Free Essay

Social Safety: Solving Crimes and the Rise of Digital Vigilantes

In: Business and Management

Submitted By Malidi
Words 284
Pages 2
(CNN) -- The videos, pictures and tweets are chilling. A picture of a girl dangling limply from the arms of two young men.
Other boys, laughingly saying the girl had to be dead because she didn't flinch as her body was violated.
An alleged rape, made into a joke.
The images and social media messages are at the heart of criminal charges against two high school football players accused of sexually assaulting an underage teenage girl during a series of end-of-summer parties in August.
Both boys are charged with rape. One also is accused of "illegal use of a minor in nudity-oriented material."
Their trial before an Ohio juvenile court judge is scheduled for February 13.
CNN is not identifying the girl, who is a juvenile, in accordance with its policy not to release the names of alleged rape victims.
The alleged attackers also are juveniles, but they have been identified by a judge in court, by defense attorneys and in newspapers and other media reports as Trent Mays and Ma'lik Richmond, both 16.
The case has attracted the attention of bloggers and even Anonymous, a loosely organized cooperative of activist hackers. Social media videos led to rape charges Murphy: Rape is grossly under prosecuted Social media spotlights Ohio rape case Rape case shocks Ohio town
Anonymous has released information about the town and the football team and is threatening to release more unless everyone comes clean about what happened that August night.
"The town of Steubenville has been good at keeping this quiet and their star football team protected," an Anonymous member wearing the group's trademark Guy Fawkes mask says in a video posted to the group's LocalLeaks website.…...

Similar Documents

Premium Essay

Rise of Crime in Canada

...responsibility of these increases in violent crime. The following paragraphs are the reasons that will prove my arguments. The forces of social control affect every aspect of an individual in a society such as Canadian Society. That is, it is the attempt that society makes to regulate behavior of its citizens within that society. Some examples of these society enforced roles are our status roles, which place us into a hierarchy that is given to us by society. Their are both positive and negative structures and factors to enforce these laws rules created by the society. Positive being praise, wealth and power for abiding by the laws of a given society. Negative enforcers are disgrace, negative praise etc ... and other forms of deterrence that are created by society. These levels of punishment equal the importance of the laws that they enforce in the eyes of the society. Laws against criminal behavior has the criminal justice system in place to enforce and act as a form of social control.  “A formal system that responds to the alleged violations of laws using police, courts and punishments …” Therefore although society as a whole sees crime as a personal failure and a choice of the individual to act upon. Society is the anvil on which ideas of good and evil are wrought and the individuals are hammered into conformity with applied force that is physical and personality shaping. This act is an integral part of becoming a social organization, which is defining of its......

Words: 1569 - Pages: 7

Premium Essay

Digital Crimes

...personal and recreational environments. They have automated many of the menial tasks of business, such as accounting, payroll, filing, record keeping, etc. This increased use of technology has caught the attention of the criminal element. The computer has become both target and tool to a new breed of cyber-criminal. Computers are becoming an increasingly important part of everyday life. They also provide new opportunities for criminal enterprise. The computer provides both new types of crime, and new ways of perpetrating traditional crimes. Computer crime investigation differs from more traditional crime investigation in several critical ways and will require law enforcement agencies to adopt new policies and practices. This paper documents the increasing rate of computer-based crime, points out several critical areas where it differs from more traditional crimes, and outlines some new problems and issues which law enforcement must address to combat computer crime. Finally, this paper suggests a plan of action suitable for many law enforcement agencies to prepare for dealing with computer based crime.The Birth of "hacking" Early use of the term "hacker" was applied to computer hobbyists who spent their spare time creating video games and other basic computer programs. However, this term acquired a negative connotation in the 1980s when computer experts illegally accessed several high-profile databanks. Databases at the Los Alamos National Laboratory......

Words: 1250 - Pages: 5

Premium Essay

Social Networking and Digital Games

...popular technologies—such as Facebook or MySpace, World of Warcraft, or Sim City—which at first glance may seem like a waste of time, and brain cells. But these genres of technologies—Social Networking, Digital Gaming, and Simulations—deserve a second, deeper, look at what’s actually going on. ~~~ When you hear ”MySpace” or “World of Warcraft,” what do they bring to mind for you? What emotions do you associate with them? Have you heard of them before? Your students have, and they almost certainly have strong opinions about them. You don’t need to be a teenager to use or understand these technologies, or to use them in your classroom. Market research data indicates that many a normal, middle-aged adult1 uses these technologies with frequency. The fact is, you can be 17, 35, or 60, and when you begin to engage with them and observe what’s really going on, you can begin to see that these technologies are more than just entertainment. These technologies are already demonstrating how they impact the way we think, learn, and interact—and they are also demonstrating the tremendous potential they have in these areas as well. The emergence of social networking technologies and the evolution of digital games have helped shape the new ways in which people are communicating, collaborating, operating, and forming social constructs. In fact, recent research is showing us that these technologies are shaping the way we think, work, and live. This is especially true of our youngest......

Words: 10453 - Pages: 42

Premium Essay

Digital Crime

...There are four primary areas that local law enforcement need in an effort to combat computer crimes, training, equipment, updated criminal codes designed to complement current enforcement efforts, and resources for tapping federal expertise and equipment related to computer crime enforcement (Stamnbaugh, Beupre, Icoye, Baker, Cassaday, and Williams, 2001). The lack of training at the local level is the difference between getting a conviction and being handed your pride in a Wal-Mart plastic bag. As computer crimes become more prevalent in our society, the importance of proper training at the local level is critical. A local patrol officer can without proper training on computer crimes may inadvertently destroy evidence. Researchers have advised local agencies to have a private company come in to conduct training and also push for a national certification (Stamnbaugh, Beupre, Icoye, Baker, Cassaday, and Williams, 2001). Just as important as training is to an agency so is the need for additional resources and technologies. As there is an abundance of resources and funds at the federal level, that doesn’t always trickle down to the local level as local law enforcement may not be able to decipher encrypted evidence. Without funding at the local levels they may never have the adequate resources and equipment to combat computer crimes, a major stumbling block (Stamnbaugh, Beupre, Icoye, Baker, Cassaday, and Williams, 2001). As technology increases it is hard for local law......

Words: 422 - Pages: 2

Premium Essay

Social Safety: Solving Crimes and the Rise of Digital Vigilantes

...SOCIAL SAFETY: SOLVING CRIMES AND THE RISE OF DIGITAL VIGILANTES Social Media & Mobile Technology For End Users 2nd February 2014 Abstract This paper aims to discuss the benefits and downsides of social media and how digital vigilantes and the police use social networking to solve crimes, as well as help and prevent them from happening. It will touch on issues such as crowd-sourced policing and it’s implications on cases, whether it aids in the apprehension of criminals or rather as a hindrance to police investigations. When people speak about crime, they are usually referring to a shoplifting incident, a shooting, selling of illegal drugs or assaulting someone, but crime goes much further than that. According to Oxford Dictionaries, crime is an action or omission, which constitutes an offence and is punishable by law. So when the topic of crime comes up, one shouldn’t think about just stealing or murders, they must realize that something as little as jumping a red light when no ones around is also a crime. This paper aims to discuss the effects of social media on crime, the rise of digital vigilantes and whether or not social media has helped solve crimes and decrease the crime rate. Safety is one of the most important things on people’s minds. No...

Words: 2212 - Pages: 9

Premium Essay

Digital Crime

...Assignment 1: Crime Theories Professor George CIS 170 Information Technology in Criminology May 5, 2014 Control theory can be as major theories of crime developed by Hirschi, Reckless, Gottfredson, Hagan, etc. According to them, everyone desires to commit crimes. Instead of asking why people commit crimes, the well-known question they ask is ‘why people do not commit crimes?' There, the lack of control is the main reason of encouraging people to commit crimes. This can be done not only because of the lack of social bonds and laws, but also because of the lack of self-control. "Exposure to control also might differ by social location and the historical period, such as the changing level and control given to males and females." (Cullen and Agnew, 2002) Crime can be known, as an act done in violation of those duties, which are individual, owes to the community, and for the breach of which the law has provided with a punishment. Anyhow, though the criminal law of the country had not recognized some behaviors as crimes, some behaviors extremely harm the peaceful continuance of the society. Thus, "today, however, despite popular belief is to the contrary, the proportion of criminal law in regard to the totality of the legal system has shrunk dramatically." (Weeramantry, 2009) Because of that, Digital crime, which can be considered as such a crime was recognized and included as a separate crime. With the development of information and communication technology, in twenty......

Words: 982 - Pages: 4

Premium Essay

Digital Crime

...federal agencies tend to be behind in the technology and fail to have the proper training in effort to fight cybercrime.   This is were the U.S. Government could take an approach in ensuring all local law agencies get the proper training needed.   Sure, it would be a costly amount but putting in an effort on the safety for computer users whom are citizens can be priceless.   Just think how much safer would the U.S. be if all efforts were being put into training in fighting cybercrime.   Laws and regulations should be enforced with maximum penalties.   Criminals are thinking it is easier to commit a crime on the Internet because it is less observed, but since the terrorist act of 9/11, all computer activity is now being monitored.   To better protect the nation against computer crimes and terrorism the U.S. Government will need to ensure that all states and local law agencies are up to par and have the training needed.   The criminals are keeping up with the advancement of the technology with computers, so will the government in effort to help fight against all criminal activity.   In recent studies, law agencies are now becoming more educated in effort of fighting computer crimes.   As part of the change process, there must be a development of new laws being enforced and policies where there was......

Words: 301 - Pages: 2

Premium Essay

The Use of Dna in Solving Crimes

...testing and is now the most accurate method currently available for human identification. DNA testing is used in determining parentage but is more widely known for the use in criminal cases. DNA testing is a powerful and reliable form of forsenic evidence that can beyond a shadow of a doubt reveal whether a person is innocence or guilt. One of the disadvantages however, is many prisoners do not have the legal means to secure testing or evidence in their cases. Some states have passed statues that include barriers to testing that are almost impossible to surpass. This is a obstacle that will keep innocent people from securing DNA test to prove their innocent. One of the advantges of DNA is that by using DNA fingerprinting is the use in solving crimes. Since DNA is found in almost every cell in the body, any portion of the human body can be used to establish identity. Just by the use 2 of a single strand of hair, a piece of skin, nail, a drop of blood or saliva can establish guilt or innoccence. Since it is impossible to remove all bodily or physical traes a persons presence DNA fingerprinting is very useful in murder or homicide cases in which the body has been disfigured, or fingers have been burned or the teeth and other features are destoryed. One cell is good enough for a postive identification. 3 References Advantages of DNA Fingerprinting for the Criminal Justice System www.ehow.com/list Advantages of fingerprinting Criminal Justice System Alexis Writing......

Words: 329 - Pages: 2

Premium Essay

Digital Crime Theories

...Marsha Thompson CIS 170 Doctor David Fox Strayer University Feb. 20, 2105 Select two of the theories, suggested in Chapter 3 of the text, that a researcher could use to explain the cause of digital crime. Provide a rationale to support your response. According to Sang M Lee, computer abuse shows no sign of decline. The social structure theory can help prevent it by enhancing insiders involvement in computer abuse. Studies show that deterrence factors influence SDI and organizational factors significantly affect ICI and ICI decreases insiders’ abuse. Interestingly, SDI negatively affects both insiders and invaders abusers. According to Peter Marzuk, psychological disorders and persons with mental illnesses and personality disorders are strongly linked to crime? Marzuk notes that new studies of violence among the mentally ill are well designed and quite convincing. His studies do state that most people who have mental illnesses are not criminals., and the ones that are do not commit not violent crimes. Marzuk says, "In the last decade, the evidence showing a link between violence, crime, and mental illness has mounted. It cannot be dismissed; it should not be ignored." This research found that people with a background of psychiatric hospitalization were more likely to have been found guilty of a criminal offense than persons without a history of psychiatric hospitalization," a finding that was true for both men and women. According to Marzuk,...

Words: 689 - Pages: 3

Premium Essay

Crime Solving

...The Process of Solving Crimes English 112 Instructor Kulvert August 4, 2014   Abstract Crime rates in the United States have been drastically increasing throughout the years from robberies, break-ins, shootings, and many other occurrences. The process in which we solve crimes can be very time consuming with all the evidence having to be collected to court trials once suspects are apprehended. In many cases, some situations call for more time for the process than others due to lack of enough evidence for conviction or lack of ability to apprehend the suspect. Many issues can arise that could prevent law officials from being able to solve a case, there will be many topics that will be discussed about the process in which we use to solve cases in the United States and who is part of the process step by step. Once the cases are solved after all evidence is collected and presented then court officials determine the sentencing of the suspect and how long the sentencing stands.   The Process of Solving Crimes Crimes happen all around the United States and understanding why these crimes take place is something no one will ever figure out but there will always be someone there who will commit a crime for whatever reason. Law officials are put in place in order to help locate and solve crimes to help make this country a safer place for all. There are many people involved in the process of solving crimes such as; police officers, detectives, district attorneys, crime scene......

Words: 1356 - Pages: 6

Free Essay

Hair Analysis in Solving a Crime

...Hair Analysis in Solving a Crime Name Institution Hair Analysis in Solving a Crime 1. Introduction Hair is among the most commonly used evidences in the crime investigations. Hair analysis is based on its chemical characteristics and physical structure which aid during investigations. It is notable that hairs are easily transferred hence can be left as evidence after a criminal activity. Hair analysis can be of great use in forensic analysis during an investigation since it can help prove crime in various ways. First, hair analysis can easily link a suspect to a crime scene. It can also show the association or link between the suspect and the victim. Hair analysis can also help single out a particular suspect from other suspects in the case. It is important to note that hair is a great resource to forensic science. The presence of the suspects ‘ hair on the victim’s body can help determine his or her sex and race. Hair analysis can also be used to determine the DNA of a suspect in a crime scene. The forensic problem to be solved is identification of the murder suspect in the Ford Heights Four case. A couple was robbed and murdered in Ford Heights in East Chicago. According to witnesses, four men were seen leaving the crime scene after the incident. The four men were later convicted and sentenced to prison despite their insistence on being innocent. However, after some years, DNA testing was conducted and the four suspects proved to be innocent before being......

Words: 771 - Pages: 4

Premium Essay

Digital Computer Crime

...Digital Computer Crime Digital computer crimes are criminal activities, which involve the use of information technology to get wrongful or unjustified access to a computer system with the mindset of damaging, deleting, and altering computer data (Taylor, Fritsch, Leiderbach, 2015). Computer crimes do not necessarily have to involve damage to physical property. The computer itself could have participated in the crime or may have been the intended target. We will look at the four common types of computer crimes, which are the computer as the target, the computer as an instrument of a crime, the computer as incidental to a crime, and crimes associated with the prevalence of computers (Fairchild, 2013). The computer can be used as a destination for crimes where the computer can include offenses like theft of intellectual property, marketing information, or blackmail based on data gained from computerized files. Crimes of this nature can disrupt operating systems and programs with the thought of creating chaos in business operations (Fairchild, 2013). There are various ways computers can be targeted illicit entrances to criminal justice and other government records. An example of this is a crime that targets the computer directly. In this, criminal history, modifying warrant information, creating a driver’s license, passport, or any other type of document for identification purposes is possible. First, we will look at the computer as a target. This is defined as a fundamental......

Words: 1317 - Pages: 6

Premium Essay

Digital Crimes

...The Future of Digital Crimes and Digital Terrorism Strayer University Assignment 4 Submitted in Partial Fulfillment Of the Requirements for the Course CIS 170 Information Technology in Criminal Justice Dr. Jacob Ogunlade Spring 2015 Table of Contents Certificate of Authorship 3 name 3 Purposes one (1) strategy that the U.S. could use in order to mitigate the challenges in question. 8 Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorisms 9 Conclusion 10 References 12 Certificate of Authorship I have read and understand Strayer University's Academic Integrity Policy. I promise to conduct myself with integrity in the submission of all academic work to the University and will not give or receive unauthorized assistance on the completion of assignments, research papers, examinations or other work. I understand that violations of the Academic Integrity Policy will lead to disciplinary action against me, up to and including suspension or expulsion from the University. I know that all students play a role in preserving the academic integrity of the University and have an obligation to report violations of the Academic Integrity Policy committed by another student. In addition, I name certify that I am the author of this document and any assistance I received in preparing this report fully acknowledged. I have also cited in APA format for......

Words: 2106 - Pages: 9

Premium Essay

Digital Computer Crimes

...Digital Computer Crimes Byron Hill Information Technology in Criminal Justice CIS 170 Professor Basta April 20, 2016 Computer crime is usually a term referring to fraud, embezzlement, and manipulation. According to the Department of Justice’s Criminal Justice Resource Manual, computer crime is “any illegal act for which knowledge of computer technology is essential for successful prosecution” (Computer Crimes, 2015). There are many types of computer crimes but the four main ones consist of: Internal computer crimes (viruses), telecommunications crimes (hacking), computer manipulation crimes (embezzlement & fraud), and traditional theft of hardware and software. The most common forms of digital crime are theft, identity theft, hacking, stalking, and malicious files and software (Laura, 2015). These crimes are called Cyber Crimes. They are on the rise due to the fact that people today take care of all their business online. Individuals are always on the go so using their smart devices is a normal for handling personal, financial, and other business. Theft occurs a lot online when individuals infringe upon another’s person copyrighted materials. Individuals steal the material and sell it as their own without the permission of the owner (Laura, 2015). Identity theft is one of the most horrific types of Cyber Crimes. Through identity theft, victims face financial losses and gain a ruined reputation. If the criminal is good, they are able to access an......

Words: 1061 - Pages: 5

Free Essay

Digital Crime

...The Future of Digital Crime and Digital Terrorism Introduction You will learn that law enforcement personnel that is just coming into this field needs to be trained with the upcoming technology. There is no need to train them on the old stuff and wait to train them on the new. They need to be able to be one step ahead of digital crime and digital terrorism. Right now, law enforcement is falling behind. Digital Crime Forecast The future of digital crime and digital terrorism is going to get worse than what it is right now. The laws and the law enforcement agencies cannot keep up with the ever changing technology. By the time they learn something to keep up with it now, something new is already out which puts law enforcement behind the power curve. Starting out as new personnel in the different law enforcement agencies you will have to get training on the technology that is already out and the one that is coming out. Technology is changing every day and is not going to stop. Learning from the past can help law enforcement forecast future trends in crime to facilitate creation of best practices for investigation and prosecution of computer crime along with researching all past, present, and future aspects of emerging methodologies in digital crime. There are eight forecasts that have been developed from the analysis and collection of data, in order to know the future of digital crime and digital terrorism. They are: Forecast 1: The number of offenses reported to the......

Words: 1834 - Pages: 8

Sailor Moon | 90 Days Time to Love | Anthony Ramos