Introduction
Modern-day criminology is different from that in the past, and the change is continuous with time. There is an improvement in technology used for DNA to resolve all kinds of crime. Together with my teammates, we will discuss the latest technologies that align with methodologies of fighting crime. The use of Cybercrime spyware is one of the methods and is on the rise because of the enormous population connected to devices as well as the personal data that is available on these devices (Jones, 2006). Criminals engage in crimes like copyright infringement, cyber bullying and stalking, stealing personal information, child pornography, and fraud. These crimes are prevalent and committed more often than we purport. Cybercrime exists in distinct levels such as type 1 which involves downloading an accidental Trojan horse. In such a case, hackers can steal banking information, personal data, and passwords. Additionally, type 2 cybercrime is adverse since it includes extortion, manipulation of the stock market, harassment and cyberstalking, planning or implementing criminal activities, blackmail, child predation, and corporate espionage (Jones, 2006).Besides, the use of biometrics will be discussed to see how it aids in solving a crime. "Biometric means to measure life and that is what modern biometric devices do (Jones, 2006)". The devices determine and analyze the characteristics of a person such as physical structures including ridge patterns on their hands, facial, and iris structure. They have a sensor whose function is to scan the targeted traits, software that transforms scanned information into digital form, and a database which keeps biometric data for comparison. The identity of an individual can be recognized or identified by a biometric check (Jones, 2006). The modern technology is far improved than the technology used in the past. Moreover, we will discuss Mandatory DNA collecting. Nowadays, the collection of DNA samples is compulsory in all states for particular felony crimes, especially homicides and sexual assaults. Furthermore, forty-seven states demand that DNA samples should be taken from convicted felons. Other states implement compulsory DNA testing for juvenile offenders as well. This kind of information along with the evolution of forensic technology and law enforcement is helpful in detecting criminal activities as well as individual crimes.
Future Direction of Fighting Crime
The government assesses the technologies from the precise criminal justice agencies using them. It is crucial to understand that in most cases conclusions are based on trial and error. Crime, which is always evolving, can be classified into three including altering why delinquents are forced to be immoral, diminish criminal indiscretions activities, and changing standards of how misbehavior transpires (Jones, 2006).
Programs to be state-of-the-art in the system of criminal justice concerning technologies are biometrics, monitoring criminals using microchips, observation techniques, and DNA breakdown (Jones, 2006). The services will allow the public to get a degree, but law enforcement will have a system that is more advanced. Besides, it will be possible for law enforcement to communicate to the general public by electronic means in case of an emergency. Language is a significant issue globally during the process of law enforcement, for example, South Africa has eleven languages in a single area hence translators will determine the courtroom workgroup decisions.
A new system will be influential by way of five integrations including conversing and moving data between countries. Agencies of criminal justice around the globe will work together and use what they learned to fit into their agencies through multidimensional modernization. By Global Dissemination of justice products, the system has witnessed promising results in the best way of working for a courtroom workgroup (Jones, 2006). The Hollywood error: this kind of false advertising of the working of a courtroom brought changes because of the belief that the general public has regarding the show business sector. These incidences have led to changes in Russia where jury trials have been included. The experimental proof will permit different techniques to be integrated and implemented if the method fails to prove its effectiveness. Some similar outcomes may show it is useful, for example, indigent defense, oversight law enforcement, as well as prosecution (Jones, 2006).
To conclude, the government hopes to boast of open communication both locally and internationally between every agency by 2040. The government's primary concern is attaining an unbiased, respectful, and equal justice for all.
Potential for Specific Methodologies for Crime-Fighting
Biometric technologies and tools can supply considerable evidence of which carries out a financial operation because the biometric features of each are known to be different and stringent to replicate. Biometric technologies operate by calculating and investigating the behavioral and physiological traits of humans (Zetter, 2015). The former is built on data resulting from the daily activities of a person. For example, the way in which someone writes or speaks is their behavioral characteristics patterns. These traits are less susceptible to replicate thus offer greater safety levels. However, the latter are the ones joined with a part of the figure of a person. The best visual sample acknowledged is perhaps the fingerprint. Nonetheless, the hand and facial, retina, and iris outlines are indications of the physiological framework as well. Biometric traits are integral to what you are unlike the conventional methods of identification that relied on something you possessed like a credit card or information you knew such as identification number or password (Zetter, 2015). Besides, there is a need to explore the following crucial concerns and solve the difficulties before any biometric experience, which will aid in reducing the expenses and instances of identity theft.
Today, all the fifty states require DNA gathering for precise felony crimes, most especially murders and sex crimes. Moreover, forty states demand the acquisition of DNA tests from all felons sentenced. Furthermore, many states have implemented mandatory DNA testing for the lawbreakers of a young age (Zetter, 2015). Some have gone further to demand DNA tests for the whole list of the detained people. For instance, in California, all arrested individuals who have committed a felony before must receive DNA testing. Other states will need DNA samples for certain misbehavior crimes. There is a style of a database called Combined DNA Index System or as commonly referred to as CODIS (Zetter, 2015). The technique uses computer bases methodologies to save DNA profiles produced by crime laboratories.
Evolving Law Enforcement and Technologies
To understand how evolving law enforcement and forensic technologies used in detecting criminal practices impact social policy from a national as well as an international viewpoint, you need to know two distinct things including the meaning of social administration and the evolving law enforcement and forensic technologies for detecting criminal activities. According to Payne (2014), social policy refers to a term used in different areas of policy, typically within a political or governmental environment. This condition means that social policy is any policy affecting how people are. The forensic technologies employed in crime detection include document examination, equipment for crime scene investigation, ballistic identification, and comparison microscopes.
Ballistic identification involves the process where forensic scientists are capable of determining the bullets shot from a particular gun and can pick up fingerprints as well. In document examination, forensic scientists can find out who wrote what as well as pick up fingerprints and DNA (Payne, 2014). Comparison microscopes involve comparison of DNA by the scientists. For crime scene investigation equipment, investigators at a crime scene can obtain all essential forensic materials at the place of the crime faster than it used to be. All the mentioned forensic technologies used to identify criminal practices are altering social policy since all of them have led to the imprisonment of more and more criminals. This factor connects to the social policy because prison is one of the policies affecting how people are. If more criminals are sent to jail, social policy is changed from national as well as international perspectives. A comparison between the numbers of prisoners in various countries is done. States with fewer prisoners can claim to be better and safer due to the low criminal activities.
Ethical Violations or Civil Liberty
The United States Constitution, as well as the Bill of rights, safeguards the civil liberties of its people or citizens. With the ever improving technologies used to fight crime and war on terrorism, we should ensure the policies and laws align with the technology and do not infringe our civil rights. The rights we have which the government cannot violate and suppress are the first ten amendments, the thirteenth, and fourteenth amendments. These rights include freedom from self-incrimination, right to legal counsel, right to attend any religion, right to marry, right to privacy, right to vote, right to a jury trial, freedom of speech, freedom from cruel or abnormal punishments, and freedom from irrational searches or capture of property (ACLU, 2015). The bill of Rights guarantees some of these rights whereas others have been inferred from these liberties and made actual by acts of law or court decisions.
We can describe biometric verification as any manner by which we could uniquely identify an individual by evaluating examining one or more distinctive characteristics (Payne, 2014). The process includes fingerprints, facial and iris recognition, and palm prints. Facial recognition is used mainly for general surveillance, for example, in airports, Ybor, and on the streets of Tampa. This type of inspection is intrusive and could record the private and personal habits. The video operators could misuse the video monitoring technology. According to research, video operators focused excessively on people of color and the male operators concentrated more on women (ACLU, 2015). Facebook is among the most extensive databases which contain facial recognition. The biometric software is used when a user tags a person in a picture. However, advocates of privacy present an argument that the technology should only be employed with explicit permission. Facial recognition information can be obtained without the knowledge of the person as in the case of Super Bowl.
The USA PATRIOT Act was signed into law by President George W. Bush on October 26, 2001, after the attacks by terrorists on September 11, 2001 (ACLU, 2015). The terms USA PATRIOT stand for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism. This Act violates the 4th amendment to the constitution. It affirms, "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated and no warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched and the persons or things seized" (Cair Chicago, 2011). The Act permits the use of roving wiretaps for surveillance by law enforcement agencies, to access any significant information about citizens of America as well as other people living in the country, and tracking and giving surveillance on targets not tied to terrorist groups.
Besides, law enforcement agencies use a technology known as StingRay which is an Internationa...
Cite this page
Future Direction of Criminology Essay. (2022, Feb 17). Retrieved from https://proessays.net/essays/future-direction-of-criminology-essay
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Paper Sample: Synthetic Marijuana and the Harm It Is Causing to Society
- Calls to Jam Signals Around Prisons Over Unauthorized Cellphones Essay
- The Issue of Repeal and Replacement of the Affordable Care Act Essay
- Paper Example on Aryan Brotherhood
- Affordable Care Act: Tax Provisions & Benefits for US Citizens - Essay Sample
- Mismeasurement of Crime: Unfair Treatment of African Americans - Essay Sample
- Emerging Technologies and Ethical Concerns - Essay Example