Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
2 pages/≈550 words
Sources:
10 Sources
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.15
Topic:

Crime, Surveillance and Technology (Essay Sample)

Instructions:

The paper addresses the issues of crime, surveillance and technology with a focus on some tools that can be engaged to reduce crimes

source..
Content:

Crime, Surveillance and technology
Name
Institution
Crime, Surveillance and technology
Crimes have increased with increasing technology and this has led to millions of people losing money and property. FBI statistics indicate an increasing trend in insecurity and this has led to organizations and individuals taking up measures to control the vice through technology advancement. Surveillance by the law enforcement authorities has also been increased with government authorities investing highly in technology, surveillance and prosecution of suspected criminals. This paper addresses the issues of cyber-crime, its surveillance and technology.
Some tools used for security surveillance are also discussed.
Peterson (2015) observes that hand-held radars have been used to enhance security surveillance especially in houses where they can detect any malpractices in houses. Security issues in houses where computers and other technological devices are used should be closely monitored. ACLUNC (2015) also present a powerful cellphone (StingRay) surveillance tools that can be used to monitor security threats. They can be able locate cellphones with extra ordinary precisions using dragnet fashion. They have been used to detect any insecurity malpractices.
Cyber-crime and law enforcement
Cyber-criminals have scaled their hunt for unsuspecting victims who get caught in technology scares where they provide their confidential information to the criminals and thus lose money. The criminals also use the information to their benefit through identity thefts. Most governments have been caught unaware by cyber-hackers who steal crucial information and steal from people and the governments (Sullivan, 2013). There are inadequate laws to tackle cyber-crimes due to the nature of the technology applied. Apart from fraudulent dealings, hackers are able to manipulate data to steal from clients in banks and individuals causing economic loses. IC3 (internet crime complaint center) indicates that in 2007, over 206,000 complaints were reported that led to over $239 million. Data indicates that only one case out of seven is reported and thus cyber-crimes could be over 2 million in 2007. FBI survey indicated that lack of laws to prosecute cyber-criminals led to losing of over $67 billion from US organizations only (Wolf, 2009).
FBI (2015) argues that the most prevalent cyber-attacks are the identity theft, bank frauds and computer & network intrusions. The FBI also questions readiness by the authorities to defend the increasing wireless networks where high-tech crimes have increased over time. There is need to gather adequate data and share information among agencies to trace and handle hackers. Solutions to the increasing cyber-attacks are to adequately train personnel to gather and arrest cyber-criminals (NCA, 2015). There is strong need for examination of the existing laws and coming up with provisions that would be able to adequately prosecute criminals, especially those that cut across many nations. The complex nature of the online evidence derails prosecution as guidelines have not been made (University St. Thomas, 2015). The law enforcing department has a difficult job due to the nature of evidence (DHS, 2015).
Limits of technology
Cyber-crimes can only be reduced by having highly trained personnel who can track and identify high-tech criminals at tender stages. Forbes (2013) observes that intensive training of investigators is needed to fight the crime since the criminals have advanced technology. It has also been suggested that having secured computers, digital assets and networks is essential for improving security (Australian Federal Police, 2015). An increasing challenge is the advance of social platforms that come with increased technology, applied by both criminals and the law enforcing agencies.
References
ACLUNC. (2015). STINGRAYS: The most common Surveillance Tool the government won’ttell you about. Retrieved April 26, 2015 fromhttps://www...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • 3D Printing
    Description: The human heart plays the primary role of pumping blood into other parts of the body. Basically, without the heart, no other parts of the body will function...
    1 page/≈275 words| 1 Source | APA | Technology | Essay |
  • Mobile Telephony in Developing African countries
    Description: Over the recent years, sub-Sahara Africa (SSA) has recorded one of the highest regional growth in the world in terms of mobile telephony communication...
    3 pages/≈825 words| 3 Sources | APA | Technology | Essay |
  • Network Design Paper
    Description: Attached are the details. Paper + diagram. It will be turn in in turnitin so it needs to be plagiarism free....
    3 pages/≈825 words| 5 Sources | APA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!