Technology Boston Bombings
The Use of Technology in the Boston Bombings Investigations
The Boston Marathon bombing incident was an act of terror that took place on April 15th, 2013 during the annual Boston Marathon. During the event, bombs were positioned in proximity to the race's finish line. The bombs killed two individuals and injured over two hundred fifty others would where close by. Dzhokhar Tsarnaev and Tamerlan Tsarnaev were the primary suspects in the case that were identified by the Federal Bureau of Investigations (FBI). A day after the bombings a massive manhunt ensued to find the individuals. However, one of the interesting aspects about the case is how the FBI was able to identify the suspects. An unprecedented amount of digital data was available for use and the FBI and other organizations utilized crowdsourcing techniques to help funnel through the data.
The advent of digital technologies coupled with the falling costs of storage capabilities has led to a situation in which massive amounts of digital data can be generated at any given time. The power of crowds can be harnessed to help sift through troves of data to work towards a common objective. Crowdsourcing has been used in a wide array of different situations to complete many unrelated tasks that require more human resources than any one person, or even one team, could provide. For instance, a crowd can provide enough manpower to accomplish a goal in hours that an individual could not complete in many years. The work is divided up and if enough people are involved then the total contribution can reach staggering proportions. This analysis will consider all of the available technologies and opportunities that the FBI had at their disposal during the Boston Bombing and discuss how these technologies were used to apprehend the suspects and what ethical and legal implications may be relevant to this case.
Closed Circuit Television
Boston had a network of closed circuit surveillance cameras in place during the Boston Bombings. The camera network was able to capture images of the suspects that were described as "grainy" or being of a low resolution. Many major U.S. cities have implemented surveillance technologies to help patrol urban areas. These cameras increase the likelihood that a suspect will be caught on camera, however, at the same time, these technologies can create a massive amount of footage that is so enormous that it can be of little use. However, new advancements in facial recognition software and other technologies are increasing the ability for law enforcement officers to make more efficient use of the data being collected (Kelly, 2013 ).
Figure 1 - CCTV Footage of the Suspects (Kelly, 2013 )
Although the use of new technologies may be promising for law enforcement, it also creates a wide range of privacy concerns. The debate between national security and individual liberties, especially privacy, has reached new proportions as technology has increased the ability for the state to create mass surveillance programs. Terrorist events such as those that occurred on September 11th, 2001, have increase the government's use of different surveillance and monitoring activities through the Patriot Act and other legislations. After the tragedy that occurred on 9/11, the balance between privacy, individual liberties, and security was definitely tilted towards security.
The arguments in defense of curtailing various certain civil liberties were made in order try to prevent future acts of terrorism in the U.S. Although many countries took similar actions; most were not as comprehensive as some of the policies that the U.S. implemented. Edward Snowden, who worked for the National Security Agency through subcontractor Booz Allen in the NSA's Oahu office, alerted the world to the extent of the surveillance measures being conducted in the U.S. After Snowden fled to Hong Kong, China, newspapers began printing the documents that he had leaked to them, many of them detailing invasive spying practices against American citizens (Bio, 2014). Snowden was quoted as stating that his motivation stemmed from the following statement:
"I don't want to live in a society that does these sort of things ... I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under."
Snowden's, and others, leaks about the level of surveillance being conducted on the internet and through all communication mediums, coupled with the fact that CCTV cameras are now being used with facial recognition has sparked a national debate about the balance between privacy and security. Technology has allowed society to...
Incident Response to the 2013 Boston Marathon Bombings Although named for its venue, the Boston Marathon is sponsored by a number of different cities in the greater Boston area and is held annually on Patriot’s Day which is the third Monday in April (About the Boston Marathon, 2018). First run as an all-male event in 1897, the Boston Marathon has since become an international event that draws both male and female
Established in 1897 and traditionally held on Patriots’ Day, the third Monday in April, the Boston Marathon is the oldest and one of the most popular annual marathon events in the world today. The annual celebration of the Boston Marathon was disrupted on April 15, 2013, though, when two lone wolf terrorists, Chechen Kyrgyzstani-American brothers, Tamerlan Tsarnaev and Dzhokhar Tsarnaev, detonated two homemade bombs which killed three people and injured
Warrantless Use of GPS The Problem of Warrantless GPS Surveillance: Ethical Considerations Regarding Privacy and the Fourth Amendment The Fourth Amendment protects citizens from unlawful search and seizure by granting them the right "to be secure in their persons, houses, papers, and effects" (U.S. Const. Amend IV). As the case of Burdeau v. McDowell (1921) showed, this Amendment has been interpreted as a protection of individuals from government intrusion. However, with the
Social Media and Law Enforcement Social Media Issues in law Enforcement Social media and law enforcement: Boon or bane? Social media is a fact of everyday modern life. For law enforcement personnel, it has created new opportunities to share resources with the public, including as 'tweeting' information about a possible suspect or releasing safety information to the public about terrorist incidents or natural disasters. At first, in the Internet age, police departments were
Terrorism Annotated Bibliography Gardner, K.L. (2007). Fighting terrorism the FATF way. Global Governance: a Review of Multilateralism and International Organizations. (13:3). 325-45. FATF, or Financial Task Force, is considered a successful organization in terms of investigating how global terrorism is funded. Without financial backing, the complexities required that go into terrorism attacks would not be possible. Kathryn Gardner argues that other aspects of investigation into potential terrorist organization could benefit from
data collection includes survey form, structured interviews using closed ended questions, and gathering information regarding a sample size appropriate to analyze and draw conclusion on the basis of the research results. The statistical techniques are used for data analysis to analyze collected data in quantitative research methods. The qualitative data is gathered through case study method and open ended question of an unstructured interview from notable sample. The qualitative
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now