SlideShare a Scribd company logo
History of Text
Messaging
   The first commercial SMS message was sent over the Vodafone GSM network in the
    United Kingdom on December 3rd, 1992.
   It was sent from a personal computer, to a man who was using an Orbitel 901 handset.
    The text said "Merry Christmas.”
   In 1995 there was only an average of 0.4 messages per GSM customer per month.
   Today, text messaging is the most widely used mobile service on earth. As of
    December 2006, over 18.5 billion text messages are sent every month – and that
    number has grown by 250% each year for the last two years.
   To validate the future growth within the channel, over the next 2 years, Verizon
    Wireless anticipates the number of text messages sent by their users on their network
    to grow nearly 5 times from 400 million messages per month, in July 2005, to over 2
    billion per month. Text messaging is now becoming the global standard for
    communication.
   Not since the internet have we as a society seen such an increase in technology use of
    a certain technology. Men, women, children and the elderly are making a point to sign
    up for cell phone plans that allow the use of text messaging in order to stay in touch
    with the world’s growing technology. Now everyone can say what they need to say
    without ever having to open their mouths.
Social implications of Text
Messaging: A Case Study
 “Insights into the Social and Psychological Effects
  of SMS Text Messaging,”
 authors talk about the growing concern with the
  social and psychological impact of mobile phone
  text-messaging
 intimate relationships without really being present
 text massagers were found to be lonelier than the
  people who actually used their cell phones to talk
 more susceptible to release private information
  about themselves and talk more openly
Txting Justice
 Used to catch suspects
 Used to implicate suspects
 Used as a tool to fight crime
 Used as a tool to warn others about
  crime
 Used as evidence in court

                     “Wish
                    I didn’t
                      use
                      txt”
Examples
        “Police to use text message tactics to
         snare rape suspect”
        “Police Blotter: Armed robbers
         nabbed through text messages”
        “Fighting Crime -- One Text Message
         at a Time”
        “Think before you text: Wireless
         messages are showing up in court”
http://www.youtube.com/watch?v=DhOb0Qs97vE
http://www.guardian.co.uk/uk/2008/jan/14/ukcrime.topstories31
http://www.news.com/Police-Blotter-Armed-robbers-nabbed-through-text-messages/2100-1036_3-6231980.html?tag=topicIndex
http://mobile1.aol.com/mobilearticle/_a/fighting-crime-one-text-message-at-a/20080128112209990001
http://www.sptimes.com/2004/06/21/Technology/Think_before_you_text.shtml
Something To Think
About
 Is the use of Txt Messaging Beneficial?
  Or too much room for interpretation?
 Messages used in court = invasion of
  privacy?
 How “True” are the messages being
  sent?
 What kind of money are we talking
  about spending for state wide alert
  service?

More Related Content

Viewers also liked

Der01 i informatica
Der01 i informaticaDer01 i informatica
Der01 i informatica
Pamela Rivadeneira
 
Escrilandia
EscrilandiaEscrilandia
1.4. ciencia
1.4. ciencia1.4. ciencia
1.4. ciencia
Lucerito Bustamante
 
PM.pdf
PM.pdfPM.pdf
Prodazha aktivov
Prodazha aktivovProdazha aktivov
Prodazha aktivov222222qqq
 
Corrientes economicas
Corrientes economicasCorrientes economicas
Corrientes economicas
Valeria miramontes
 
Presentación1
Presentación1Presentación1
Narrative theory presentation
Narrative theory presentationNarrative theory presentation
Narrative theory presentation
Haaris Hussain
 
Mise en scene - Haaris 6th Form
Mise en scene - Haaris 6th FormMise en scene - Haaris 6th Form
Mise en scene - Haaris 6th Form
Haaris Hussain
 

Viewers also liked (15)

Nota via blogs
Nota via blogsNota via blogs
Nota via blogs
 
Der01 i informatica
Der01 i informaticaDer01 i informatica
Der01 i informatica
 
Escrilandia
EscrilandiaEscrilandia
Escrilandia
 
1.4. ciencia
1.4. ciencia1.4. ciencia
1.4. ciencia
 
Bernie Resume 2016
Bernie Resume 2016Bernie Resume 2016
Bernie Resume 2016
 
PM.pdf
PM.pdfPM.pdf
PM.pdf
 
Bb.su dung thuoc tri benh
Bb.su dung thuoc tri benhBb.su dung thuoc tri benh
Bb.su dung thuoc tri benh
 
WEB 1.0 y 2.0
WEB 1.0 y 2.0WEB 1.0 y 2.0
WEB 1.0 y 2.0
 
Cómo usar la carpeta pública
Cómo usar la carpeta públicaCómo usar la carpeta pública
Cómo usar la carpeta pública
 
Prodazha aktivov
Prodazha aktivovProdazha aktivov
Prodazha aktivov
 
Presentación1
Presentación1Presentación1
Presentación1
 
Corrientes economicas
Corrientes economicasCorrientes economicas
Corrientes economicas
 
Presentación1
Presentación1Presentación1
Presentación1
 
Narrative theory presentation
Narrative theory presentationNarrative theory presentation
Narrative theory presentation
 
Mise en scene - Haaris 6th Form
Mise en scene - Haaris 6th FormMise en scene - Haaris 6th Form
Mise en scene - Haaris 6th Form
 

Similar to Text Messaging & Justice

Whats Whatsapp all about? Find out
Whats Whatsapp all about? Find outWhats Whatsapp all about? Find out
Whats Whatsapp all about? Find out
Prayukth K V
 
02 20241 ijict
02 20241 ijict02 20241 ijict
02 20241 ijict
IAESIJEECS
 
Mrisks
MrisksMrisks
Mrisks
gprasad
 
Generation Now: Diverse. Connected. On-the-go. (Keynote at Social Media Atlan...
Generation Now: Diverse. Connected. On-the-go. (Keynote at Social Media Atlan...Generation Now: Diverse. Connected. On-the-go. (Keynote at Social Media Atlan...
Generation Now: Diverse. Connected. On-the-go. (Keynote at Social Media Atlan...
Michael Marlatt
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Marketing with the connected consumer
Marketing with the connected consumerMarketing with the connected consumer
Marketing with the connected consumer
craig lefebvre
 
Mobile for Development: Using Mobile Technology for Social Causes
Mobile for Development: Using Mobile Technology for Social CausesMobile for Development: Using Mobile Technology for Social Causes
Mobile for Development: Using Mobile Technology for Social Causes
evgeny.morozov
 
An Introduction to Government Use of SMS
An Introduction to Government Use of SMSAn Introduction to Government Use of SMS
An Introduction to Government Use of SMS
JoannaTMcLeod
 
Brief history of sms
Brief history of smsBrief history of sms
Brief history of sms
Daniyal Khan
 
Internet Essays
Internet EssaysInternet Essays
Internet Essays
Paper Writing Services
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paperAkshay Sinha
 
SMS is alive and well
SMS is alive and wellSMS is alive and well
SMS is alive and well
Squire Technologies
 
Wireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a reviewWireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a reviewAndrew Olsen
 
Alerting the population about child abduction
Alerting the population about child abductionAlerting the population about child abduction
Alerting the population about child abductionStefan Joss
 
Will the Internet Be Bad for Democracy Eli M. NoamProfessor a.docx
Will the Internet Be Bad for Democracy Eli M. NoamProfessor a.docxWill the Internet Be Bad for Democracy Eli M. NoamProfessor a.docx
Will the Internet Be Bad for Democracy Eli M. NoamProfessor a.docx
alanfhall8953
 
Running head Cell phone technology health, behavior, & relations.docx
Running head Cell phone technology health, behavior, & relations.docxRunning head Cell phone technology health, behavior, & relations.docx
Running head Cell phone technology health, behavior, & relations.docx
healdkathaleen
 
A Survey: SMS Spam Filtering
A Survey: SMS Spam FilteringA Survey: SMS Spam Filtering
A Survey: SMS Spam Filtering
ijtsrd
 

Similar to Text Messaging & Justice (20)

Whats Whatsapp all about? Find out
Whats Whatsapp all about? Find outWhats Whatsapp all about? Find out
Whats Whatsapp all about? Find out
 
Text Messaging
Text MessagingText Messaging
Text Messaging
 
02 20241 ijict
02 20241 ijict02 20241 ijict
02 20241 ijict
 
Mrisks
MrisksMrisks
Mrisks
 
Generation Now: Diverse. Connected. On-the-go. (Keynote at Social Media Atlan...
Generation Now: Diverse. Connected. On-the-go. (Keynote at Social Media Atlan...Generation Now: Diverse. Connected. On-the-go. (Keynote at Social Media Atlan...
Generation Now: Diverse. Connected. On-the-go. (Keynote at Social Media Atlan...
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Marketing with the connected consumer
Marketing with the connected consumerMarketing with the connected consumer
Marketing with the connected consumer
 
Mobile for Development: Using Mobile Technology for Social Causes
Mobile for Development: Using Mobile Technology for Social CausesMobile for Development: Using Mobile Technology for Social Causes
Mobile for Development: Using Mobile Technology for Social Causes
 
An Introduction to Government Use of SMS
An Introduction to Government Use of SMSAn Introduction to Government Use of SMS
An Introduction to Government Use of SMS
 
Brief history of sms
Brief history of smsBrief history of sms
Brief history of sms
 
Internet Essays
Internet EssaysInternet Essays
Internet Essays
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
SMS is alive and well
SMS is alive and wellSMS is alive and well
SMS is alive and well
 
Wireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a reviewWireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a review
 
Alerting the population about child abduction
Alerting the population about child abductionAlerting the population about child abduction
Alerting the population about child abduction
 
Texting
TextingTexting
Texting
 
Rajwanti
RajwantiRajwanti
Rajwanti
 
Will the Internet Be Bad for Democracy Eli M. NoamProfessor a.docx
Will the Internet Be Bad for Democracy Eli M. NoamProfessor a.docxWill the Internet Be Bad for Democracy Eli M. NoamProfessor a.docx
Will the Internet Be Bad for Democracy Eli M. NoamProfessor a.docx
 
Running head Cell phone technology health, behavior, & relations.docx
Running head Cell phone technology health, behavior, & relations.docxRunning head Cell phone technology health, behavior, & relations.docx
Running head Cell phone technology health, behavior, & relations.docx
 
A Survey: SMS Spam Filtering
A Survey: SMS Spam FilteringA Survey: SMS Spam Filtering
A Survey: SMS Spam Filtering
 

More from merlyna

The truth of science for justice and peace(4)
The truth of science for justice and peace(4)The truth of science for justice and peace(4)
The truth of science for justice and peace(4)
merlyna
 
Asu Complaint Choir 2009
Asu Complaint Choir 2009Asu Complaint Choir 2009
Asu Complaint Choir 2009
merlyna
 
Lim Jus394 Internet Publicsphere
Lim Jus394 Internet PublicsphereLim Jus394 Internet Publicsphere
Lim Jus394 Internet Publicspheremerlyna
 
Lim Jus394 Utopian Dystopian
Lim Jus394 Utopian DystopianLim Jus394 Utopian Dystopian
Lim Jus394 Utopian Dystopianmerlyna
 
Jus394 Nethistory
Jus394 NethistoryJus394 Nethistory
Jus394 Nethistorymerlyna
 
Jus494 Politics Technology
Jus494 Politics TechnologyJus494 Politics Technology
Jus494 Politics Technologymerlyna
 
Jus394 Spring09 Intro
Jus394 Spring09 IntroJus394 Spring09 Intro
Jus394 Spring09 Intromerlyna
 
Lim Kuala Lumpur 2008
Lim Kuala Lumpur 2008Lim Kuala Lumpur 2008
Lim Kuala Lumpur 2008merlyna
 
Salvador Castro Globalization
Salvador Castro GlobalizationSalvador Castro Globalization
Salvador Castro Globalizationmerlyna
 
Joseph Vogt: Farming
Joseph Vogt: FarmingJoseph Vogt: Farming
Joseph Vogt: Farmingmerlyna
 
Karen Kasold: Media Globalization And Inequality
Karen Kasold: Media Globalization And InequalityKaren Kasold: Media Globalization And Inequality
Karen Kasold: Media Globalization And Inequalitymerlyna
 
Crystina Riffel: Pharmaceutical Drug Policies
Crystina Riffel: Pharmaceutical Drug PoliciesCrystina Riffel: Pharmaceutical Drug Policies
Crystina Riffel: Pharmaceutical Drug Policiesmerlyna
 
Douglass Swhwimer: Outsourcing
Douglass Swhwimer: OutsourcingDouglass Swhwimer: Outsourcing
Douglass Swhwimer: Outsourcingmerlyna
 
Kevin Overbeck: Race Science And Inequality
Kevin Overbeck: Race Science And InequalityKevin Overbeck: Race Science And Inequality
Kevin Overbeck: Race Science And Inequalitymerlyna
 
Erika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell PhoneErika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell Phonemerlyna
 
Paul Shenkyr Presentation
Paul Shenkyr PresentationPaul Shenkyr Presentation
Paul Shenkyr Presentationmerlyna
 
Tony Ngon: Corporate Use of Technology
Tony Ngon: Corporate Use of TechnologyTony Ngon: Corporate Use of Technology
Tony Ngon: Corporate Use of Technologymerlyna
 
Yvonne Plascencia: Malnutrition
Yvonne Plascencia: MalnutritionYvonne Plascencia: Malnutrition
Yvonne Plascencia: Malnutritionmerlyna
 
Ryan Carpenter: The Role Technology Played In The Cold War
Ryan Carpenter: The Role Technology Played In The Cold WarRyan Carpenter: The Role Technology Played In The Cold War
Ryan Carpenter: The Role Technology Played In The Cold Warmerlyna
 
Quinn Heydt: Steroids And Issues Of Inequality And Morality
Quinn Heydt: Steroids And Issues Of Inequality And MoralityQuinn Heydt: Steroids And Issues Of Inequality And Morality
Quinn Heydt: Steroids And Issues Of Inequality And Moralitymerlyna
 

More from merlyna (20)

The truth of science for justice and peace(4)
The truth of science for justice and peace(4)The truth of science for justice and peace(4)
The truth of science for justice and peace(4)
 
Asu Complaint Choir 2009
Asu Complaint Choir 2009Asu Complaint Choir 2009
Asu Complaint Choir 2009
 
Lim Jus394 Internet Publicsphere
Lim Jus394 Internet PublicsphereLim Jus394 Internet Publicsphere
Lim Jus394 Internet Publicsphere
 
Lim Jus394 Utopian Dystopian
Lim Jus394 Utopian DystopianLim Jus394 Utopian Dystopian
Lim Jus394 Utopian Dystopian
 
Jus394 Nethistory
Jus394 NethistoryJus394 Nethistory
Jus394 Nethistory
 
Jus494 Politics Technology
Jus494 Politics TechnologyJus494 Politics Technology
Jus494 Politics Technology
 
Jus394 Spring09 Intro
Jus394 Spring09 IntroJus394 Spring09 Intro
Jus394 Spring09 Intro
 
Lim Kuala Lumpur 2008
Lim Kuala Lumpur 2008Lim Kuala Lumpur 2008
Lim Kuala Lumpur 2008
 
Salvador Castro Globalization
Salvador Castro GlobalizationSalvador Castro Globalization
Salvador Castro Globalization
 
Joseph Vogt: Farming
Joseph Vogt: FarmingJoseph Vogt: Farming
Joseph Vogt: Farming
 
Karen Kasold: Media Globalization And Inequality
Karen Kasold: Media Globalization And InequalityKaren Kasold: Media Globalization And Inequality
Karen Kasold: Media Globalization And Inequality
 
Crystina Riffel: Pharmaceutical Drug Policies
Crystina Riffel: Pharmaceutical Drug PoliciesCrystina Riffel: Pharmaceutical Drug Policies
Crystina Riffel: Pharmaceutical Drug Policies
 
Douglass Swhwimer: Outsourcing
Douglass Swhwimer: OutsourcingDouglass Swhwimer: Outsourcing
Douglass Swhwimer: Outsourcing
 
Kevin Overbeck: Race Science And Inequality
Kevin Overbeck: Race Science And InequalityKevin Overbeck: Race Science And Inequality
Kevin Overbeck: Race Science And Inequality
 
Erika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell PhoneErika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell Phone
 
Paul Shenkyr Presentation
Paul Shenkyr PresentationPaul Shenkyr Presentation
Paul Shenkyr Presentation
 
Tony Ngon: Corporate Use of Technology
Tony Ngon: Corporate Use of TechnologyTony Ngon: Corporate Use of Technology
Tony Ngon: Corporate Use of Technology
 
Yvonne Plascencia: Malnutrition
Yvonne Plascencia: MalnutritionYvonne Plascencia: Malnutrition
Yvonne Plascencia: Malnutrition
 
Ryan Carpenter: The Role Technology Played In The Cold War
Ryan Carpenter: The Role Technology Played In The Cold WarRyan Carpenter: The Role Technology Played In The Cold War
Ryan Carpenter: The Role Technology Played In The Cold War
 
Quinn Heydt: Steroids And Issues Of Inequality And Morality
Quinn Heydt: Steroids And Issues Of Inequality And MoralityQuinn Heydt: Steroids And Issues Of Inequality And Morality
Quinn Heydt: Steroids And Issues Of Inequality And Morality
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Text Messaging & Justice

  • 1.
  • 2.
  • 3. History of Text Messaging  The first commercial SMS message was sent over the Vodafone GSM network in the United Kingdom on December 3rd, 1992.  It was sent from a personal computer, to a man who was using an Orbitel 901 handset. The text said "Merry Christmas.”  In 1995 there was only an average of 0.4 messages per GSM customer per month.  Today, text messaging is the most widely used mobile service on earth. As of December 2006, over 18.5 billion text messages are sent every month – and that number has grown by 250% each year for the last two years.  To validate the future growth within the channel, over the next 2 years, Verizon Wireless anticipates the number of text messages sent by their users on their network to grow nearly 5 times from 400 million messages per month, in July 2005, to over 2 billion per month. Text messaging is now becoming the global standard for communication.  Not since the internet have we as a society seen such an increase in technology use of a certain technology. Men, women, children and the elderly are making a point to sign up for cell phone plans that allow the use of text messaging in order to stay in touch with the world’s growing technology. Now everyone can say what they need to say without ever having to open their mouths.
  • 4. Social implications of Text Messaging: A Case Study  “Insights into the Social and Psychological Effects of SMS Text Messaging,”  authors talk about the growing concern with the social and psychological impact of mobile phone text-messaging  intimate relationships without really being present  text massagers were found to be lonelier than the people who actually used their cell phones to talk  more susceptible to release private information about themselves and talk more openly
  • 5. Txting Justice  Used to catch suspects  Used to implicate suspects  Used as a tool to fight crime  Used as a tool to warn others about crime  Used as evidence in court “Wish I didn’t use txt”
  • 6. Examples  “Police to use text message tactics to snare rape suspect”  “Police Blotter: Armed robbers nabbed through text messages”  “Fighting Crime -- One Text Message at a Time”  “Think before you text: Wireless messages are showing up in court” http://www.youtube.com/watch?v=DhOb0Qs97vE http://www.guardian.co.uk/uk/2008/jan/14/ukcrime.topstories31 http://www.news.com/Police-Blotter-Armed-robbers-nabbed-through-text-messages/2100-1036_3-6231980.html?tag=topicIndex http://mobile1.aol.com/mobilearticle/_a/fighting-crime-one-text-message-at-a/20080128112209990001 http://www.sptimes.com/2004/06/21/Technology/Think_before_you_text.shtml
  • 7. Something To Think About  Is the use of Txt Messaging Beneficial? Or too much room for interpretation?  Messages used in court = invasion of privacy?  How “True” are the messages being sent?  What kind of money are we talking about spending for state wide alert service?