Thursday, May 2, 2019
Emerging Technologies Essay Example | Topics and Well Written Essays - 750 words
Emerging Technologies - Essay ExampleHere, it becomes possible to document, store, maintain, access and share entropy in just a blink of an eye. As names, cases, profiles, offenses, fingerprints and other data are entered into a digital library, they gutter be accessed by law enforcers through networked electronic computer terminals, regardless of location and time. Furthermore, computing technology provides for innate(predicate) applications that could classify information into an organized database - a feat that could take years and huge manpower to accomplish. unique(predicate) technologies that are increasingly being utilized today especially for solving cold cases include the deoxyribonucleic acid technology and the advanced DNA database arrangements. This partnership resulted in the establishment of the Combined DNA Index musical arrangement (CODIS) - a computer network that links the forensic DNA laboratories on all levels from local, state to the federal level. The c apability of the CODIS is astounding. In the event a DNA profile is extracted from a crime scene and entered into the database, the system automatically launches a search among thousands of outlaw profiles for possible match. Law enforcers have been successful using CODIS. For instance, in that respect was the case of rape with murder in Austin, which could have left unsolved because there were no witnesses and the killer-rapist use gloves and condom during the assault. What happened was that, when he tied his victim, he had to grab an end of the cord with his mouth, so his saliva was deposited and finally examined, leading to the identification of the perpetrator and the successful prosecution. (Justice Department, p. 2) There are as well the softwares called data mining applications. many an(prenominal) police investigators are increasingly using this technology to identify the crime patterns that matches them to potential suspects. This is being make by analyzing the behavi oral patterns of criminals that allows for the profiling of suspects, helpful in recognizing the identification of suspects that matches the computers working profile. Siegel also cited the use of computerized imaging systems that gradually replace mug books as well as the use of three-dimensional drawings in investigating and evaluating crime scenes. This latter is important because it alters investigators to visualize positional relationship of evidences. Cybercrime Computing technology, however, could fix to be a double-edged sword. The sophistication it offers to law enforcers is also made available to criminals. For example, when information is stored in a centralized database, the ease of access can benefit those who want to exploit information for criminal purposes. For example, a criminal can use the technology to embezzle funds or modify information that could lead to the wrong apprehension of criminals or tamper with evidence. Information technology can also enable crimi nals to kill people through the tampering of medical records that could result in wrong diagnosis or treatment. Then, there are those cases that involve theft of trade secret, financial reports, sensitive information, and so on. Clearly, one sees how the contestation of computer-aided crimes is growing as well. Another important problem that technology poses for law enforcers is the internationalization of crime. Through the networked computer terminals, criminals can operate globally without any difficulty, with the ease of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment