Technology is commonly accused of facilitating criminality, through providing thieves with effective, instant, ubiquitous and inexpensive ways to communicate and organize their criminal missions. This is for example the case with mobile phones and social media, which are increasingly used by terrorists, criminals and thieves. At the same time, the evolution of IT provides new ways for conducting crime, including cybercrime. For example, the declining costs of computation and storage, along with BigData analytics technologies ease processes such as profiling, identity theft and privacy violations for malicious purposes.
Nevertheless, a coin has always two sides. Much as IT technology can boost crime, it can also be used to prevent theft and to support arrest and prosecution of criminals. In particular, novel IT technologies provide enhanced surveillance capabilities, while forensics ease the collection of crime-related evidence and their presentation in court. Hence, law enforcement agencies are offered with opportunities to integrate novel technologies in their operations, as a means to improving their productivity, increasing arrest rates and in general to do more in less time and lower costs. In following paragraphs we illustrate practical examples of IT technologies that are already reducing criminality.
A wide range of surveillance technologies are currently deployed not only by law enforcement agencies, but also by citizens themselves. Prominent examples include:
Apart from surveillance technologies, there are also anti-theft systems and devices, which either prevent theft or augment the work of law enforcement agencies after theft. Furthermore, conventional IT devices can be deployed in security-aware processes in order to prevent theft. Some examples follow:
The above list of anti-theft technologies is by no means exhaustive, yet it is indicative of how IT improves the operational efficiency of the police and the ability of the citizens to protect themselves. Additional efficiencies can also be achieved from the integration of these technologies with devices (e.g., the smartphones and tablets of the property owners) and criminal analysis techniques (e.g., the use of DNA databanks for identifying suspects based on biological evidence). Furthermore, some of the listed technologies can be integrated, such as most of the video analytics and intelligence surveillance technologies. For example, picture taking systems can be combined with GPS technology and text notifications in order to alert police officers in a timely way, but also in order to provide them with enough context about the theft.
In most cases the efficiency of law enforcement agencies depends on the way they integrate these tools and technologies in their processes. This is for example the case with forensics processes in which investigators need to undertake specific steps in order to ensure that digitally captured information can be presented in court. Forensics processes are typically supported by specialized technologies and equipment such as magnifying glasses and tamper-evident bags.
Another technology-related process for catching thieves relates to the use of “bait devices” i.e. devices that are left alone, yet monitored by the police or their owners. This process facilitates catching thieves in the act i.e. the moment they try to steal tablets, cellphones and other gadgets that they consider unattended. In this way, both arrests and convictions are made easier.
While technologies open up a broad range of capabilities for arresting and convicting criminals, their integration, operation and use remains challenging. In particular, several of the listed technologies (e.g., most of the surveillance technologies) raise privacy concerns. In some countries (e.g., notably in Europe), Data Protection Authorities (DPAs) would not allow citizens and businesses to deploy such surveillance systems in a retail setting so as to protect citizens’ privacy. Law enforcement agencies face less barriers, yet they also need to get approval for deploying surveillance systems in public spaces, whilst committing that they will not abuse them.
Apart from privacy concerns, deployers of the presented technologies need to consider an effective integration of these systems within their processes. In most cases effectiveness does not stem from the technology per se, but from the way technological capabilities are integrated in patrolling and surveillance processes.
Much as it helps thieves to conduct crimes, modern ICT technologies are also facilitating arrests and convictions. The overall balance bends probably towards the side of preventing than encouraging theft. With the advent of intelligent technologies (such as advanced analytics and artificial intelligence) crime in the developed world will be certainly reduced. However, the implications of novel technologies on peoples’ privacy in the long term remains to be seen. In this respect, IT companies are provided with a wealth of opportunities for innovating, through developing intelligent and privacy-friendly anti-crime products and services that are useful to law enforcement agencies as well as appealing to citizens.
DDoS (Distributed-Denial-of-Service) Attacks and their different types explained
Advantages of Data Tokenization for enterprises
The benefits of cybersecurity mesh for distributed enterprises
The Rising Cybersecurity Threats CIOs cannot afford to ignore
Six Factors Affecting Security and Risk Management in the Post COVID Era
Cloud Continuum: From Cloud to IoT to Edge Computing
Guidelines for calculating the ROI of your IT projects
Applied Observability – Deriving business insights from observability intelligence
Leveraging 5G technology for optimum business growth
We're here to help!
No obligation quotes in 48 hours. Teams setup within 2 weeks.
If you are a Service Provider looking to register, please fill out this Information Request and someone will get in touch.
Outsource with Confidence to high quality Service Providers.
If you are a Service Provider looking to register, please fill out
this Information Request and someone will get in
Enter your email id and we'll send a link to reset your password to the address
we have for your account.
The IT Exchange service provider network is exclusive and by-invite. There is
no cost to get on-board;
if you are competent in your areas of focus, then you are welcome. As a part of this exclusive