Law Enforcement 2025? Kismet or Karma? Prepared by Commander Sid Heal, (Retired) Los Angeles Sheriff’s Department.

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

Legal Aspect of IPv6 and of the IPv4 to IPv6 transition Ashok.B.RADHAKISSOON Legal Adviser/Policy&Regulatory Affairs Liaison.
2 Language of Computer Crime Investigation
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Transmission technology William Kemp. Infrared Infrared data travels in shorter (near infrared waves). These waves enable data to be sent and receive.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
3.4 Electronic Monetary Processing. Overview Demonstrate and apply knowledge and understanding of: − EFT and identify the advantages and disadvantages.
Prepared by: Nahed Al-Salah
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER SEVEN NETWORKS: MOBILE BUSINESS CHAPTER SEVEN NETWORKS:
By Abdullah Al-Dossary Ahmad Al-Suhaibani
3 Ethics and Privacy.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Toll Collection. One of the early widespread adopters of ITS Some of the most obvious benefits from ITS adoption.
Company LOGO Internet Safety A Community Approach.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Understanding Families
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Information Age In Which We Live Session 2. Introduction Knowledge is Power What you don’t know will hurt you Business are using information to reel in.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
The difference between a Credit and Debit Card Debit card: Give you access to your funds immediately Credit card: You use money you don’t have but are.
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Women with Disability E-development: Minimizing the Gap Presented by: Dr. Atiga Yousif Elmubark Department of Educational Technology,
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
SESSION IV. M I S MIS refers broadly to a computer-based system that provides managers with the tools for organizing, evaluating and efficiently running.
A Boon or a Curse. What is the ‘Internet’?  It is a network of networks that consists of millions of private, public, academic, business, and government.
Business Computing 550 Lesson 1. Fundamentals of Information Systems, Fifth Edition An Introduction to Information Systems in Organizations.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Tablets Laptops PDAs Smart Phones Mobile Commerce &Wireless Network.
Exploring the Network.
Voice over IP in the Enterprise. What is VOIP? The use of data networks to carry voice without a loss of sound quality The use of data networks to carry.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Trends Information Systems and Management. Trends Disruptive versus Sustaining Wireless IT Focus for organizations IRM –Strategic vs. –Operational CIO.
Information Warfare Playgrounds to Battlegrounds.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
The U.S. Secret Service Shhhhhh!
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Information Warfare Playgrounds to Battlegrounds.
Prepared by Haverford High School Students “Against All Odds”
Anika Massey.  There are three main types of business:  Traditional  Online  Transportation.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Computer crimes.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Ethical and Social...J.M.Kizza1 Module 9: Ethical and Social Issues in Cyberspace  Cyberspace Access  Intellectual Property Rights  Cyberspace Censorship.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Electronic Banking & Security Electronic Banking & Security.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Social and environmental impact
MGMT 452 Corporate Social Responsibility
Lesson # 1 A Practical Guide to Computer Forensics Investigations
Introduction to BYOD EIT, Author Gay Robertson, 2017.
Chapter 11 Business and Technology
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

Law Enforcement 2025? Kismet or Karma? Prepared by Commander Sid Heal, (Retired) Los Angeles Sheriff’s Department

Q & A GroupYou!GroupYou! A Glimpse of the Future Can Technology Make a Difference?

In a time of drastic change, it is the learners who inherit the future. The learned usually find themselves (well) equipped to live in a world that no longer exists. Eric Hoffer Eric Hoffer In a time of drastic change, it is the learners who inherit the future. The learned usually find themselves (well) equipped to live in a world that no longer exists. Eric Hoffer Eric Hoffer

What have we been missing? Law enforcement is not a monopolyLaw enforcement is not a monopoly  Increase in Private Security Private PatrolPrivate Patrol Private detention centersPrivate detention centers Nearly all crime is historically contextualNearly all crime is historically contextual  Carjackings, identity theft, cell phone cloning, Internet fraud  Is smoking gradually becoming illegal?  Is marijuana gradually becoming legal? Law enforcement is not a monopolyLaw enforcement is not a monopoly  Increase in Private Security Private PatrolPrivate Patrol Private detention centersPrivate detention centers Nearly all crime is historically contextualNearly all crime is historically contextual  Carjackings, identity theft, cell phone cloning, Internet fraud  Is smoking gradually becoming illegal?  Is marijuana gradually becoming legal?

Robberies

Property Crime Total Property Burglary Theft GTA

Societal Trends affecting Law Enforcement Cashless SocietyCashless Society Ubiquitous ConnectivityUbiquitous Connectivity Blurring of War and CrimeBlurring of War and Crime Transmutation of CultureTransmutation of Culture Cashless SocietyCashless Society Ubiquitous ConnectivityUbiquitous Connectivity Blurring of War and CrimeBlurring of War and Crime Transmutation of CultureTransmutation of Culture

Cashless Society Checks, ATM cards, credit cards, debit cards, internet shopping, electronic transfersChecks, ATM cards, credit cards, debit cards, internet shopping, electronic transfers Counterfeiting?Counterfeiting? Street robberies?Street robberies? Narco?Narco? Terrorism?Terrorism? Checks, ATM cards, credit cards, debit cards, internet shopping, electronic transfersChecks, ATM cards, credit cards, debit cards, internet shopping, electronic transfers Counterfeiting?Counterfeiting? Street robberies?Street robberies? Narco?Narco? Terrorism?Terrorism?

Ubiquitous Connectivity Cell phones, PDAs, digital pagers, laptop computers, palm computers, personal radios, Bluetooth headphones, wireless internet, VOIP, ad infinitumCell phones, PDAs, digital pagers, laptop computers, palm computers, personal radios, Bluetooth headphones, wireless internet, VOIP, ad infinitum Public service typically takes 48 months to embrace a new technology, as opposed to 18 months for personalPublic service typically takes 48 months to embrace a new technology, as opposed to 18 months for personal Increase in absentee ballotsIncrease in absentee ballots Semi-Autonomous, self-dispatched, self-organized responsesSemi-Autonomous, self-dispatched, self-organized responses Flattened hierarchyFlattened hierarchy  Incorporation of subject matter experts Cell phones, PDAs, digital pagers, laptop computers, palm computers, personal radios, Bluetooth headphones, wireless internet, VOIP, ad infinitumCell phones, PDAs, digital pagers, laptop computers, palm computers, personal radios, Bluetooth headphones, wireless internet, VOIP, ad infinitum Public service typically takes 48 months to embrace a new technology, as opposed to 18 months for personalPublic service typically takes 48 months to embrace a new technology, as opposed to 18 months for personal Increase in absentee ballotsIncrease in absentee ballots Semi-Autonomous, self-dispatched, self-organized responsesSemi-Autonomous, self-dispatched, self-organized responses Flattened hierarchyFlattened hierarchy  Incorporation of subject matter experts

Blurring of War and Crime Soldiers and Marines carrying pepper spray, TASERs, shields and batonsSoldiers and Marines carrying pepper spray, TASERs, shields and batons English “Bobbies” carrying submachine gunsEnglish “Bobbies” carrying submachine guns

Transmutation of Culture Religions, customs, behaviors, politics, traits, etc. from regions and countries to cyberspaceReligions, customs, behaviors, politics, traits, etc. from regions and countries to cyberspace  In cyberspace, everyone is contiguous! Hobby TribesHobby Tribes Unorthodox ideological inspirationUnorthodox ideological inspiration Religions, customs, behaviors, politics, traits, etc. from regions and countries to cyberspaceReligions, customs, behaviors, politics, traits, etc. from regions and countries to cyberspace  In cyberspace, everyone is contiguous! Hobby TribesHobby Tribes Unorthodox ideological inspirationUnorthodox ideological inspiration  From fanatical fans to irrational ideologues Migration of crimeMigration of crime  Fraud, identity theft, child pornography, trade secret theft Jurisdictional issuesJurisdictional issues

Five Technology Imperatives Technology development always follows the path of least resistanceTechnology development always follows the path of least resistance  Entrance is often in the form of toys (Four zones of privacy) Any technology always precipitates three concerns.Any technology always precipitates three concerns.  It creates new options—thus we are no longer confined by the conventional  it challenges assumptions—thus we confront the habitual  it blurs ethical guidelines—just because we can do something doesn’t necessarily mean we should In law enforcement capability always exceeds acceptabilityIn law enforcement capability always exceeds acceptability  For every gateway to the future stand a thousand guardians of the past Technology is always in a supporting roleTechnology is always in a supporting role Technology testing is always “in addition to” and not “instead of.”Technology testing is always “in addition to” and not “instead of.” Technology development always follows the path of least resistanceTechnology development always follows the path of least resistance  Entrance is often in the form of toys (Four zones of privacy) Any technology always precipitates three concerns.Any technology always precipitates three concerns.  It creates new options—thus we are no longer confined by the conventional  it challenges assumptions—thus we confront the habitual  it blurs ethical guidelines—just because we can do something doesn’t necessarily mean we should In law enforcement capability always exceeds acceptabilityIn law enforcement capability always exceeds acceptability  For every gateway to the future stand a thousand guardians of the past Technology is always in a supporting roleTechnology is always in a supporting role Technology testing is always “in addition to” and not “instead of.”Technology testing is always “in addition to” and not “instead of.”

Stages of Weapons Development Innovation — introduced and properly exploited provides substantial, sometimes decisive advantageInnovation — introduced and properly exploited provides substantial, sometimes decisive advantage Standardization — conventional tools and methods of “doing business” with established and accepted protocolsStandardization — conventional tools and methods of “doing business” with established and accepted protocols Ritualization — accepted without challenge and habitually employedRitualization — accepted without challenge and habitually employed Satirization — unrecognized obsolescence with unrelenting allegianceSatirization — unrecognized obsolescence with unrelenting allegiance Innovation — introduced and properly exploited provides substantial, sometimes decisive advantageInnovation — introduced and properly exploited provides substantial, sometimes decisive advantage Standardization — conventional tools and methods of “doing business” with established and accepted protocolsStandardization — conventional tools and methods of “doing business” with established and accepted protocols Ritualization — accepted without challenge and habitually employedRitualization — accepted without challenge and habitually employed Satirization — unrecognized obsolescence with unrelenting allegianceSatirization — unrecognized obsolescence with unrelenting allegiance

Technology “Bump” Time Effort Technology “Bump” Status Quo

The “Low Hanging Fruit” See-Through-The-Wall RadarSee-Through-The-Wall Radar Directed Energy Vehicle StopperDirected Energy Vehicle Stopper Launched Listening DeviceLaunched Listening Device Active Denial SystemActive Denial System Global Positioning SystemsGlobal Positioning Systems C4I—Command, Control, Communications, Computers & IntelligenceC4I—Command, Control, Communications, Computers & Intelligence See-Through-The-Wall RadarSee-Through-The-Wall Radar Directed Energy Vehicle StopperDirected Energy Vehicle Stopper Launched Listening DeviceLaunched Listening Device Active Denial SystemActive Denial System Global Positioning SystemsGlobal Positioning Systems C4I—Command, Control, Communications, Computers & IntelligenceC4I—Command, Control, Communications, Computers & Intelligence Magnetic Acoustic DeviceMagnetic Acoustic Device Gunfire Location SystemsGunfire Location Systems Automatic License Plate ReadersAutomatic License Plate Readers “Trap line” Camera System“Trap line” Camera System Unmanned Aerial VehiclesUnmanned Aerial Vehicles Community Communications NetworkCommunity Communications Network Cyber-Command PostCyber-Command Post Magnetic Acoustic DeviceMagnetic Acoustic Device Gunfire Location SystemsGunfire Location Systems Automatic License Plate ReadersAutomatic License Plate Readers “Trap line” Camera System“Trap line” Camera System Unmanned Aerial VehiclesUnmanned Aerial Vehicles Community Communications NetworkCommunity Communications Network Cyber-Command PostCyber-Command Post

So what are the Implications? Thanks to Commander Sid Heal (Ret.) Los Angeles Sheriff’s Dept.