Friday, January 31, 2020

The Future of Criminology Essay Example for Free

The Future of Criminology Essay Over the past several years criminology has made leaps, bounds, and advances to enhance capturing criminals. Due to the increasing technology at the fingertips of criminals and terrorists law enforcement has been forced to step of their resources and intelligence. The government is constantly faced with new methods people have created to commit crime. Technology is infiltrating every aspect of the criminal justice system, from the investigation to the prosecution of crimes and even to attempts to predict them. What steps is law enforcement and the government taking to ensure our safety and to catch the criminals and terrorists? Biometrics After the attacks on 9/11 the government discovered America was not truly prepared for anything. America lacked the technology and resources to stop terrorist’s attacks. Suddenly, the United States government became acutely aware that it didn’t know exactly who was passing in and out of the country. After 9/11, the U.S. Congress decided we must have some way of securing our borders. What did the government do to try to protect the nation? They looked into security measures such as biometrics. â€Å"Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individuals unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical biometrics include fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Of this class of biometrics, technologies for signature and voice are the most developed† (Biometric Security Technology, n.d.). Today, our identities are verified almost exclusively by things that you carry with you and things you remember.  Driver’s licenses social security cards, birth certificates and passports are common documents people carry with them, and passwords and PINs are common security measures people remember. Physical identification is easy to fake, and passwords are easily cracked by hackers, who then have nearly unfettered access to our credit cards, bank accounts, and personal data. People make fake driver’s licenses, social security cards, birth certificates and even death certificates. Hackers only need limited information about a person to steal their identity. It is mind boggling to think what little data criminals need that can turn a person’s life upside down in a matter of seconds. Something needs to change and biometrics could be that change. Biometrics are a fundamental shift in the way people are identified. Unlike traditional identification which individuals must either remember or carry with them, biometrics is the individual, it is a part of who you are so to speak. Fingerprints, voice analysis, iris patterns, vein matching, gait analysis, and so on. Such traits are unique to an individual and often, though not always, incredibly difficult to fake. â€Å"United States government has poured money into research, development, and acquisition of biometric identification systems. The Department of Homeland Security has spent over $133 million on biometrics since 2003, and the Defense Department is predicted to spend $3.5 billion on the technology between 2007–2015. The Federal Bureau of Investigations has rapidly expanded its fingerprint database and is currently developing a more sophisticated system that will add iris scans, palm scans, and facial recognition to the mix† (De Chant, 2013). Just because biometrics cannot be lost or misplaced does not mean they cannot be misused. Privacy concerns loom large with biometrics. A biometric security measure by itself is not threatening, though they are easily linked to other, potentially sensitive information, and that’s when people grow uneasy. Biometrics are a part of person and not something that can easily be discarded like a Facebook page or a password. This causes a lot of anxiety for some people. The government would have part of everyone on file at their disposal and would it always be used correctly or will American’s become violated by this extra power the government would have? There is already a lot of mistrust in the government it would be difficult to get the American nation as a whole on board with the government having access to our fingerprints, retina’s, faces, and palms. There are people  even in our criminal justice system that abuse their power and give out information that should not be given to certain people, who is to say that same would not happen with should vital information as biometrics. Spyware As rates of cybercrime continue to increase exponentially, law enforcement agencies will have to enhance their cyber-defenses to effectively fight online attacks. New technologies promise to play an important role in this battle for cybersecurity. The war on cybercrime and cyberterrorism has given a major boost to the IT and security industries. In the coming years, the fields could experience even greater growth, possibly generating hundreds of billions of dollars in the US alone. Cyber criminals can be computer geeks looking for bragging rights, to businesses trying to gain an upper hand in the marketplace by hacking competitor websites, from rings of criminals wanting to steal your personal information and sell it on black markets and even spies and terrorists looking to rob our nation of vital information. In this day and age of advanced technology, we have become accustomed to all the benefits that computers give us in terms of convenience. While most of us would never want to g o back to doing things the old fashioned way, it is very important to be aware that anyone can become a victim of cybercrime. â€Å"To effectively detect and deter cyber criminals, it is vital for our law enforcement agencies and our legal community to look beyond our nation’s borders and work with their international colleagues in order to have a global framework of cybercrime statutes. One of the new devices to help detect cyber criminals is a Wi-Fi Investigator. The Wi-Fi Investigator is a tool designed to help law enforcement officials specify locations in order to apprehend suspect devices, including laptops and smartphones. Another featured gadget produces powerful magnetic pulses in order to instantly erase sensitive data in the event of a security breach† (Brown, 2010). Another useful tool for law enforcement is the Global Positioning System or GPS. This is used to help track criminals on probation and parole. This can also be useful in court to show a suspects whereabouts during trial or in tracking down a kidnapped victim. The GPS has become a vital part of an investigation and something that some investigators may even rely on. The same can be said for cellphones since most of them now days are equipped to tell your location as well. Tools and devices are not the only thing that is  used to try to deter cybercrimes, there are laws in place as well. Recently, President Obama calls for a new law for cybersecurity. â€Å"The new cybersecurity effort came a day after Mr. Obama called for legislation to force American companies to be more forthcoming when credit card data and other consumer information are lost in an online breach like the kind that hit Sony Pictures, Target and Home Depot last year. Concern about cybersecurity has increased after the hacking of Sony in December, which the United States government says was the work of the North Korean government. The president said that breach and an attack on the United States Central Command’s Twitter account proved the need for an overhaul† (Hirschfeld Davis, 2015). The cybersecurity measure Mr. Obama envisions would encourage companies to share threat information such as Internet Protocol addresses, date and time stamps, and routing information with the Department of Homeland Security, which would swiftly pass it on to other government agencies and industry groups voluntarily formed to share such material. Companies would get â€Å"targeted liability protection† for doing so, as long as they took steps to protect consumers’ personal information (Hirschfeld Davis, 2015). â€Å"President Obama also called for law enforcement tools to combat cybercrime, including to prosecute the sale of botnets, computer networks created to carry out cybercrime, and to give courts power to shut down those involved in denial of service attacks and other fraudulent activities† (Hirschfeld Davis, 2015). Fighting cybercrime is not just the responsibility of the government it is everyone’s responsibility. Anyone at any time can be attacked by a cybercriminal there is no limits when it comes to cybercrime. The government and law enforcement does their best to protect everyone but it is difficult to protect against someone you cannot see. There is still concerns that maybe technology is trying to take over good old fashion police work such as patrolling and even investigating itself. Is the government looking for the quick technological fix rather than to invest in what it takes to get communities to collaborate on their own safety? The problem is an over-reliance on technology with too little recognition that policing is primarily a people business. Law enforcement and local communities often see technology as a panacea to make communities safer without asking the hard questions. While technology is good to have and it does help to solve some cases it will never replace a police officer. People  find safety and security when they actually see someone protecting them. People need that reassurance. DNA Collection â€Å"The Federal Bureau of Investigations maintains a national DNA database known as the Combined DNA Indexing System or CODIS. The pilot program for what became CODIS started with fourteen state and local laboratories. Today, there are over 180 public law enforcement laboratories that use CODIS. The FBI Laboratorys CODIS program allows federal, state, and local crime laboratories to store, search, and share DNA profiles electronically† (The DNA Act, 2015). The practice of taking DNA samples from convicted criminals is now largely uncontroversial. The courts have routinely upheld laws that authorize DNA collection from both current and former convicts, and the resulting databases of DNA have become powerful tools to analyze forensic evidence collected from crime scenes. The databases help to clear innocent suspects and redirect law enforcement officials away from unproductive investigations. They also help to convict guilty criminals and clear the wrongfully convicted. A trend that is causing significant debate is gathering DNA samples from people who are arrested but not convicted (Berson, 2009). â€Å"About 20 states and the federal government have passed legislation that requires DNA collection upon arrest. This legislation has raised concerns that crime laboratories may be unable to manage an influx of samples from a new source and that preconviction DNA collection may violate Fourth Amendment privacy guarantees. Some people worry that collecting DNA creates the potential for abuse of genetic information stored in databases. Others point out that the federal and state privacy laws and penalties that apply to crime labs are stringent far more stringent than the rules governing private entities that collect blood and saliva for medical or insurance purposes† (Berson, 2009). Although some states limit preconviction DNA collection to violent offenses or sex crimes, other states include all felonies, and some extend the requirement to misdemeanors as well. States legislation requiring preconviction DNA collection varies. Variations include the types of crimes for which samples are collected, applicability of the law to juveniles and procedures for deleting profiles. Some state laws have faced Fourth Amendment challenges in court. â€Å"The Fourth Amendment ensures that [t]he right of the people to be secure in their  persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized† (The DNA Act, 2015). This is where the government will continue to have problems, most American’s live by the Amendments that the United States was founded upon. The Amendments were put in place to give the government limits and when it comes to mandating DNA the government appears to have reached its limits. Conclusion In conclusion, the government and law enforcement have many challenges to face and overcome in the new age of technology. Technology also makes it easier for criminals from around the globe to connect and partner with each other to pull off financial frauds, and the anonymity of the web can make it more challenging to locate and stop online perpetrators. There are legal obstacles as well as ethical obstacles that the government and law enforcement must overcome. At every corner there is a potential for a crime to happen whether it is a person’s credit card, a computer, a bank, a smart phone or even a car. Cybercrime is a growing field and one that is hard to combat with all the technology. The problem the government is facing is what is considered too invasive and what is going too far to protect our nation? References Berson, S. (2009). Debating DNA Collection. Retrieved from http://www.nij.gov/journals/264/pages/debating-DNA.aspx Biometric Security Technology. (n.d.). Retrieved from http://www.peterindia.net/BiometricsView.html Brown, K. (2010). The Future of Cybercrime Detection Prevention. Retrieved from http://www.pctools.com/security-news/future-cybercrime-prevention/ De Chant, T. (2013). The Boring and Exciting World of Biometrics. Retrieved from http://www.pbs.org/wgbh/nova/next/tech/biometrics-and-the-future-of-identification/ Hirschfeld Davis, J. (2015). Obama Calls for New Laws to Bolster Cybersecurity. Retrieved from http://www.nytimes.com/2015/01/14/us/obama-to-announce-new-cyberattack-protections.html?_r=0 The DNA Act. (2015). Retrieved from

Thursday, January 23, 2020

India :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  For more than 200 years before the Indian Mutiny of 1857, there had been a British presence in India. They began as merchant ventures and their holdings on the land were relatively small. Over the years they had expanded, creating forts for protection and larger trading stations. Eventually, to make certain that there would be stability and a successful trade business, Britain deployed many of its armed forces there and also raised forces of natives, thus becoming an active power in 18th Century India. Sometimes by their design but also sometimes by accident, the area of British control began to increase. Their expansion lasted until nearly the entire sub-continent was apart or effected by the empire by the year 1857.   Ã‚  Ã‚  Ã‚  Ã‚  The relationship of the British with their Indian subject gradually began to get worse as time passed. Many held the invention of the steamships responsible for the tension between the two peoples. By allowing the British officers a greatly reduced travel time from their English wives and their workplace, created less time with their Indian mistresses. Another very important aspect was the arrival of missionaries from protestant England. The missionaries cast their teachings upon the very conservative Indians, who preferred their own customs and institutions to other people. Indians especially preferred their own religions and Evangelical Christians had little respect, or understanding of, these ancient practices and beliefs.   Ã‚  Ã‚  Ã‚  Ã‚  The spark that started it happened in May of 1857 with a mutiny of Indian troops at Meerut, or a matter of religious principle. The new rifles, which had been issued by the British army, contained a cartridge that required the soldier to bite of the end in order to load the weapon. To make this process easier, the cartridges were greased with the animal fat of a cow or pig. The rumor quickly spread throughout the Indian regiment that this process was being used, and according to ancient Hindu and Muslim religion, this practice is unclean and according to Lord Roberts, â€Å"the affair betrayed and incredible disregard of the natives’ religious prejudices.†(Porter, 40) The mutineers took Delhi first with the help of more native regiments, and from there, the rebellion spread quickly but unevenly. Throughout the many battles at Delhi, Cawnpore, and Lucknow, the natives were never able to completely seize all of India. Britain did manage to survive the fourteen month long battle, but with severe losses. India :: essays research papers   Ã‚  Ã‚  Ã‚  Ã‚  For more than 200 years before the Indian Mutiny of 1857, there had been a British presence in India. They began as merchant ventures and their holdings on the land were relatively small. Over the years they had expanded, creating forts for protection and larger trading stations. Eventually, to make certain that there would be stability and a successful trade business, Britain deployed many of its armed forces there and also raised forces of natives, thus becoming an active power in 18th Century India. Sometimes by their design but also sometimes by accident, the area of British control began to increase. Their expansion lasted until nearly the entire sub-continent was apart or effected by the empire by the year 1857.   Ã‚  Ã‚  Ã‚  Ã‚  The relationship of the British with their Indian subject gradually began to get worse as time passed. Many held the invention of the steamships responsible for the tension between the two peoples. By allowing the British officers a greatly reduced travel time from their English wives and their workplace, created less time with their Indian mistresses. Another very important aspect was the arrival of missionaries from protestant England. The missionaries cast their teachings upon the very conservative Indians, who preferred their own customs and institutions to other people. Indians especially preferred their own religions and Evangelical Christians had little respect, or understanding of, these ancient practices and beliefs.   Ã‚  Ã‚  Ã‚  Ã‚  The spark that started it happened in May of 1857 with a mutiny of Indian troops at Meerut, or a matter of religious principle. The new rifles, which had been issued by the British army, contained a cartridge that required the soldier to bite of the end in order to load the weapon. To make this process easier, the cartridges were greased with the animal fat of a cow or pig. The rumor quickly spread throughout the Indian regiment that this process was being used, and according to ancient Hindu and Muslim religion, this practice is unclean and according to Lord Roberts, â€Å"the affair betrayed and incredible disregard of the natives’ religious prejudices.†(Porter, 40) The mutineers took Delhi first with the help of more native regiments, and from there, the rebellion spread quickly but unevenly. Throughout the many battles at Delhi, Cawnpore, and Lucknow, the natives were never able to completely seize all of India. Britain did manage to survive the fourteen month long battle, but with severe losses.

Wednesday, January 15, 2020

Chinese vs American Culture

Sarah Gonzalez Chinese Culture VS American Culture It doesn’t matter what kind of ethnicity you are, or how you were brought up. Everyone is deeply rooted in their own culture. â€Å"Culture† has a different meaning to everyone. Comparing American culture to Chinese culture we will find many different meanings to the word â€Å"culture†. For example, we Americans are always looking for something bigger and better for our future, and the Chinese are content with a small reserved lifestyle with no intentions of changing it for something bigger.A culture is a way of life of a group of people-the behaviors, beliefs, values, and symbols that they accept, generally without thinking about them, and are passed along by communication and imitation from one generation to the next. Growing up in America we are taught to never settle for less, that we can do anything that we set our minds too, and when we grow up we can be anyone we want to be. After all we are the â€Å"ho me of the brave and the land of the free†, right? The Chinese are more set on if you are a girl you are too be the homemaker, and the men are too make the money doing physical labor.The story â€Å"I Answer to Elaine† concluded it all perfectly to me. â€Å"She continued to sign Father’s name. I threatened legal action: â€Å"That’s forgery! It’s not your name†. [Example from I Answer to Elaine] This shows that the Chinese believe that the men are dominate, head of the household, the only say so. In the American home mom and dad have a shared liability for the children and both set of parents go out into the work force. â€Å"A deep frustration set in. I was sickened by her statement’s implication for my future.I hated helplessness, believing it unique to her alone† [Example from I Answer to Elaine]. I feel like Elaine is frustrated with her mom because she knows because of her gender her mom doesn’t expect mush out of h er other than to be a care giver. This has to be confusing to Elaine when she sees all over her American friends dreaming about their big futures and what they will do. Elaine should be able to grow bigger than just a housewife. Believe it or not, but American and Chinese culture do have something’s in common. They see eye-to-eye on some aspects.Like providing for their children â€Å"Parents work together for the well-being of their children† [Example from Article]. It is true that parents do the best they can to work towards a better financial life for their kids. That’s why many Chinese parents come over to the states, so that they can provide a better life, and a better education. They would also go to great lengths for their children no matter what the cause â€Å"Parents will risk their life for their children† [Example from Article]. Any parent would risk their life for their children no matter what ethnicity, or cultural aspect!There is no bond li ke a parent and their child. Chinese and American culture has a lot more differences than similarities. To the Chinese reputation of the individual is very important. If an action will humiliate someone or ruin a reputation, it is avoided. When shame occurs, the person sacrifices their job or whatever it is that will heal the shame. In America, reputations come and go overnight and in the end usually does not matter. â€Å"Go to an American home in exurbia, and almost the first thing you do is drift towards the picture window† [Example from American space, Chinese Place].It is true that we American’s always want something more than what we have in front of us. We are always looking forward to the big picture of our future. â€Å"Consider the traditional Chinese home. Blank walls enclose it† [Example from American Space, Chinese Place]. The Chinese are very content with what they have, and have no intensions of a â€Å"bigger picture†. They keep what they have close to them. All in all, I think we can see the difference and the similarities between the two cultures. The Chinese are set on their morals.One is to respect all others, the men is the runner of the household, and keep your opinion to yourself. Americans don’t always follow the rules. When we don’t agree with something we are going to speak out about it, and give them out opinion. In the households sometimes there is a man of the house, and sometimes it’s a single mother running the house. I think the Chinese have a better wrap around the meaning of â€Å"culture† they stick to what they believe, and it stays that way for years. Rather than American’s missing the meaning of â€Å"culture† and worrying about what the future has to hold for them.