Monday, July 29, 2019

Criminal Profiling And Remote Monitoring Of A Computer Essay

Criminal Profiling And Remote Monitoring Of A Computer - Essay Example Although technology has most definitely benefitted us in every possible way, there are some areas in which it has created numerous problems for us. One of these main problems is criminal activity, which has become even more common due to the technological advancements of today’s world. It has also become challenging for the police or investigators to trace the criminals or solve the crime, as now instead of just physical evidence like eyewitnesses and statements, the scene of the crime now consists cybercrimes, spam’s, frauds etc. on computers or a network. Due to this, the sector of digital forensics investigation has been opened and is in continuous development, in order to come to date with the digitally advanced types of crimes. Criminal profiling has been present for some time now. The earliest effort to practice criminal profiling was done in the early twentieth century. During World War II, criminal profiling was used and a profile on Adolf Hitler was prepared, w hich helped in his eventual capture. Criminal profiling can be divided into two categories: inductive and deductive. Inductive profiling of criminals is done by studying different types of behavior, gathered from various data. It is a type of profiling where conclusion is reached based on observation and determines a general behavior from a group of criminals. This type of profiling allows using information from the data collected on a group of criminals, and is then used to guess the personality or characteristics of the whole group. This plays a critical role in understanding the mind of the criminals and their next move. Deductive profiling is more specific as compared to inductive profiling. While inductive profiling is more general in nature, deductive logic requires a more precise approach. A single case is studied, and then a behavioral profile is formed on that case. But no matter which type of profiling is used, this method usually does not single out the suspect but reduce s the number so that it becomes easier to identify the suspect. (Marc Rogers). Both the types of criminal profiling help in the digital forensic investigations. The number of suspects or the amount of evidence gathered in a network check leads to the collection of lot of data. From this data, the suspect needs to be identified and criminal profiling helps the investigator in doing that. The results acquired during criminal profiling aid in carrying out a distinctive search and the focus can be easily placed on a particular area. (Criminal Profiling in Digital Forensic, 2011) Discuss tools that could be used to remotely monitor a computer (with or without the computer owner’s awareness). You can discuss the technical solutions and the legal impacts. Also will this kind of evidence admissible? Are they admissible under which conditions? Monitoring different computers in an area and examining the activities on those computers is called remotely monitoring a computer. This superv ision of a network of computers is used extensively by investigators nowadays, but it is a fairly new practice, which began less than a decade ago. To monitor different computers, various Internet or computer management tools were introduced, which have now developed into mechanized practices used by forensics experts to find evidence from computers during an investigation. The courts have allowed the authorities to monitor the computers of people under probation, so that their activities are kept under check. Different types of software and tools have been developed since the monitoring of computers started. Field Forensic

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.