Mobile Technology & Law Enforcement

Technology connects people and accomplishes tasks in powerfully efficient and innovative ways.  Mobile technologies magnify these capabilities, allowing access almost anywhere at any time. However, mobile technology’s efficiency and innovation carries both positive and negative outcomes. Law enforcement must stay abreast of both the advantages and risks of connected technologies in order to properly fulfill its role. And, it’s important for parents to also be aware these capabilities so they can help detect incidents and prevent them from happening.

Some risks of mobile technology include:

  • Mobile devices facilitate the taking and sending of inappropriate images.
  • Sexting—the deliberate sending of texts of a sexual nature.  Depending on the age of the participants, this activity could be harassing or illegal.
  • Textual harassment—the repeated texting of a victim. Textual harassment can be a form of stalking.
  • Mobile devices undermine safety while driving.  Some uses while driving (texting, reading a computer screen, or calling) are banned in parts of the United States.
  • Anonymous pre-paid phones allow for a variety of illegal activities.
  • In the classroom, mobile devices can facilitate cheating.
  • Mobile technologies can be used to infringe on international copyright laws and to conduct improper research.
  • The disposal of old mobile devices is problematic. The data contained on the devices is often recoverable and may contain inappropriate or illegal images, or may contain personal information leading to identity fraud or harassment.

The risks of mobile technology increase when users feel anonymous.  Such anonymity is a myth because all technology is trackable to some degree. However, in the world of virtual online platforms, consequences are minimized and sometimes irrelevant. Education is a necessary tool in encouraging users to apply good judgment and maintain connection to real life.

Law enforcement can actually use connected technology for solving crime. For example, mobile forensics—the science of recovering digital and physical information from mobile technologies—can play an important role for law enforcement. In one U.S. study, 81 percent of law enforcement surveyed believed that cell phones were involved in 76 to 100 percent of violent crimes1.  Because cell phones were involved, fingerprints, DNA, and digital data were recoverable from mobile technologies for use in investigations and solving crime.

Advances in mobile technology are endless.  Technologies converge and each new device is positioned to contain all of the advantages of the previous technology combined.  When law enforcement and parents combine to inform fellow citizens of the benefits and risks of this media convergence, they can build a community which advances the convenience and innovation of mobile technology in an ethical, resilient, responsible manner.


References:
1. Losavioa, M., Wilsona, D., & Elmaghraby, A. (2006). Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular Telephone Consumer and Small-Scale Digital Devices. Journal of Digital Forensic Practice, Vol 1, Issue 4, 291-296.

INTERNET SAFETY TIPS

Online Shopping & Banking
10 Tips to Safer Shopping
Avoiding Internet Crooks
Bank Online Safely
Benefits of E-books
Identity Theft Rights
Identity Theft Tax Scams
Online Auction Sites
Online Classifieds - Buying
Online Classifieds - Selling
Secure Social Engineering
Digital Family Life
Addictions and ADHD
Betrayal Online
Child Online Privacy
Children & Anorexia
Children & Inappropriate YouTube Videos
Children and Internet Advertising
Children's Photos Online
Cyberbullying Tips
Dating Online Safely
Digital Dating
Digital Literacy
Family Time
Healthy Digital Family Life
High Risk Behaviors
Impact On Children
Internet Gambling
Internet Pornography
Kids & Online Gaming
Kids Posting on YouTube
Kids’ Mobile Apps
Make Money Websites
Online Gaming & Children
Online Quizzes & Surveys
Oversharing Information Online
Protecting from Predators
Read the Fine Print
Respect Online
Risky Behavior
Safe Online Photo Sharing
Safety & Social Networks
Social Networking and Friction
Teaching Privacy
Teen Asking for Validation?
Too Much Time Online
Video Games
PC Security
Argument with a troll
Block Pornography
Bots, Botnets And Zombies
Coupon Safety
Safe Linking & Attachments
Safe URLs
Search & Collected Info
Search vs Research
Secure Websites
What is Antivirus?
What is Phishing?
Getting Started
Beginners Tips
Email Hacking
Identify Theft
Malicious Software
Organize Net News
Sending Email
Strong Passwords
Technology Overload
Cyberbullying & Online Predators
Bullying
Cyberbullied
Cyberbullying Help
Cyberincident Response
Family Blogging
Harassed Online
Online Predators
Online Safety
Recognize a Cyberbully
Report Cyberbullying to Police
Report Cyberbullying to Schools
Safety: Pornography
Mobile Security
Cell Phone & Driving
Cell Phone Theft
Mobile Law Enforcement
Mobile Protection
Mobile Sexting
Parents & Cell Phones
Sexting
Tweets Archived
Ethics & Legal
Cheating & Technology
Cite Sources and Avoid Plagiarism
Download Music & Videos
Ethics
Facebook Passwords
Internet Addiction
Internet Content Copyrights
Kids & Impersonation
Netiquette
Online Impersonation
Societal Digital Piracy Costs
Managing your Online Reputation
Online Reputation
Protect Your Online Content
Protecting Privacy on Google
Teens & Reputation