Monday, December 6, 2010

Future Changes in Criminal Justice Sysem

Future Changes in  the Criminal Justice System
by Linda L Smith 


                    Over the next 50 years, many changes are expected in the field of Criminal Justice.
Although we do cannot accurately predict the future, there are many trends, alluding to the direction the Criminal Justice is heading. These changes will reflect modern technological break though scientific discoveries such as nanotechnology, anti toxins new surveillance systems new DNA a detection systems, and weapons.

              Right now, some terrorist organizations are seeking to obtain weapons of mass destruction involving possible chemical, biological radiological and nuclear threats (Schmalleger, 2011 p.556). Computer information theft, as well as attempts to gather classified information from the government’s computers is very common. There are ominous viral computer worms that terrorists or sabotaging unfriendly countries attempt to use trying shut down government systems and Army weapon systems (Schmalleger, 2011 p.655). “Technical sophistication of state sponsored terrorist organizations is rapidly increasing” (Schmalleger, 2011 p.655). “Handguns and even larger weapons are being manufactured out of plastic polymers and ceramics” (Schmalleger,2011 p.655). “These guns are capable of firing Teflon coated armor- piercing hardened ceramic bullets, weapons as such as these are extremely powerful and impossible to uncover with metal detectors”(Schmalleger,2011 p.655). There is a new evidence of the black-market availability of other ominous items, including liquid metal embrittlement (LME), which is a chemical that slowly weakens any metal it contacts. LME can be effortlessly applied with a felt tip pen to fuselage components in domestic aircraft, causing delayed structural failures which is an insidious form of sabotage (Schmalleger, 2011 p.655). In the future backpack type electromagnetic pulse generators may soon be available to terrorists. They could be carried into major cities; setup next to important computer installations, and activated to wipe out billions of items of financial, military or other information now stored on magnetic media. International terrorists, along with the public, have easy access to maps and other information they could be used to cripple the nation (Schmalleger, 2011 p.655). .

          In a recent NIJ sponsored symposium, several experts offered their views of what Criminal Justice would look like forty years into the future (Schmalleger, 2011 p. 673). The experts were Bryan J.Vila, former chief of the NIJ’s Crime Control and Prevention Research Division; Christopher E. Stone, a professor of the practice of criminal justice at Harvard University’s John F. Kennedy School of Government and David Weisburd, professor of criminology at the University of Maryland (Schmalleger, 2011 p. 673) . Vila said that he believe that the future crime fighters will need to understand what he calls the co evolution of crime commission and crime fighting (Schmalleger, 2011 p. 673). Technological advances will have a profound effect on crime fighting, according to Villa. (Schmalleger, 2011 p. 673) .Developments in surveillance, biometrics, DNA analysis and radio frequency will have a great influence on crime fighting. According to Vila, the future will bring improvements in systems that allow official to talk electronically to one another, particularly in emergencies (Schmalleger, 2011 p. 673). He also believes that better connections between citizens and agencies will lead to a decrease in criminal opportunities (Schmalleger, 2011 p.673).

Stone emphasized what he envisions professional culture emerging around the globe that will influence the world’s criminal justice system in decades to come. Because according to him a new culture is spreading professionalism through justice systems worldwide in areas of bilateral transfer of information between countries, the global dissemination of justice products such as court management Computer Systems, Consulting Services, and prison design, as well as comparative empirical evidence about what works and what doesn’t work and why” (Schmalleger, 2011p.673) .

          Weisburd says that the nature of criminal justice in 2040 will depend in large part on the primary research methodology that we employ between now and then. He questions whether criminal justice community would be better served by relying on the experiences and opinions of practitioners or by research that test programs and measures outcome (Schmalleger,2011 p. p.673).

         A number of expert systems exist. Today one is used by the FBI’s National Center for the Analysis of Violent Crimes (NCAVC) in a project designed to profile violent serial criminals. The NCAVC system depends on computer models of criminal profiling to provide a theoretical basis for the development of investigative strategies. A number of other systems have been developed, including some that focus on serological (blood serum) analysis, narcotics interdictions, serial murders, rape and counter terrorism. Similar to the expert systems that exist today are the rational databases, which permit fast and easy sorting of large numbers of records. (Schmalleger, 2011 p. 668).

          ImAger, a product of Face software, Inc uses computer technology to artificially age photographs of missing infants and children. The program has been used successfully to identify and recover a number of children (Schmalleger, 2011 p. 669). Police artists, to create simulated photographs of criminal suspects (Schmalleger, 2011 p.669), use a program called Compusketch by Visatex Corporation.

         Advanced computer aided investigation systems are being touted by agencies like NASA and the defense advanced research projects agency DARPA as having the ability to prevent crime (Schmalleger, 2011 p. 669). DARPA for instance announce its new Total Information Awareness (TIA) program in 2003 (Schmalleger, 2011 p. 669). The five-year-old development project used information sorting and pattern matching software to sift through vast numbers of existing business and government databases in an effort to identify possible terrorist threats (Schmalleger, 2011 p. 669). The software detects suspicions patterns of activity, identifying the people involved, also locating them so that the investigations can be conducted (Schmalleger, 2011 p. 669). Another benefit this technology is that suspected insurgents might be identified with similar software when it detects a series of credit card, bank, and official transactions, that form patterns resembling preparations for insurgency attack (Schmalleger, 2011 p. 669), this process, known as Data Mining, generates computer models in an attempt to predict terrorist actions (Schmalleger, 2011 p. 669). Privacy advocates have raised concerns about the DARPA software, but the agency has try to defuse concerns by explaining to the public, that the project is not an attempt to build a supercomputer to snoop into the private lives, or track every day activities of the American citizen (Schmalleger, 2011 p. 669). “The agency claims that all TIA research complies with all privacy laws without exception Schmalleger, 2011 p. 669)”.

     DNA profiling also termed DNA fingerprinting makes use of the human DNA for purposes of identification. DNA (Deoxyribonucleic acid) is a nucleic found in the center of cells and is the principal component of chromosomes, the structures that transmit heredity characteristics between generations (Schmalleger, 2011 p. 663). The DNA in people’s blood is the same as the DNA in their saliva, skin tissue, hair, and bone (ncjrs.gov). Notably, DNA does not change throughout a person’s life. DNA is a powerful investigative tool because, with the exception of identical twins, no two people have the same DNA (ncjrs.gov). The Justice Dept notes that DNA evidence is playing a larger role than ever before in criminal cases throughout the country, both to convict the guilty and to exonerate those wrongly accused or convicted (ncjrs.gov). Portable, miniature chips will make possible the analysis of DNA directly at the crime scene, which can be telemetered to databases, offering the possibility of immediate identification (Asplen, 2000).

      Other systems such as SNPs, Alu sequences, mitochondrial DNA, and Y chromosome DNA will continue to be developed. Techniques for handling minute amounts of DNA or DNA that is badly degraded will become much better. In particular, mitochondrial DNA will probably play an increasing role in such difficult cases. Databases of DNA profiles of convicted felons will be extensive and coordinated throughout the States. International comparisons will be feasible and increasingly common. The rate at which this is implemented is heavily dependent on funding. With the current 13 core STR loci, it is generally possible to distinguish among individuals, including relatives as close as siblings, with a high degree of reliability. There may be a convention adopted that will enable a sufficiently low match probability to be regarded as identification (Asplen, 2000).

        Another new technology tool Crime scene investigators may soon have is one that could let them determine a suspect or victim's age from a bloodstain. Researchers in the Netherlands have developed a test that quantifies the amount of a specific molecule in blood to approximate a person's age to within nine years, plus or minus, it would help when you have two suspects, an older and a younger suspect in criminalistic testing (Chu. 2010). . Investigators can already determine a person's age by analyzing bones and teeth (Chu. 2010). Most often, bloodstains are the only evidence at a crime scene, while scientists can analyze DNA in blood to identify characteristics like eye color, skin tone, and gender, age is a trickier issue (Chu. 2010). This can also be of beneft(Chu. 2010).

      Chris Painter is deputy chief of the Computer Crime and Intellectual Property Section of the U.S. Department of Justice, overseeing a team of 22 lawyers involved in all aspects of computer crime, from denial-of-service attacks to attacks on computer networks (Green, 2006). When asked how is the technology used by these criminals changing? His answered “the kinds of technology they are often using are meant to hide their identities, by using proxy servers, secure websites, or by routing their communications through several different countries, which is why it is so important for us to work internationally (Green, 2006). However, they always come up with new ways of invading people's computers and taking advantage of new vulnerabilities. When asked, “What do you see in the future of cybercrime fighting”? He expressed the view that , we need to continue to work on an integrated response, as we get more secure implementations in the Internet and other protocols, it will help, according to Painter, people are going to continue to commit these types of crimes and we are going to need to respond to them(Green, 2006). The key, he says” is making sure we have strong international partnerships, among not only law enforcement, but also having a unified response, so the law enforcement people who do these investigations are working with the technical people and companies getting the technical community and law enforcement community are talking to each other constantly”(Green, 2006). Painter stated, “He does not anticipate cyber crime really decreasing, anticipating that as new technologies are developed there are going to be continued attacks” (Green, 2006).

                Nanotechnologies, is engineering and creating products on a molecular level and whose applications are still in the realm of future science, although everyday there are new breakthroughs (Schmalleger, 2011 p. 672).

      Another DARPA project, could meet the needs of American law enforcement agencies but is currently being developed for military use overseas, is called Combat Zones That See (CZTS) Schmalleger, 2011 p. 669). “The CZTS program will build a huge surveillance system by networking existing cameras from department stores, subway platforms, banks, airports, parking lots, and other points of surveillance, and by feeding images to a supercomputer like processor capable of recognizing suspects by face, gait, and mannerisms as they move from or one place to another” (Schmalleger, 2011 p. 669). “The data can be fed via satellite to remote locations across the globe, allowing the agency to track suspect so on the move-either within cities or between countries” (Schmalleger, 2011 p. 669). “Vehicles could also be tracked CZTS is being introduced gradually in selected locations, beginning with ARI years in and around American military bases” (Schmalleger, 2011 p. 669). “Future implementations of CZTS may involved now nano-cameras equipped with microminiaturize transmitters is that can be spread all the cities like grains of dust but which have the power to communicate relatively detailed information to local cellular like installations for entry into the CZTS Network” (Schmalleger, 2011 p. 669).

        Just in the last few days, we have seen two incidences that reflect on a hostile climate and the need for surveillance;

        Late Sunday, WikiLeaks issued a statement saying the leaked cables are the largest set of confidential documents ever to be released into the public domain. The website said that the cables, which date from 1966 until the end of February this year, will be released in stages over the next few months. WikiLeaks claimed that the documents show the extent of United States spying on its allies and the United Nations; overlooking or accepting corruption and human rights abuse in friendly states; doing backroom deals with supposedly neutral countries; and lobbying for American corporations. “The White House condemned the disclosure of classified documents and released a statement Sunday saying, in part: "We anticipate release of what are claimed to be several hundred thousand classified State Department cables on Sunday night that detail diplomatic discussions with foreign governments”. The statement acknowledged that the cables could "compromise private discussions with foreign governments and opposition leaders,'' and warned that the disclosures put diplomats and intelligence and other officials at risk. The cables were initially obtained by WikiLeaks, a website dedicated to obtaining and disseminating government secrets. (Torregrosa 2010)

        In my opinion, this is a form of espionage and I think the people responsible should be arrested and tried for it. They have already admitted that their intent is to embarrass the United States, hence interfering with diplomatic relationships and possibly the security of this nation.

    The second news story happened on November 26, 1020, Thanksgiving weekend:  The FBI thwarted an attempted terrorist bombing in Portland's Pioneer Courthouse Square before the city's annual tree-lighting Friday night, according to the U.S. Attorney's Office in Oregon.

A Corvallis man, thinking he was going to ignite a bomb, drove a van to the corner of the square at Southwest Yamhill Street and Sixth Avenue and attempted to detonate it. However, the supposed explosive was a dummy that FBI operatives supplied to him, according to an affidavit in support of a criminal complaint signed Friday night by U.S. Magistrate Judge John V. Acosta. Mohamed Osman Mohamud, 19, a Somali-born U.S. citizen, was arrested at 5:42 p.m., 18 minutes before the tree lighting was to occur, on an accusation of attempting to use a weapon of mass destruction . The FBI operatives cautioned Mohamud several times about the seriousness of his plan, noting that there would be many people, including children, at the event, and that Mohamud could abandon his plans at any time with no shame. "You know there's going to be a lot of children there?" an FBI operative asked Mohamud. "You know there are gonna be a lot of children there?" Mohamud allegedly responded he was looking for a "huge mass that will ... be attacked in their own element with their families celebrating the holidays." "I want whoever is attending that event to leave, to leave either dead or injured," Mohamud reportedly told the FBI operatives, the affidavit says(Denson, 2010).

     In my opinion, advancement in technology has many benefits which can aid society in many ways, as well as our criminal system evidence gathering and surveillance as well as combating terrorists nationally and abroad. No matter what changes come, the one thing that should not changed is our support for our criminal justice system, has to remain technologically and scientifically ahead of our adversaries. This means that the Justice Department must be given enough monetary resources, professional staff, and access to sophisticated technology to combat any present or future threat. This is very important for the security of the country because a great deal of effort will be needed in order to defend ourselves from impending present and future threats. It is an imperative that all the resources needed, be granted to the Department of Justice, and that they are not subjected to politicizing, or reductions to the budget due to attrition, so that our security will not be compromised.

Reference


Asplen, C. (2000). The future of forensic DNA testing: Predictions of the Research. National Commission on the Future of DNA Evidence, Retrieved on December 6, 2010 from, www.ncjrs.gov/pdffiles1/nij/183697.pdf - 2006-07-07

(Denson, B. (2010). FBI thwarts terrorist bombing attempt at Portland holiday tree lighting, authorities say. Retrieve on November 29, 2010, from http://www.oregonlive.com/portland/index.ssf/2010/11/fbi_thwarts_terrorist_bombing.html

Chu, J. (2010). A spot of blood reveals your age. Technology Review, Published by MIT, Retrieved on December 6, 2010 from, http://www.techreview.com/computing/26766/?p1=MstRcnt&a=f

Green, k. (2006). Catching cyber criminals. Technology Review, Published by MIT, Retrieved on December 6, 2010 from http://www.technologyreview.com/article/16529/

Schmalleger, F. (2011). Criminal justice today: An introductory text for the 21st century (11th Ed.), Upper Saddle River, NJ: Pearson Prentice Hall.

Torregrosa,L.L.(2010) Leaking of Secret U.S. Cables Sparks Diplomacy Crisis, Politics Daily retrieved on November 29, 2010 fromhttp://www.politicsdaily.com/2010/11/28/leaking-of-secret-u-s-cables-sparks-diplomacy-crisis/

Understanding DNA evidence: a guide for victim service providers; National Commission on the Future of DNA Evidence Office of Justice Programs National Institute of Justice; Retrieved on December 6, 2010 from www.ncjrs.gov/pdffiles1/nij/bc000657.pdf