved in incident response realized the importance of frequent and coordinated communications with the media and the general public and reached a consensus on the goal of providing information from key city and state leadership as often as possible. Key leaders worked together within the UCC to craft clear, concise, unified messages they could deliver to the public and the media regarding the incident, its impacts, and measures that were being taken in the aftermath."

The public was also sent notifications on social media sites such as Facebook and Twitter. The leaders at the UCC asked citizens to submit any photos or videos that were privately collected before, during, or after the event and it was estimated that over eight thousand people called the city's call center with tips or related questions.

During the prosecution of the surviving perpetrator, the videos played…

Sources Used in Documents:

References

Bio. (2014, April 3). Edward Snowden Biography. Retrieved April 3, 2014, from Bio: http://www.biography.com/people/edward-snowden-21262897

Boston, C. o. (2014). After Action Report for the Response to the 2013 Boston Marathon Bombings. Boston.

Johnson, C. (2012, July 16). Scientist's game helps map the brain. Retrieved from The Boston Globe: http://www.bostonglobe.com/metro/2012/07/15/mit-scientists-crowdsource-effort-map-connections-brain/v1CEwhwl90GDjKzL6oTC4L/story.html

Kelly, H. (2013, April 26). After Boston: The pros and cons of surveillance cameras. Retrieved from CNN: http://www.cnn.com/2013/04/26/tech/innovation/security-cameras-boston-bombings/
O'Neill, A. (2015, April 7). Boston bombing trial: Jurors send out questions during deliberations. Retrieved from CNN: http://www.cnn.com/2015/04/07/us/boston-marathon-bombing-trial/
Powers, M. (2013, April 17). On Internet, thousands sift through Marathon photos for clues. Retrieved from The Boston Globe: http://www.bostonglobe.com/2013/04/17/can-public-solve-marathon-bombings-web-users-crowdsource-offer-plenty-theories/enQ9zVkF6xwgGwLz4bj8vN/story.html


Cite this Document:

"Use Of Technology In The Boston Bombings Investigations" (2015, June 10) Retrieved June 13, 2024, from
https://www.paperdue.com/essay/use-of-technology-in-the-boston-bombings-2151742

"Use Of Technology In The Boston Bombings Investigations" 10 June 2015. Web.13 June. 2024. <
https://www.paperdue.com/essay/use-of-technology-in-the-boston-bombings-2151742>

"Use Of Technology In The Boston Bombings Investigations", 10 June 2015, Accessed.13 June. 2024,
https://www.paperdue.com/essay/use-of-technology-in-the-boston-bombings-2151742

Related Documents
Boston Marathon Bombings
PAGES 6 WORDS 1740

Incident Response to the 2013 Boston Marathon Bombings Although named for its venue, the Boston Marathon is sponsored by a number of different cities in the greater Boston area and is held annually on Patriot’s Day which is the third Monday in April (About the Boston Marathon, 2018). First run as an all-male event in 1897, the Boston Marathon has since become an international event that draws both male and female

Established in 1897 and traditionally held on Patriots’ Day, the third Monday in April, the Boston Marathon is the oldest and one of the most popular annual marathon events in the world today. The annual celebration of the Boston Marathon was disrupted on April 15, 2013, though, when two lone wolf terrorists, Chechen Kyrgyzstani-American brothers, Tamerlan Tsarnaev and Dzhokhar Tsarnaev, detonated two homemade bombs which killed three people and injured

Warrantless Use of GPS The Problem of Warrantless GPS Surveillance: Ethical Considerations Regarding Privacy and the Fourth Amendment The Fourth Amendment protects citizens from unlawful search and seizure by granting them the right "to be secure in their persons, houses, papers, and effects" (U.S. Const. Amend IV). As the case of Burdeau v. McDowell (1921) showed, this Amendment has been interpreted as a protection of individuals from government intrusion. However, with the

Social Media and Law Enforcement Social Media Issues in law Enforcement Social media and law enforcement: Boon or bane? Social media is a fact of everyday modern life. For law enforcement personnel, it has created new opportunities to share resources with the public, including as 'tweeting' information about a possible suspect or releasing safety information to the public about terrorist incidents or natural disasters. At first, in the Internet age, police departments were

Terrorism Annotated Bibliography Gardner, K.L. (2007). Fighting terrorism the FATF way. Global Governance: a Review of Multilateralism and International Organizations. (13:3). 325-45. FATF, or Financial Task Force, is considered a successful organization in terms of investigating how global terrorism is funded. Without financial backing, the complexities required that go into terrorism attacks would not be possible. Kathryn Gardner argues that other aspects of investigation into potential terrorist organization could benefit from

data collection includes survey form, structured interviews using closed ended questions, and gathering information regarding a sample size appropriate to analyze and draw conclusion on the basis of the research results. The statistical techniques are used for data analysis to analyze collected data in quantitative research methods. The qualitative data is gathered through case study method and open ended question of an unstructured interview from notable sample. The qualitative