Question 1
Advancement in technology has helped to supply police departments with workable equipment that helps to improve the effectiveness as well as the efficiency of the law enforcement officers (Rogers 5). One of the gadget resulting from new technology is the mini-buster. The device helps to sense solid items so as to locate the secret compartments in car. With the increase of cases concerning police brutality, body cams help to identify different cases. The internet as a technology is a good tool that has assisted in tracking down criminals using IP address and other software. However, technology has a loophole whereby criminals have used it to advance their methods (Rogers 16). There are other technologies that have created a platform to eliminate challenges during police work and provide efficiency. In the past decade, police have solved different cases despite the odds because of new technology.
Despite the advancement in technology, there are disadvantages of the internet such as cybercrime. There are are six main motivation for cyber criminals such as ego whereby a person finds satisfaction in creating codes that are elegant. The internet is also an avenue for terrorists to promote their ideologies. Most people who are cyber criminals find motivation in the money and use the internet as a platform. There are those use the internet for entertainment like trolling others. For some people, the internet is a place to show status and for underground hacking and such.
To sum it up, the fact that the internet is now global has created a platform for significant positive police work, has not stooped cyber criminals who use malware. One of the most prominent malware is botnet, delivered by hackers using a variety of networks. A machine infect by bot tends to flood systems and sabotage privacy. There are other malwares like zombie machines, compromised servers, and web pages that compromises ones browsing experience. Secure email services are also used as malware for cybercriminals to go undetected. Malware is also in form of deep underground web that share information through TOR. Social media is also a form of malware when criminals use it to keep tabs and stay in touch with each other.
Works Cited
Rogers, Corinne. “From time theft to time stamps: mapping the development of digital forensics
from law enforcement to archival authority.” International Journal of Digital Humanities(2019): 1-16.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more