6. DNA---interrogation that
uses an actual fragment of a
human being to obtain highly
personal information
Familial DNA search does not
substantiate probable cause---yields
unreasonable search and seizure
There is a fine line between true justice
and inalienable rights
7. An ISP owns digital data stored in the maintains
records of consumer information; traffic, content
data, email, text messaging, and mobile phone
usage.
There is a fine line between true justice
and inalienable rights
Cybercrime---digital tracking of
personal information
8. Predictive Policing---identifying probable
crime
The probable area is a suspicious
area; therefore an individual in
this location is, by default, under
suspicion.
There is a fine line between true justice
and inalienable rights
9. What & Where is DNA?
DNA is a grouping of biological
organisms that are passed from
adults to their off-springs.
DNA is found inside a special cell
called the nucleus and is in a very
small package called a chromosome.
10. The Path of DNA?
The German biochemist Frederich Miescher
first observed DNA in the late 1800s.
DNA analysis was introduced into policing in
1986 when officers in central England use it to
solve the sexual assault case of two young
girls.
11. The Path of DNA?
The German biochemist Frederich Miescher
first observed DNA in the late 1800s.
DNA analysis was introduced into policing in
1986 when officers in central England use it to
solve the sexual assault case of two young
girls.
12. How does DNA work in Policing?
• Forensic Scientist scan 13
DNA regions (loci) that
vary from person to
person and use it to
create a DNA profile.
• This process called DNA
fingerprinting is then
used to test the samples
that have been collected
from a crime scene or
victim.
• Other ways that DNA is
used are:
• Exonerate a suspect.
• Identify victims in a
catastrophe.
• Establish Paternity.
• Identify endangered
species.
• Match organ donors.
• Authenticate
consumables such as
caviar and wine.
13.
14. The future of & problems with DNA
FUTURE
• In the future scientists
and criminalists are
wanting to retrieve
DNA samples at from
a person at birth and
store it for future.
• Combine DNA from all
countries into one
main database.
PROBLEMS
• The public’s interest
in the violation of
their privacy.
• People are not
wanting to have
their DNA
information stored
and it may or may
not be used.
16. CYBERCRIME
• DEFINITION
– Any crimes that involve the use of computers or
the manipulation of digital data as well as any
violation of a federal or state cyber crime statute.
• EXAMPLE OF CYBERCRIMES
– Phishing
– Hacking
17. CYBERCRIME
• CRIME-FIGHTING METHODOLOGIES
– FBI cybercrime spyware program: Computer and
Internet Protocol Address Verifier
• In existence since 2004 but went public in 2007
• Used to track the source of e-mail bomb threats against
Timberline High School in Washington State
• Where able to catch and convict the subject based on
evidence obtained with the CIPAV
20. Bibliography
Ferguson, A. G. (2011, November 28). “Predictive Policing” and the Fourth Amendment.
Retrieved from American Criminal Law Review:
http://www.americancriminallawreview.com/Drupal/blogs/blog-
entry/%E2%80%9Cpredictive-policing%E2%80%9D-and-fourth-amendment-11-28-
2011
Risher, M. T. (2012, April 26). “Utilizing DNA Technology to Solve Cold Cases Act of 2011”.
Retrieved from American Civil Liberties Union:
http://www.aclu.org/files/assets/aclu_testimony_on_familal_searching_2012_04_2
4.pdf
Risling, G. (2012, July 1). 'Predictive Policing' Technology Lowers Crime In Los Angeles.
Retrieved from Huffington Post:
http://www.huffingtonpost.com/2012/07/01/predictive-policing-technology-los-
angeles_n_1641276.html
Rodriguez, K. (2011, August 25). Dangerous Cybercrime Treaty Pushes Surveillance and
Secrecy Worldwide . Retrieved from Electronic Frontier Foundation:
https://www.eff.org/deeplinks/2011/08/cybercrime-treaty-pushes-surveillance-
secrecy-worldwide
Scientific American. (2011, November 22). Stop the Genetic Dragnet. Retrieved from
Scientific American: http://www.scientificamerican.com/article.cfm?id=stop-the-
genetic-dragnet
21. CYBERCRIME
• REFERENCES
Begun, D. (2009). FBI Uses Spyware to Capture Cyber Criminals. Retreived 13:30, Oct 26,
20012, from Hot Hardware: www.hothardware.com/news/FBI.
Schmalleger, F. (2012). Criminology today: An integrative introduction. (6th
ed.). Upper
Saddle River, NJ: Pearson/Prentice Hall. Chapter 13, pages 371, 373, and 374.
Editor's Notes
DNA sampling is not an advancement of fingerprinting. Fingerprints can provide valuable information but it is incomparable to DNA analysis. A DNA sample can provide personal information about an individual such as hair color, behavioral traits, predisposition to diseases, and familial affiliations.This detailed “interrogation” is valuable to law enforcement because it is very specific to a particular individual. Matching a DNA sample from the crime scene to a sample in CODIS can be precise (Scientific American, 2011). If a DNA sample does not match any samples in CODIS, a secondary search is conducted. Familial searching provides DNA matches that are similar. Theoretically, close relatives will have similar DNA patterns. Analysis of familial searching will provide several, possibly hundreds, of similar DNA matches. These individuals are now possible suspects to a crime in which they may have no connection (Risher, 2012). An innocent citizen is now under suspicion and interrogation. This can be perceived as a violation of the Fourth Amendment; unreasonable search and seizure. The information obtained from the familial DNA search may not substantiate probable cause. DNA sampling is a valuable tool the law enforcement should be cognizant of the “fine line” between true justice and inalienable rights.
The Electronic Frontier Foundation (EFF), a foundation that protects an individual's Fourth Amendment “digital” rights, argues that the individuals freedom is breached when law enforcement can access sensitive information received from an Internet Service Provider (ISP). The ISP maintains records of consumer information; traffic, content data, email, text messaging, and mobile phone usage. The ISP owns this content; it is at their discretion to provide information to law enforcement agencies. Law enforcement does not need to prove probable cause, mere suspicion of criminal behavior is sufficient to request consumer information from the ISP (Rodriguez, 2011).
Predictive policing uses statistical data identify an area of probable crime. This is advantageous in preventative policing because law enforcement can assess the future outcome the crime data and provide adequate protection to the community (Risling, 2012). The probable area is a suspicious area; therefore an individual in this location is, by default, under suspicion. For example, a man crosses the street hurriedly, and he is carrying a briefcase. In a typical town, one might suppose the man is late for work and is hastily walking to his car. If this town is identified as an area of probable crime this man is acting in a suspicious manner. A police officer would identify him as behaving suspiciously and stop and question him. In both situations the man exhibits the same behavior but the statistics of predictive policing declare him a probable suspect. This individual is assumed guilty without probable cause (Ferguson, 2011). He is an innocent citizen, he has committed no crime yet he lost the personal freedom of walking down the street carrying a briefcase.
The German biochemistFrederichMiescher first observed DNA in the late 1800s, but nearly a century passed on it until the structure of the DNA molecule and realized its central importance to biology.DNA was first used by officers from central England when they approached Dr. Alec Jeffreys of the University of Leicester to ask whether this new technology might be able to assist in the investigation of two potentially linked sexual assault murders of two young girls. Jeffreysanalayzed samples from the deceased girls and developed DNA profiles of the perpetrator in each crime which were found to be identical.
The German biochemistFrederichMiescher first observed DNA in the late 1800s, but nearly a century passed on it until the structure of the DNA molecule and realized its central importance to biology.DNA was first used by officers from central England when they approached Dr. Alec Jeffreys of the University of Leicester to ask whether this new technology might be able to assist in the investigation of two potentially linked sexual assault murders of two young girls. Jeffreysanalayzed samples from the deceased girls and developed DNA profiles of the perpetrator in each crime which were found to be identical.
Any type of organism can be identified by examination of DNA sequences unique to that species. This is what Forensic Scientist do when they are given a DNA sample such as saliva, skin cells or blood found at a crime scene. DNA identification can be quite effective if used intelligently, it has a number other than aiding in solving a crime, it can be used to identify bodies in a mass quantities such as September 11th and finding family members and protecting endangered species.
-Phishing, “an Internet-based scam to steal valuable information such as credit-card numbers, Social Security number, user IDs, and passwords.-Example: fake bank emails asking for log-in info or emails from unknown sources stating you have be awarded money, but you must send them money to receive it.-Hackers are people who use computers for exploration and exploitation.Some hackers such as disgruntled ex-employees don’t hack to steal information but rather to destroy or alter data.
. Because spyware can invade the right of privacy, it has it’s limitation on information it is allowed to retrieve such as actual files, e-mails, and logged keystrokes. This is not to say that spyware does not exist that can identify these things, but as far as the public knows, the government puts a buffer on their capabilities.