The Role of Federal Agencies in Fighting Digital Crime The Role of Federal Agencies in Fighting Digital Crime Michelle Herrick Strayer University Prof. Masud Chowdury March 1, 2013 The Role of Federal Agencies in Fighting Digital Crime In the United States, a number of law enforcement agencies, including the Secret Service, FBI, Department of Homeland Security, among others, have taken on roles to fight computer crimes and terrorism. Explain the existing challenges that result from the independent nature of these agencies, as well as the other factors that are common to each of them. The FBI is an intelligence-driven and threat-focused national security organization with both intelligence and law enforcement responsibilities—the principal investigative arm of the U.S. Department of Justice and a full member of the U.S. Intelligence Community. It has the authority and responsibility to investigate specific crimes assigned to it and to provide other law enforcement agencies with cooperative services, such as fingerprint identification, laboratory examinations, and training. The FBI also gathers, shares, and analyzes intelligence—both to support its own investigations and those of its partners and to better understand and combat the security threats facing the United States.
Criminal Justice is to protect individuals from crimes by controlling them. (The American Heritage Dictionary of the English/Language, Fourth Edition copyright 2000) Criminal Justice is a term used for the series of steps involved in proving any criminal activity like gathering evidences, arresting the accused, conducting trails, making defense, pronouncing judgment after the crime is proved carrying out punishment. (www.Legal-Explanations.com) Criminal activity is a very present element in society. Every society has a criminal justice system to deal with criminal activity and criminals. Law enforcement is the branch of the criminal justice system which is responsible for protecting the public by preventing and solving crimes.
The Fifth Amendment to the United States Constitution is typically cited to protect a defendant against self-incrimination and uphold an individual’s right to due process. Defendant’s are often protected from “taking the stand” in a criminal proceeding against them. The due process clause is often cited in an effort to prevent the surrender of self-incriminating evidence. However, with the advent of widespread encryption and the constant fight against illicit content stored on digital media, courts have been forced to reexamine the implications of the Fifth Amendment. The increase in computer use and digital communications has created a unique problem for the legal system in its effort to interpret the Fifth Amendment.
Therefore the FBI information Sharing and Safeguard Strategy helps to keep the government balanced by safeguarding the civil liberties and privacy of the citizens and shielding our methods and sources. For this very reason, the FBI waits for all criminals and activities to be accurately identified and verified before they share information with other agencies. By taking this approach, it gives the FBI greater visibility in combating terrorism, decreasing crime, and produce a pool of knowledge and societal progress. The FBI has a dual mission to protect national security and enforce federal laws. In fulfilling its mission, the FBI continues to fuse the requirements of the domestic and foreign Intelligence and Law Enforcement Communities to meet the changing national security threats.
Modern Policing Charles W. Lofgren CJA/580 Public Policy Issues John Kotzker August 8, 2011 Modern Policing In the history of modern policing, a number of different philosophies have been developed to explain how police should combat crime and maintain law and order. The challenge for police executives is to identify the best way to address the ever-changing crime problems in the communities they serve, and to apply the appropriate philosophy in the form of effective policies. This paper will look at three of the most influential approaches to policing in recent years; Community-Oriented Policing, Problem Solving Policing and Zero-Tolerance Policies and examine which policy concepts are best suited for protecting and serving in today’s world. Over the last thirty years, several ideas have been enhanced to organize efforts to augment policing. Concepts include community policing, problem oriented policing, and zero tolerance policies.
The process of computer forensics is thus quite complex and involves various activities. The up most care must be taken that the evidence is not altered or tampered with in anyway. The role of any investigator is therefore crucial and any mistake on their part may put the whole investigation in jeopardy. To counter this problem the forensic investigator or investigators must follow the basic guidelines and rules suggested by the ACPO (Association of Police Officers) and the NIST (National Institute of Technology). Next in computer forensics investigation is the importance of preservation of evidence is also an important task.
Exact expectancy, timely targeted action and reduce resources for casual patrolling turns into achievable goals. NIJ defines Predictive Policing as “taking data from disparate sources, analyzing them and then using the results to anticipate, prevent and respond more effectively to future crime” This paved way for development of COMPSTAT (Computer Statistics) which used all crime related data as its input to anticipate a crime. (Willis, J., et al, 2004) 2. Describe how COMPSTAT, as an information system (IS), implements the four (4) basic IS functions: Input - Data gathering development which is the building block of COMPSTAT comprises of information compiled from an array of sources like police incidents, arrest reports, suspect debriefing, telephone calls, and field interview reports. Approaching the inputs to Incident Reporting System will help to retain a
Predictive Policing Strayer University CIS 500 Information Systems for Decision Making Abstract This paper researches COMPuter STATistic (CompStat). CompStat is a crime fighting strategy in which is used to locate where different crimes are occurring and map problem areas. Different agencies are using this method to predict future crimes so that the crimes can be prevented. This is called predictive policing. In this paper information technology will be discussed and how it is optimized in police departments to reduce different crimes.
The information that it outputs is then used by some police departments across the United States to prevent or interrupt crimes. These methods of policing techniques are referred to as, “Predictive Policing.” Predictive policing refers to any policing strategy or tactic that develops and uses information and advanced analysis to inform forward-thinking crime prevention (Morgan, J 2010). Basically it’s the efforts to systematically anticipate when and where crimes will occur, and to deter the criminals or catch them in the criminal act. What makes predictive policing work is the integration of data analysis with that of law enforcement expertise, in such a way that makes understanding why a problem arises and ways to avoid that problem and other problems in the future (Pearsall, B 2010). Police department’s use of computers and advanced information technology in today’s fight against crime has come a very long way from how policing was executed in the early 1960’s.
A CAREER AS AN INFORMATION SECURITY MANAGER BY HECTOR CEDANO Submitted to Ms. Cowling in partial fulfillment of the requirements for Crim 231 Mon. Wed. Fri. 1:00 November 18, 2008 There are many fulfilling careers in Criminal Justice but the one I chose was the career of an Information security manager. First Information security is the protection of information and information systems from unauthorized access. The three main objectives of Information Security are protecting the confidentiality, the integrity and availability of the information. The way that technology is a main part of everyone’s life so it is important to have information security to protect the technology from being missed used.