>Users:   login   |  register       > email     > people    


Supervising the cyber-offender: Are you ready?
By Art Bowker, Cybercrime Specialist
Published: 11/26/2007

Yellowcomputer Computers are a legitimate tool for offenders trying to become productive members of society. However, technology’s use can dramatically increase the effects of criminal behavior and therefore poses a unique risk to the community. “Traditional offenders” have found the computer to be a highly effective tool in counterfeiting checks and currency that can be readily passed. Sex offenders, from the safety of their homes, can use a computer to anonymously “groom” numerous children simultaneously for later molestations or distribute their “collections” to hundreds of other offenders, or even to children, with the click of a mouse. Hackers can travel through cyberspace to other states or countries and harness the collective power of hundreds of computers to launch denial of service attacks that can cripple public and private computer networks. These examples demonstrate that probation, parole and pretrial officers must learn to manage the high risk cyber-offender.

Getting Started

Understanding today’s high tech terms is the first step. Frequently, when one considers the term “computer” a desktop or a laptop comes to mind. However, that is not sufficient because it doesn’t consider cell phones, personal digital assistants (PDAs), and all the devices that are on the horizon. A good working definition is found in 18 U.S.C. Section 1030 (e)(1). This federal statute reflects,
    “the term ‘computer’ means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device.”
This definition is consistently used in the Federal Criminal Code, including references in the child exploitation and pornography statutes. It incorporates not only computers but also such devices as cell phones, PDAs, gaming devices, and another other new devices not yet invented. Additionally, it includes any device that connects to the Internet. Many state statutes mirror this definition.

The next step, defining the high risk cyber-offender, is somewhat more elusive. Who are these offenders? Is it the delinquent who hacked into the Pentagon or is it the 55-year-old distributing child pornography via the Internet? What about the employee who used her boss’s password to gain entry to the payroll system and had additional checks issued to herself? Are these all high risk cyber-offenders? To find the answer, one needs to consider the following: the offense; the offender’s technical expertise; and past criminal conduct involving computers or similar offenses.

All offenses involving child exploitation should be considered a high risk. Additionally, computer hacking offenses, because of the potential impact they can have on our technologically dependent society, should also be considered for additional scrutiny. Basically any offense, if recommitted, that could cause a substantial harm to the community at large or would be violent in nature should be considered as high risk.

The next factor is determining offender’s technical expertise. The higher the expertise level, the greater likelihood they will be able to overcome the tools you have to manage their computer use or to commit the offense again. For instance, an employee who steals a password from their employer probably does not have the same technical ability of someone who could hack into the system from outside and steal the password.

One also should consider whether or not they have they committed a previous offense with a computer or an offense similar in nature. For instance, someone who counterfeits money on one occasion is a different risk compared to someone with repeat convictions for counterfeiting money and/or checks.

Once you have established that you have a high risk cyber-offender you must decide what tools to use to manage the risk. Are you going to seek conditions that limit or restrict their computer/Internet use? Will you be able to justify such restrictions based upon case law and the circumstances of the case?

If you can’t prohibit or restrict computer/Internet use, what then? How do you manage the risk? Many agencies are relying more and more on the ability to search offender’s computers and/or install monitoring software/hardware. As a result officers must be willing to learn more about the technology to better supervise these offenders.

Developing Skills

Several organizations provide such training opportunities for probation, parole, and pretrial officers. Notable examples are SEARCH: The National Consortium for Justice Information and Statistics and the National White Collar Crime Center. Additionally, the American Probation and Parole Association offers the course “Managing Sex Offenders’ Computer Use.” Joining a professional organization, such as the High Technology Crime Investigation Association provides training and valuable networking opportunities as well.

Finally, the United States Pretrial Services Agency for the Central District of California, in partnership with the Federal Probation & Pretrial Officers Association is holding the National Symposium on Cyber Crime, a three-and-half day program, February 11 to 14, 2008, which will expose officers to many of the skills they will need in managing the high risk cyber-offenders.

Summary

It is clear that technology has benefited society in so many ways. It is equally clear that offenders have found ways to use technology to the detriment of society. Probation, parole, and pretrial officers, like law enforcement previously, are learning that we must not let offenders go unchecked in this new arena of criminal behavior. Community supervision agency managers and administrators must be willing to support their staff in developing and learning these skills to be effective change agents in the future. Otherwise, offenders will continue to increase their technological edge, creating an unacceptable risk to our communities.

Art Bowker is a cyber crime specialist at the U.S. Pretrial and Probation Office, Ohio Northern. He also is First Vice President of High Technology Crime Investigation Association.

Related Resources:

Click here for more information on the National Symposium on Cyber Crime or contact Sr. USPSO Roger Pimentel at 213.894.8830.

Other articles by Bowker:


Comments:

  1. peterdoak21 on 01/15/2020:

    As much as the minicabit team love winning awards, the best prize for us is one of our customers enjoying a great cab deal from one of our Cab Operators.minibus hire crewe minibus hire blackpool minibus hire falkirk minibus hire glasgow minibus hire norwich

  2. YogTravel on 11/18/2019:

    Thanks for sharing such a informative post with in the great community you can find such information on Yoga community website too

  3. xnxxiraqsexy on 10/23/2019:

    xxnxمترجم , xxnx محارم , xxnxمحارم , xxnxوالد , xxnxولادي , xxnxولدعراقي , xxnx ولد عراقي , xxn عراقي ,


  4. Nancy phelma on 05/29/2019:

    This is certainly what's more a good report that i definitely enjoyed reading reviewing. It is actually no regularly that i contain the risk to discover a specific thing. Mens summer style

  5. Hoang Ha on 05/27/2019:

    Nếu như bạn đã than khảo qua bài viết Hatha Yoga thì chắc hẵn bạn cũng biết được rằng Hatha Yoga là loại hình Yoga nguyên thủy và cũng là nền tảng cho những loại hình Yoga hiện đại điển hình như loại hình như Kundalini, Vinyasa… Và hôm nay chúng ta sẽ được tiếp cận với một loại hình Yoga mới cũng dựa trên nền tảng Hatha Yoga, nhưng điểm đặc biệt của loại hình Yoga này là các động tác, tư thế sẽ được kết hợp với các dụng cụ Yoga như gạch tập Yoga, Thảm tập Yoga, Dây đai… Nào hãy cùng suckhoebabau.co tìm hiểu loại hình đầy thú vị này nhé: iyengar yoga là gì

  6. Nancy phelma on 05/26/2019:

    Rest room marketing techniques you pertinent query previous to building. Will probably be quick to write down remarkable write-up because of this. lifestyle

  7. Nancy phelma on 05/26/2019:

    This is certainly as well a really good posting we seriously experienced looking through. It is far from on a daily basis we have risk to check out a little something. lematelas-gonflable.fr

  8. piter85 on 04/03/2019:

    Pitot all kinds of sensor is used to measure the speed of the airplane. It is a differential Pressure Sensor . It measures the difference between a static port (not in the air stream) and a Pitot tube which is directly placed in the path of Nagano keiki Pressure sensor air flow.When the plane is stationary, the pressure in both the tubes is equal and abs speed sensor the air speed is zero. When the plane is moving, air enters the pitot mazda 6 suction control valve . This causes the pressure difference between the suction control valve and the pitot tube. An internal amplifier creates an amplified voltage output and hence the sensor can be connected directly to Speed Sensor and data acquisition systems. The output voltage changes with the difference in pressure between the two ports.VW & AUDI SERIES PEUGEOT & CITROEN SERIES RENAULT SERIES VOLVO SERIES

  9. Nancy phelma on 03/28/2019:

    These types of feels 100 % most effective. These minimal information and facts will be built coupled with numerous track record information and facts. I favor this significantly. Carpet Service

  10. Nancy phelma on 03/25/2019:

    Toronto Limo Service is a premium choice for your luxurious transportation needs for any event accross GTA. Our proficient staff and chauffeurs are committed to offer finest quality of transportation solutions Toronto Limo Service

  11. Nancy phelma on 03/25/2019:

    We take care of our limo vehicles like our own kids so that you always relish them rather than experiencing anything unpleasant or worrisome. Moreover, their tinted glass windows, privacy screens and rear seat amenities will give you additional peace of mind during your entire journey. Vaughan Limo

  12. Nancy phelma on 03/21/2019:

    This unique appears to be certainly superb. These types of really small truth is created utilizing wide selection associated with skills know-how. We prefer the concept a great deal. Tax Advice Brighton

  13. borg6018 on 11/23/2007:

    THEY CAN ALSO TYPE BETTER THAN I CAN!

  14. borg6018 on 11/23/2007:

    ST MY FACILITY WE TEACH INMATES HOW TO USE COMPUTERS MORE EFFECTIVLY DO IT IS A CONSTANT THREAT THAT THEY WLL GET OUTSIDE OUTR INTRANET AND DO MORE DAMAGE TO SOCIETY. MOST OF OUR INMATES ARE SEX OFFENDERS AND LOTS ARE WAY ABOVE AVERAGE IQ ALSO.


Login to let us know what you think

User Name:   

Password:       


Forgot password?





correctsource logo




Use of this web site constitutes acceptance of The Corrections Connection User Agreement
The Corrections Connection ©. Copyright 1996 - 2024 © . All Rights Reserved | 15 Mill Wharf Plaza Scituate Mass. 02066 (617) 471 4445 Fax: (617) 608 9015