Saturday, May 9, 2020
Technology And The Criminal Justice System - 1009 Words
Within the last ten years, there have been significant advancements in technology which has in turn changed and increased the type of crimes in todayââ¬â¢s society. With the new technology, the criminals are ready to exploit it. So therefore, the future direction of crime fighting and its role in social policy implication are geared toward the advancements of technology. For criminal justice system to intervene, deter, or prevent crimes, they must be equipped with the latest technologies. Advancements to technology within the criminal justice system have a significant effect on the courts, making policies, and the correction facilities. These technologies have provided the police officers and other law enforcement officers withâ⬠¦show more contentâ⬠¦Based on Dauphin County First Assistant District Attorney Fran Chardo, ââ¬Å"We become a very electronic-oriented society.â⬠(Marc Goodman). With this increase usage of electronic, we see a new set of criminals and crimes. With the cellular telephone, criminals use it, not only to communicate with one another, but also to target people and as a triggering device. For example, if the criminals are searching for someone they can text each other with the description of a person and then upon verification proceed with an order, possible death. With this same cellular telephone technology, law enforcement can use someoneââ¬â¢s cellular telephone to track their movements or identify their location to help with investigations. The new set of crimes is cybercrimes. A cybercrime is any crime that involves the use of computer or the manipulation of digital data. Zackary J. Miller, section Chief of the FBIââ¬â¢s Cyber Criminal Division stated, ââ¬Å"I think there is a growing cybercrime problem that we are continuing to chase a bit behind the curveâ⬠¦ bank robbery and fraud are all facilitated by the internet.â⬠(Bernice Young, 2011). There are five types of computer crimes: (1). i nternal computer crimes, such as viruses; (2). internet and telecommunication, which is hacking; (3). criminal enterprises, databases supporting drug distribution; (4). computer manipulation, embezzlement; and (5). hardware, software, and information theft. (Schmalleger,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.