SlideShare a Scribd company logo
Boston Marathon Bombing "Crowdsourcing:" How citizens
are using the Internet to help solve crimes
Different camera angles from the Boston Marathon explosion.
CBS News
(CBS News) -- As law enforcement agencies investigate Monday's bombings at the Boston Marathon
-- and ask the public for photos, videos and information that might help find the perpetrators -- some
corners of the Internet have launched their own "investigations."
CBS News: Crowdsourcing or witch hunt? Reddit and 4chan users attempt to solve Boston bombing
case
For years crime tip lines and even television shows have utilized the help of large groups of people, a
technique known these days as "crowdsourcing," to aid in police investigations. Shortly after the
first episode of "America's Most Wanted" aired in 1988, tips poured in about convicted killer David
James Roberts, an FBI Ten Most Wanted fugitive, leading to his capture after 20 years on the run.
But crowdsourcing in the Internet age has taken the public's involvement in solving crimes to a new
level.
In April of 2012, police in Waynesboro, Va., were investigating a fatal hit-and-run when the
investigation ran out of steam.
"We were at a road block," Capt. Kelly Walker told Crimesider. "There wasn't any way to move
forward until we identified the car."
Looking for help from the public, the department issued a press release with a photograph and
description of a piece of metal left at the scene of the crime. Soon, the popular automotive blog
Jalopnik picked up the story, and commenters were able to identify the evidence as part of an early
2000s Ford F-150 pick-up.
Walker says the site contacted the department and the identification helped lead to suspects who
were later convicted.
"It was really a big help," says Walker. So big, that last December, the department presented the site
with a community service award.
Successes like this have led more and more law enforcement agencies to use social media as an
investigation tool.
An annual survey conducted by the International Association of Chiefs of Police found that in 2011,
40 percent of agencies were using social media to solicit tips from the public. Just one year later,
that percentage jumped to 56.8 percent.
"Response is quicker; and the scope is much larger - than the traditional tip line," says Nancy Kolb, a
Senior Program Manager who works with the organization's center for social media. Kolb and the
center work with law enforcement to enhance their capacity to use social media to prevent and solve
crimes.
Kolb says the most common examples of law enforcement reaching out involve posting photos or
videos asking for the public's assistance in identifying a suspect or a witness who may be able to
provide more information.
"It's about reaching the right audience, getting the right people," says social media expert Kenneth
Wisnefski, founder and CEO of the Internet marketing website "WebiMax."
Wisnefski says people appear to respond well to requests for specific information, and the Internet's
ubiquity factors into the public embracing it as a tool for reporting crime.
"Social media is at the forefront of events," Wisnefski says, noting how much information regarding
the recent bombings was picked up and communicated first through sites like Twitter and Facebook.
"We haven't really had opportunity like this before for crowdsourcing on this scale."
Forensic video analyst Grant Fredericks says that when investigators sought information about
rioters in Vancouver in 2011, they received 5,000 hours of video from the public, which helped them
find suspects.
"We're in an electronic age, a surveillance society," says Fredericks, who teaches video analysis at
the University of Indianapolis and the FBI National Academy in Quantico, Va. "Everyone walking
around with a cell phone has an opportunity to collect evidence."
Fredericks says the amount of video evidence available to law enforcement through crowdsourcing
is an incredibly valuable tool, but that investigators often run into trouble because they've "asked
the public to decide what's relevant."
He also warned, "We don't want vigilantes deciding who's guilty or not."
The danger of this point was illustrated this week as users on the social news website Reddit created
forums dedicated to combing through pictures of the crowds near the marathon's finish line and
discussing evidence in search of answers. On the forum thread "findbostonbombers," users
speculate about various theories and "suspects."
"Green Hat Man in center of photo. He's wearing what seems to be a heavily-stuffed backpack.
Anyone spot him in any other photos?" asked one Reddit user.
"That guy is walking away from the location of both bombs, they're down the street behind him,
about 11 mins before the explosions." Another commenter responds. "So that would mean the
backpack he's carrying is highly unlikely to be that in which either of the bombs was secreted."
Much of the theorizing was accompanied by images altered or written on, pointing out "suspicious"
details or possible suspects.
"It brings a lot of benefits, but also a lot of challenges." Kolb says about the influx of information
online. "Rumors spread quickly, and inaccurate information."
Kolb says there have been situations where people are wrongly identified by the public and
subjected to scrutiny and harassment despite never having been considered suspects by law
enforcement.
One name that has come up frequently in the past few days is that of Richard Jewell, a security
guard accused in the bombing at the Atlanta Summer Olympic Games in 1996. Jewell was eventually
cleared of wrongdoing, but not before suffering years of being hounded in the court of public opinion
despite never having been charged in the attack.
"Law enforcement officials are trained investigators" Kolb says, reminding would-be sleuths that the
best reliable information often comes from official statements.
Complete coverage of Boston Marathon bombings on Crimesider
18 Photos
Boston Marathon bombing victims
On April 15, 2013, two explosives went off near the finish line of the Boston Marathon in Boston,
Mass. killing three and wounding more than 170 ...
© 2013 CBS Interactive Inc. All Rights Reserved.

More Related Content

What's hot

Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
evgeny.morozov
 
Censorship and Regulation - OCR
Censorship and Regulation - OCRCensorship and Regulation - OCR
Censorship and Regulation - OCR
Courtney O'Donnell
 
How America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mobHow America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mob
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
Axel Bruns
 
Social media censorship: beneficial or harmful?
Social media censorship: beneficial or harmful?Social media censorship: beneficial or harmful?
Social media censorship: beneficial or harmful?
SholomStevenMorgan
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
Remedy Communications
 
Pornography essay
Pornography essayPornography essay
Pornography essay
Pablo Echeverria
 
Understanding social media & free speech
Understanding social media & free speechUnderstanding social media & free speech
Understanding social media & free speech
Angela Bakken Henderson
 
Research Paper
Research PaperResearch Paper
Research Paper
mdhughley
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
Gabriel Guevara
 
Prism
PrismPrism
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Broker
metanautix
 
How the Net aids dictatorships
How the Net aids dictatorshipsHow the Net aids dictatorships
How the Net aids dictatorships
evgeny.morozov
 
Battle lines
Battle linesBattle lines
Battle lines
swarooo
 
Polinter07
Polinter07Polinter07
Polinter07
Jeffrey Hart
 
THE_THEORY_OF_BROKEN_WINDOWS SAMPLE WRITING
THE_THEORY_OF_BROKEN_WINDOWS SAMPLE WRITINGTHE_THEORY_OF_BROKEN_WINDOWS SAMPLE WRITING
THE_THEORY_OF_BROKEN_WINDOWS SAMPLE WRITING
Victor Herrera
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
ryangregory55
 
Citizen Journalism
Citizen JournalismCitizen Journalism
Citizen Journalism
Seth Lewis
 
Power&5th windsor-2016
Power&5th windsor-2016Power&5th windsor-2016
Handout: Resources for Managing Misinformation (2021)
Handout: Resources for Managing Misinformation (2021)Handout: Resources for Managing Misinformation (2021)
Handout: Resources for Managing Misinformation (2021)
Damian Radcliffe
 

What's hot (20)

Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
 
Censorship and Regulation - OCR
Censorship and Regulation - OCRCensorship and Regulation - OCR
Censorship and Regulation - OCR
 
How America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mobHow America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mob
 
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...
 
Social media censorship: beneficial or harmful?
Social media censorship: beneficial or harmful?Social media censorship: beneficial or harmful?
Social media censorship: beneficial or harmful?
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
Pornography essay
Pornography essayPornography essay
Pornography essay
 
Understanding social media & free speech
Understanding social media & free speechUnderstanding social media & free speech
Understanding social media & free speech
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Prism
PrismPrism
Prism
 
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Broker
 
How the Net aids dictatorships
How the Net aids dictatorshipsHow the Net aids dictatorships
How the Net aids dictatorships
 
Battle lines
Battle linesBattle lines
Battle lines
 
Polinter07
Polinter07Polinter07
Polinter07
 
THE_THEORY_OF_BROKEN_WINDOWS SAMPLE WRITING
THE_THEORY_OF_BROKEN_WINDOWS SAMPLE WRITINGTHE_THEORY_OF_BROKEN_WINDOWS SAMPLE WRITING
THE_THEORY_OF_BROKEN_WINDOWS SAMPLE WRITING
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Citizen Journalism
Citizen JournalismCitizen Journalism
Citizen Journalism
 
Power&5th windsor-2016
Power&5th windsor-2016Power&5th windsor-2016
Power&5th windsor-2016
 
Handout: Resources for Managing Misinformation (2021)
Handout: Resources for Managing Misinformation (2021)Handout: Resources for Managing Misinformation (2021)
Handout: Resources for Managing Misinformation (2021)
 

Similar to Boston Marathon Bombing "Crowdsourcing:" How citizens are using the Internet to help solve crimes

SocailMaedia
SocailMaediaSocailMaedia
SocailMaedia
Kendell Whisenton
 
Boston marathon bombings presentation
Boston marathon bombings presentationBoston marathon bombings presentation
Boston marathon bombings presentation
Cay Coyle
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Nicholas Tancredi
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Nicholas Tancredi
 
Flipbook
FlipbookFlipbook
Flipbook
Chloe Xu
 
Broken Window Theory
Broken Window TheoryBroken Window Theory
Porn up,rape down
Porn up,rape downPorn up,rape down
Porn up,rape down
srchalla
 
New digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaNew digital tools for investigative journalism aaja
New digital tools for investigative journalism aaja
Gannett
 
Chapter 1 Juvenile Justice Myths and RealitiesMyths and Reali
Chapter 1 Juvenile Justice Myths and RealitiesMyths and RealiChapter 1 Juvenile Justice Myths and RealitiesMyths and Reali
Chapter 1 Juvenile Justice Myths and RealitiesMyths and Reali
MaximaSheffield592
 
Human Trafficking and Social Networking
Human Trafficking and Social NetworkingHuman Trafficking and Social Networking
Human Trafficking and Social Networking
Matthew Kurnava
 
Big data, a city of things and civic innovation
Big data, a city of things and civic innovationBig data, a city of things and civic innovation
Big data, a city of things and civic innovation
Alexander Howard
 
Justine- pedophile laws
Justine- pedophile lawsJustine- pedophile laws
Justine- pedophile laws
Justine
 
What are the implications of citizens broadcasting the events of
What are the implications of citizens broadcasting the events ofWhat are the implications of citizens broadcasting the events of
What are the implications of citizens broadcasting the events of
lorileemcclatchie
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
archiejones4
 
TheDrum, Wanted Posters Go Mobile 9.21.16
TheDrum, Wanted Posters Go Mobile 9.21.16TheDrum, Wanted Posters Go Mobile 9.21.16
TheDrum, Wanted Posters Go Mobile 9.21.16
David M. White
 
Police Technologies
Police TechnologiesPolice Technologies
Police Technologies
Dennis Huang
 
We Should Try to Prevent Another Alex Jones
We Should Try to Prevent Another Alex JonesWe Should Try to Prevent Another Alex Jones
We Should Try to Prevent Another Alex Jones
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Page 284 the journal of social media in s
Page 284                    the journal of social media in sPage 284                    the journal of social media in s
Page 284 the journal of social media in s
amit657720
 
Mac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lectureMac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lecture
Rob Jewitt
 

Similar to Boston Marathon Bombing "Crowdsourcing:" How citizens are using the Internet to help solve crimes (19)

SocailMaedia
SocailMaediaSocailMaedia
SocailMaedia
 
Boston marathon bombings presentation
Boston marathon bombings presentationBoston marathon bombings presentation
Boston marathon bombings presentation
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 
Flipbook
FlipbookFlipbook
Flipbook
 
Broken Window Theory
Broken Window TheoryBroken Window Theory
Broken Window Theory
 
Porn up,rape down
Porn up,rape downPorn up,rape down
Porn up,rape down
 
New digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaNew digital tools for investigative journalism aaja
New digital tools for investigative journalism aaja
 
Chapter 1 Juvenile Justice Myths and RealitiesMyths and Reali
Chapter 1 Juvenile Justice Myths and RealitiesMyths and RealiChapter 1 Juvenile Justice Myths and RealitiesMyths and Reali
Chapter 1 Juvenile Justice Myths and RealitiesMyths and Reali
 
Human Trafficking and Social Networking
Human Trafficking and Social NetworkingHuman Trafficking and Social Networking
Human Trafficking and Social Networking
 
Big data, a city of things and civic innovation
Big data, a city of things and civic innovationBig data, a city of things and civic innovation
Big data, a city of things and civic innovation
 
Justine- pedophile laws
Justine- pedophile lawsJustine- pedophile laws
Justine- pedophile laws
 
What are the implications of citizens broadcasting the events of
What are the implications of citizens broadcasting the events ofWhat are the implications of citizens broadcasting the events of
What are the implications of citizens broadcasting the events of
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
 
TheDrum, Wanted Posters Go Mobile 9.21.16
TheDrum, Wanted Posters Go Mobile 9.21.16TheDrum, Wanted Posters Go Mobile 9.21.16
TheDrum, Wanted Posters Go Mobile 9.21.16
 
Police Technologies
Police TechnologiesPolice Technologies
Police Technologies
 
We Should Try to Prevent Another Alex Jones
We Should Try to Prevent Another Alex JonesWe Should Try to Prevent Another Alex Jones
We Should Try to Prevent Another Alex Jones
 
Page 284 the journal of social media in s
Page 284                    the journal of social media in sPage 284                    the journal of social media in s
Page 284 the journal of social media in s
 
Mac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lectureMac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lecture
 

Boston Marathon Bombing "Crowdsourcing:" How citizens are using the Internet to help solve crimes

  • 1. Boston Marathon Bombing "Crowdsourcing:" How citizens are using the Internet to help solve crimes Different camera angles from the Boston Marathon explosion. CBS News (CBS News) -- As law enforcement agencies investigate Monday's bombings at the Boston Marathon -- and ask the public for photos, videos and information that might help find the perpetrators -- some corners of the Internet have launched their own "investigations." CBS News: Crowdsourcing or witch hunt? Reddit and 4chan users attempt to solve Boston bombing case For years crime tip lines and even television shows have utilized the help of large groups of people, a technique known these days as "crowdsourcing," to aid in police investigations. Shortly after the first episode of "America's Most Wanted" aired in 1988, tips poured in about convicted killer David James Roberts, an FBI Ten Most Wanted fugitive, leading to his capture after 20 years on the run. But crowdsourcing in the Internet age has taken the public's involvement in solving crimes to a new level. In April of 2012, police in Waynesboro, Va., were investigating a fatal hit-and-run when the investigation ran out of steam. "We were at a road block," Capt. Kelly Walker told Crimesider. "There wasn't any way to move forward until we identified the car." Looking for help from the public, the department issued a press release with a photograph and description of a piece of metal left at the scene of the crime. Soon, the popular automotive blog Jalopnik picked up the story, and commenters were able to identify the evidence as part of an early 2000s Ford F-150 pick-up. Walker says the site contacted the department and the identification helped lead to suspects who were later convicted. "It was really a big help," says Walker. So big, that last December, the department presented the site with a community service award.
  • 2. Successes like this have led more and more law enforcement agencies to use social media as an investigation tool. An annual survey conducted by the International Association of Chiefs of Police found that in 2011, 40 percent of agencies were using social media to solicit tips from the public. Just one year later, that percentage jumped to 56.8 percent. "Response is quicker; and the scope is much larger - than the traditional tip line," says Nancy Kolb, a Senior Program Manager who works with the organization's center for social media. Kolb and the center work with law enforcement to enhance their capacity to use social media to prevent and solve crimes. Kolb says the most common examples of law enforcement reaching out involve posting photos or videos asking for the public's assistance in identifying a suspect or a witness who may be able to provide more information. "It's about reaching the right audience, getting the right people," says social media expert Kenneth Wisnefski, founder and CEO of the Internet marketing website "WebiMax." Wisnefski says people appear to respond well to requests for specific information, and the Internet's ubiquity factors into the public embracing it as a tool for reporting crime. "Social media is at the forefront of events," Wisnefski says, noting how much information regarding the recent bombings was picked up and communicated first through sites like Twitter and Facebook. "We haven't really had opportunity like this before for crowdsourcing on this scale." Forensic video analyst Grant Fredericks says that when investigators sought information about rioters in Vancouver in 2011, they received 5,000 hours of video from the public, which helped them find suspects. "We're in an electronic age, a surveillance society," says Fredericks, who teaches video analysis at the University of Indianapolis and the FBI National Academy in Quantico, Va. "Everyone walking around with a cell phone has an opportunity to collect evidence." Fredericks says the amount of video evidence available to law enforcement through crowdsourcing is an incredibly valuable tool, but that investigators often run into trouble because they've "asked the public to decide what's relevant." He also warned, "We don't want vigilantes deciding who's guilty or not." The danger of this point was illustrated this week as users on the social news website Reddit created forums dedicated to combing through pictures of the crowds near the marathon's finish line and discussing evidence in search of answers. On the forum thread "findbostonbombers," users speculate about various theories and "suspects." "Green Hat Man in center of photo. He's wearing what seems to be a heavily-stuffed backpack. Anyone spot him in any other photos?" asked one Reddit user. "That guy is walking away from the location of both bombs, they're down the street behind him, about 11 mins before the explosions." Another commenter responds. "So that would mean the backpack he's carrying is highly unlikely to be that in which either of the bombs was secreted."
  • 3. Much of the theorizing was accompanied by images altered or written on, pointing out "suspicious" details or possible suspects. "It brings a lot of benefits, but also a lot of challenges." Kolb says about the influx of information online. "Rumors spread quickly, and inaccurate information." Kolb says there have been situations where people are wrongly identified by the public and subjected to scrutiny and harassment despite never having been considered suspects by law enforcement. One name that has come up frequently in the past few days is that of Richard Jewell, a security guard accused in the bombing at the Atlanta Summer Olympic Games in 1996. Jewell was eventually cleared of wrongdoing, but not before suffering years of being hounded in the court of public opinion despite never having been charged in the attack. "Law enforcement officials are trained investigators" Kolb says, reminding would-be sleuths that the best reliable information often comes from official statements. Complete coverage of Boston Marathon bombings on Crimesider 18 Photos Boston Marathon bombing victims On April 15, 2013, two explosives went off near the finish line of the Boston Marathon in Boston, Mass. killing three and wounding more than 170 ... © 2013 CBS Interactive Inc. All Rights Reserved.