The Digital Footprints, the Criminals with NO Place to Hide

Nobody can hide her/his tracks, in the high-tech age here, written by the professor of South Caroline University, off of the Front Page Sections, translated…

An American teenager took the gun his father bought at the Thanksgiving sale to school and went on a shooting rampage, causing four fatalities, seven injuries; the legislator, Kao found of being abused and controlled by her boyfriend, and there were, four more victims found; the net armies are rash and spread the rumors online, trying, to sway the public.  So, what do these three stories, that are, totally different have, in common?

Answer: they’d become, the examples I use to teach from current events in class today.  There’s a computer crimes forensic course offered this semester, and today’s theme was the case studies, and all of these cases, are perfect, in the discussion of how digital evidence is used, in the investigations of crimes, and utilized as the facts in the cases going to trial.

The advancements in technologies are coming every single day, their applications, already, rooted, into our, everyday, lives now, whether it be connecting with friends and families, shopping commuting, leisure and fun, we are leaving, our, digital footprints behind.  Same as the criminals too, which made the studies in digital forensic as, a primary field of study in the criminology forensic investigation department.

inerasable are these, digital, footprints of, ours, photo from online

查看來源圖片

The American teen posted a picture of his father’s gun on his Instagram account, called it his new toy, that anyone with a question for him, feel free to leave a message; the police also found the carefully detailed plan of the youth’s bringing his gun to school to go on a shooting rampage, although he’d not posted that on social media yet, and the motives of what he was to do wasn’t cleared yet, all of these digital footprints became solid evidences of his premeditating murder, which also made the police to decide to charge him as an adult.

During the time when Kao was being abused by her boyfriend, she’d wanted to charge her cell phone, and she’d, found the “recovery data file” gadget that would, save the files of the cellphone into the cell chargers on its own, and found the photos of four other females posing nude; and although, there’s the password function on this backup drive, but her boyfriend clearly, overlooked the importance of the function of this, that’s caused him to get busted.

And the net armies mistakenly believed, that they can spread the rumors anonymously, using the anonymous account names, without knowing, that as they’d logged in using their account names, their IP locations are, registered, which can get traced back to them.

And, all of these cases exemplifies the fact, that “everything leaves a trace”, even in the digital age too.  The criminals search records and the cell phones, the other high-tech devices they’re using, are exposing their activities, which expedited the paces of the investigation, and how quickly the charges will be, pressed; and because there’s the inerasable quality of digital data, it can keep the records of one’s crimes from the younger years through the individuals’ entire lives.  This is why we’re, pushing forth the digital forensic courses, hoping that more would know the powers of the digital footprints, that before these criminals do something bad, they will, think before they act, to NOT make the mistakes that they will be paying for, for the, rest of, their, lives!

And so, due to how we’re all, tracked down, and nobody can not use their cell phones for a minute in her/his life, we’d grown, reliant, on these, high-tech devices, they’d become, something we can’t do without in life, that’s why, it’s that easy, for the systems to, track us, and, this would be considered as an invasion of people’s privacy of sorts, sure, but it’s, utilized as crime prevention, and evidence, in case a crime had, occurred.

Leave a comment

Filed under "Professional" Opinions, Awareness, Crime & Punishment, Perspectives, Policing the Internet, Properties of Life, Utilizing the Internet

Say What You Want to...

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.