This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Digital technologies and criminal investigations

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Digital technologies and criminal investigations

Computers, software, and other forms of digital technologies have changed over time, influencing how crimes are investigated. Examples of digital technologies include biometric, crime mapping, and body-worn cameras, which provide significant support and accountability to the relevant officers involved in crime investigations. The use of forensic technologies like laser ablation inductively coupled mass spectrometry, SD facial reconstruction, magnetic fingerprinting technology, high-speed ballistics photography, and automated identification systems have provided crucial help to scientists in the evaluation of evidence that is vital to convicting criminals in our society. Computers and other digital technologies make investigations faster and thus, easy and transparent conviction of criminals.

However, the development in technologies have helped criminals engage in various criminal activities in our society. FBI’s crime complaint center has stated that internet based crime complaints have increased exponentially due to the use of computer and software technologies. Identity related theft has also risen in the recent years and this is a negative implication of technology. Therefore, technology has provided criminals with new mediums for conducting identity related crimes such as credit fraud, theft of vehicles and also sextortion which involves threatening an individual that if they do not provide certain information or document, they will expose their sexual photos. Cyber criminals also involve themselves in synthetic identity theft which entails the creation of a completely new identity. Credit card skimming and dark web has promoted illegal marketplace transactions for sex, drug or even illegal transaction of weapons and conducting murder.

An example of use of computers to conduct a criminal activity is the case of Justin Larson who is a 30-year-old computer scientist who by use of encrypted communication to distribute drugs. Larson learned deeply on the classification of drugs and means of distributing them illegally via digital ways. He distributed the illegal drugs via digital means and linked to a Chinese fentanyl dealer through the dark web. Larson communicated to the Chinese dealer through a sophisticated messaging system and thus able to transact the illegal activities effectively. He would type his encrypted message in an encrypted platform that would then generate as self-destructive link and send the link to the supplier via an encrypted web-based e-mail system. Thereafter, the message would be destroyed making it difficult for the transactions to be tracked.

The forensic investigators required to perform a range of detailed forensic digital investigations on the transactions that were taking place via Larson’s mobile devices and also utilize web-based e-mail providers to identify individuals that were connected to Larson. The forensic investigators found out that Larson’s girlfriend was signing on behalf of him and also accepting the packages that had been transported from a Chinese distributor. The packages were delivered through TNT, which is a private commercial career. Larson was convicted on January 25, 2017 due to conspiracy to distribute illegal drugs that is narcotics. He was also convicted of five counts of possessions or attempted possession of a controlled substance. He had also committed the crime of a controlled substance analogue with the aim of distributing it. Larson was also convicted of one account of distributing a controlled substance and thus sentenced to life imprisonment. Therefore, technology plays a crucial role in law enforcement measures as computer forensics provides the investigative authorities with an opportunity to search and analyze data in a quick and effective manner. It also allows backing of data which is useful in conviction of a criminal as in the case of Larson.

As illustrated in the above case, advancement of technology has led to the creation of an opportunity for the smallest criminal to interface with global criminal institutions. Law enforcements have faced challenges due to the use of more sophisticated technologies. Police officers who use laptops while driving could involve themselves in accidents and this is a significant disadvantage of increased technology. The use of body cameras while recording the suspect may create discomfort to the victim and these individuals could get hostile in the process which affects quality collection of information for conviction of the criminal. Public exposure of victims is embarrassing and experience of the same is traumatic and this is a disadvantage of using technology in law enforcement. Law enforcement officers are required to be keen while collecting evidence from the suspects as this prevent cases of hostility from the suspects.

In conclusion, advancement in technology plays a crucial role in law enforcement efforts since it ensures that adequate information is available for the conviction of a suspected criminal. Through technology, it is possible to back up evidence collected from the suspected person and in case the origin information is lost, one is able to have access to similar information hence enabling proceeding of the case. Through advancements in technology, it is possible to track illegal transactions of criminals and thus prevent sale of harmful substances or drugs to people. Therefore, in general advancement in technology has boosted law enforcement organizations and helped in rightful conviction of individuals due to the availability of adequate evidence in relation to the particular case.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask