Goat


REPLY TO ALL 250 WORD

 

1)

Biometrics is using “unique physical characteristics, such as fingerprints, that can be used for automated recognition (DHS, 2023).”Biometrics are used in different areas of the criminal justice field. One-way biometrics are used is to help identify illegal immigrants from entering the United States (DHS, 2023). The Department of Homeland Security maintains the largest repository in the United States (DHS, 2023).

What is your opinion of our reliance on fingerprints for the identification of suspects in crimes?
I think fingerprint is a good resource for the criminal justice system use. I do think the benefits out weight the drawbacks of using biometrics. Using biometrics can help identify fingerprints, that are found at crime scenes. Fingerprints that are collected at crime scenes can be used to see if the offender’s prints are in the system. If the offender’s prints are in the system, then they can locate the individual. Fingerprints are also used in trials to verify that the person was at the crime scene.

There are some drawbacks to using biometrics as well. The technology needed to scan fingerprints can be costly for departments that cannot afford it. Fingerprints are on everything we touch and sometimes we do not realize that our prints are lifted and used illegally.

One case that I know about that was convicted because of fingerprints is the case of Angel Bumpass. In 2009 an individual was murdered. Angel Bumpass was thirteen at the time of the crime. Her fingerprints were found on the inside of a piece of duct tape. The other individual that was on trial with her was not found guilty. The fingerprints sealed the deal of her being found guilty even though she was only thirteen. She was tried as an adult at the age of twenty-four. She has now been granted a new trial in the case. (Kalmbacher, 2022)

How about their use for authentication?
I do think the use of authentication is good. Fingerprints are like your DNA; they are different for everyone.

In the era of terrorism, we are becoming more reliant on bio-metric technologies to both identify people and prosecute them for crimes. What are the limits of this technology and how should we proceed?
Just like anything else as technology advances to help us with fighting crime, it also advances criminals using technology to commit crimes. However, I do believe that these useful biometric tools are good to help fight terrorism. As well as fingerprints, biometrics can use personal traits to help identify a person. These can include “faces, voices, and signatures (Woodward, 2001)”. We must continue to use these advances in technology to help fight the crime.

2)

A security breach that I have experienced is when someone hacked into my home internet system. I have four kids and I myself like to play video games. When playing video games I am connected to the internet and play with other people around the world. In one instance someone sent me a message that I did not know. I opened the message and the person was able to hack into my home internet. I did not know it at the time. When I came home the next day and tried to get on the internet, the internet wasn’t working. I had to call my internet provider. The owner of my internet provider (we live in a very small town and have a local internet provider) called me and told me they had to cut my internet off because it was hacked and it was clogging up the line to all the other users that are connected to me. They reinstated my internet and I now have settings on all of our devices that we cannot see messages on our Xboxes from individuals that we do not know.

I knew that someone could hack into your internet router, however, I did not realize that all I needed to do was open their message on my Xbox. This brought to light how hackers are becoming more advanced. I have explained to my kids the importance of not opening things on their phones or Xboxes so that they are unsure where they are coming from. While this instance did not cause a lot of damage (no one retrieved any personal information), it is still a scary thought. I am glad that I have a small-town internet provider who was watching and shutting the internet down before any real damage was done to myself or to anyone else.

My internet provider also changed our security password.

The following are items that are recommended in the event that you have a security breach:

  • Change your passwords.
  • If the breach involves your financial information, you should notify any financial companies that might be affected
  • Monitor your accounts to make sure you do not have an activity that isn’t yours.
  • Do not respond to requests unless you know without a doubt they came from the company. If you are not sure, look up the company’s information and call their direct number to verify.
  • Be on guard about future attacks. Do not think that it is one-and-done. They might try to attack you again if they were successful the first time. (Kaspersky, 2023)

The following are items that you can do to help prevent a security breach:

  • Use strong and unique passwords. Do not use things that are easy to guess.
  • Do not use the same password on every account. I know this one is hard for me, especially with four kids and each of them having their own devices.
  • If you are not using an account, close it. Do not leave it to sit open. You will not be monitoring it as closely as you are the others and it makes it more vulnerable. (Kaspersky, 2023)

3)

When my youngest one was 1 year old, he bought a digital video game, which cost over $100, on the PlayStation 4 that my husband saved his debit card information without securing password requirement when purchasing games or items. Luckily, I found out right away when I checked the back account because I received a bank’s notification of transaction, so I told my husband and called the customer service at the PS4 to cancel the transaction. Also, we had to call the bank to cancel the transaction, as well. Since then, my husband and I put password requirement whenever we are purchasing items or using debit card on smart devices. My email account is connected to my kids’ tablets, computers and X-Box so I had to set all the payment with requiring password or pin when purchasing or using the debit card.

I believe the failure of setting password requirement on payment method was unintentional because my husband and I forgot to be more secure of our debit card or credit card on smart devices. If we never knew of the situation and never changed the setting status of requiring password to debit card, bank information or credit card, anyone could use the debit card or credit card without putting password in it, or could access to my bank account without notice it.