Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet210/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   206   207   208   209   210   211   212   213   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

205
 
LEA usage scenarios for social media
provided where the use and understanding of social media may benefit LEAs. These 
include that of a lone-wolf attacker, a hostage situation, the detection of organized 
crime, a crowd-sourcing application and the trafficking of human beings.
In recent years, an increasing number of police arrests have arisen in response 
to threats made online in relation to shootings, bombings and other criminal activi-
ties. In instances such as those at Skyline High school in Sammamish, Washington 
in 2012 (
Seattle Times, 2012
), Pitman High School, New Jersey on January 6, 2014 
(
Polhamous, 2014
), and the case of Terri Pitman, in Council Pitt, Iowa in 2013; 
a mother who threatened to shoot up her sons bullying classmates on Facebook 
(
Gillam, 2013
), local police were made aware of social media postings threatening 
to commit shootings at the respective locations via tip-offs from online observers. In 
all three of the cases identified police were able to evacuate and search the premises 
prior to the materialization of any threat. However, in all the cases cited police were 
reliant on the reports of independent observers such as classmates, parents and other 
onlookers for awareness of the emergent situation.
A brief search online uncovers a number of incidents, not only isolated to school 
shooting threats, whereby bombing, shooting, and perpetrators of other criminal ac-
tivity were charged with intent to commit crimes due to posts made using social 
media sites such as Twitter, Facebook and Tumblr. In comparing modern scenario's 
such as those identified previously, with scenarios from just ten to fifteen years ago 
such as the Columbine school shootings in Jefferson, Colorado it is clear that the 
emergence and ubiquitous use of technologies including mobile communications 
and social media has resulted in a cultural shift, forging a new environment that 
necessitates an evolution in the policing mechanisms required to respond to threats 
such as these effectively.
To access and detect this information LEAs must monitor social media intelli-
gently. Social network analysis can be used to identify criminal networks, and match 
profiles across social media platforms and closed police records further assisted by 
technologies such as facial recognition to build up a complete, integrated picture of 
the criminal entities, their online profiles, and networks as shown by the model in 
LEA usage scenarios for social media.
As well as textual content posted on social media; pictures and videos, such as 
those captured by services like Instagram, Flickr and Twitter also provide a poten-
tially useful resource. These images regularly come attached with textual meta-data, 
such as “hashtags” and content descriptions, as well as comments and feedback from 
other users of the platform that describes the media content in question. Searching 
through these images manually, one by one is impossible due to the sheer amount of 
content present on the platforms. Since tagging and geo-tagging are common-place, 
data mining and analytical processing can be used to speed up and automate the 
extraction of information. Text mining techniques can also extract further metadata 
such as names, places, or actions related to criminal activities.
Data mining and analysis techniques can be applied in a variety of ways in order to 
improve the quality of information available to police investigations. Technologies such 
as the use of artificial neural networks for the extraction of entities from police narrative



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   206   207   208   209   210   211   212   213   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish