What concerns must be factored in if utilizing open source

Assignment Help Other Subject
Reference no: EM132272772

Post 1

1. What value does Open Source information have for law enforcement intelligence?

In today's information age, open source information is extremely valuable to law enforcement today. The modernization of technology is accelerating at a fast pace. In the very near future, almost everything that someone says or does will be recorded in some way or another.

The way open source information is used today has already shown a great potential in solving past crimes, addressing current crimes, and predicting crimes of the future. According to Friedman (1998), there are several categories of open source information, and some of the major sources are the media, databases, and everyone's favorite, the internet.

The reason why it is extremely valuable in law enforcement is because open source information is a repository of information. Some examples of open source information are DNA repositories, social media posts, photos with geotags, and statistical information. Just from the four examples mentioned, one can see the relevance to law enforcement.

DNA databases can be used to link DNA evidence; statistical information can be used to develop crime maps, and help in predictive policing (Joh, 2014). Not so smart felons can leave geotags on photos or have Instagram photos that show their whereabouts.

2. Provide two examples of Open Sources that can be beneficial to law enforcement and explain what those benefits are.

Something that comes quickly to mind is that open source information can be used to develop a pattern of life of an area. Using information gained from public databases, law enforcement officials can identify where the next crime might occur. Another way to use open source information is to monitor social media. Social media posts can indicate where protests will occur, or even where a crime is occurring.

Recently, a mass shooting in New Zealand was live-streamed on social media. There are some things that law enforcement can learn from that video in terms of the attacker's timeline and tactics he employed. Joh (2014) posits that open source information from the internet can be used in mass surveillance, and in predictive policing.

3. What concerns must be factored in if utilizing Open Source information?

The top concern with open source information is the validity of it. Additionally, is the information from a reputable source? How old is the information?

The validity of the information critical especially with the internet; there is a lot of junk information on the web that must be disregarded by intelligence experts. Something else to also consider is that open source information can also be used by criminals. For example, criminals can observe the actions of a police force if the media is doing a live-broadcast of a crime in progress.

4. Can police lawfully use insincere or fraudulent means to access social media information? (LinkedIn, Facebook, Twitter, Pinterest...)

As stated earlier, agencies can gather open source information from mass surveillance. One of the methods of surveillance that the government is pursuing is monitoring social networking sites.

Monitoring social media can be an effective tactic to employ. However, there are some settings that are put into place where officials have to get really creative. According to Seo (2014), officials can lawfully use tactics, such as posing as another person or viewing a person's profile by using another profile. It is not an invasion of privacy. It has been upheld in court.

Additionally, the FBI indicates that once a person posts something on social media, it is no longer private. It becomes public information (Seo, 2014). It will be interesting to see if the limits of privacy change within the next few years because of modernization.

Post 2

1. What value does Open Source information have for law enforcement intelligence?

Open source intelligence (OSINT) plays a vital role in contemporary policing. OSINT has been around for many decades and has been utilized by military and federal agencies (Friedman, 1998).

The information that is gleaned from this process is derived from public sources such as the internet, social media accounts (Facebook, Twitter, etc.), and any other public records. The information must be derived legally and ethically by law enforcement agencies.

The modern era has actually enabled law enforcement by providing very useful and sometimes incriminating information right on public internet sites (social media). However, care must be taken into consideration as to the validity of the sourced information.

2. Provide two examples of Open Sources that can be beneficial to law enforcement and explain what those benefits are.

There are many open sources in which can be accessed by law enforcement to gain information from. Many law enforcement and federal agencies look to the internet for a footprint that may have been left behind to gain any intelligence. Of course, social media has become the go to choice.

The two examples I will provide are You Tube and Instagram. Both of these sites are very popular and used by millions of people across the globe.

This could instantly provide law enforcement agencies the ability process any digital footprints left behind by any suspect. Many criminals have left incriminating evidence on social media accounts that are often made public by the user themselves. Social media has caused an epic rise in internet crime over the last decade for sure.

3. What concerns must be factored in if utilizing Open Source information?

The most glaring problem with open source information is the reliability factor. Of course, it must pass the common sense test and otherwise be vetted for legitimacy before any action can be taken against someone.

We have all seen hoaxes play out in the media or the law enforcement agencies have been too quick to act and often pursue a bad lead. The bottom line is that all information must be vetted for accuracy and reliability.

There have been too many instances of erroneous information that gets processed as credible and it puts law enforcement agencies in a compromising position.

4. Can police lawfully use insincere or fraudulent means to access social media information? (LinkedIn, Facebook, Twitter, Pinterest...)

There have been many cases of law enforcement agencies using the information gleaned illegally. Of course, the law works in mysterious ways and many criminals have been prosecuted from information obtained illegally from their accounts. So, yes the local and federal law enforcement agencies can have access to your data if there is reasonable cause.

However, there is most definitely the question of illegal search and seizure actions that may have taken place to get the social media account information. In the end, if it takes another pedophile off the street, then I'm all for it.

Reference no: EM132272772

Questions Cloud

Programming and defensive programming using raptor : Input a number entered by the user and display positive if it is greater than zero,negative if less than zero and zero if it is equal to zero.
Explain the role and function of the agency : Identify at least two significant regulations enforced by each agency relevant to Solar Co.'s business (totaling eight regulations).
Discuss at least five major changes the internet : Do you think the internet services in the U.S. has had major changes in the last decade? Why or why not?
Summarize the major reasons why businesses : 1) Summarize the major reasons why businesses are partnering with third-party data centers?
What concerns must be factored in if utilizing open source : Provide two examples of Open Sources that can be beneficial to law enforcement and exp
Discuss what wireless technologies you have used : Discuss what wireless technologies you have used. Do you have wireless networks at home? If so, what standards does it use?
Role in preventing cryptanalysis attacks against a network : Discuss how physical security can play a role in preventing cryptanalysis attacks against a network.
Discussion of advanced storage solutions : Discussion of advanced storage solutions: How have storage needs changed in recent years, and what are forecasts for the near future?
Explain the intelligence cycle as it is applicable : The intelligence cycle is defined as the process through which information in its raw form is transformed into a more valuable and finished.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd