Technology has improved in the criminal justice system over the years. Since the 1960s, criminal justice systems have used technology to advance and gain better knowledge of the different issues and encounters officers may face. Technology is used to improve daily operations, reduce operational costs and increase strategic planning and tactical approaches. Technology has opened up new encounters and opportunities for the criminal justice system. There are many new practices of criminal activity, such as cyber crimes. There are different types of cyber crimes that many people become victims of every day. Cybercrime is any crime involving a computer and a network. The computer may have been used to commit a crime, or it may be the target (“Computer Crime: Chapter 2: What Are Crimes?”, n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are cyber crimes. While these crimes are made difficult by privacy concerns, new technology has made criminal investigations and prosecutions well organized and effective. While opinions differ on the pros and cons of specific technological changes in the criminal justice system, there is agreement that the system has changed significantly (“Effects of Technology in Criminal Justice | eHow,” n.d.). As we can see on television, it may seem that officers are always out in the field chasing criminals, but there is much more to their job than that. The officer's work also includes a lot of documentation. They must complete reports on arrests and actions leading to the arrest. In the past, agents used pen and paper or even a typewriter to compile reports. Now, with all the new technology, I'm halfway through the paper ......final-justice/impact-of-digital-technology-on-law-enforcementLibrary | How the FBI Investigates Cybercrime. (n.d.). Retrieved from http://www.sei.cmu.edu/library/abstracts/news-at-sei/security1q01.cfmSchultz, P. D. (2008, June). Police Chief's Magazine - The Future is Here: Technology in Police Departments. Retrieved from http://www.policechiefmagazine.org/magazine/index.cfm?article_id=1527&fuseaction=display&issue_id=62008Social Engineering: What it is and how to protect yourself. (n.d.). Retrieved from http://www.microsoft.com/security/resources/socialengineering-whatis.aspxUlster Sheriff's Office > Criminal Division > MDC System. (n.d.). Retrieved from http://ulstercountyny.gov/sheriff/criminal/MDC.htmlWhat is IP Spoofing? - A definition of the word from the Webopedia computer dictionary. (n.d.). Retrieved from http://www.webopedia.com/TERM/I/IP_spoofing.html
tags