Technology Boston Bombings
The Use of Technology in the Boston Bombings Investigations
The Boston Marathon bombing incident was an act of terror that took place on April 15th, 2013 during the annual Boston Marathon. During the event, bombs were positioned in proximity to the race's finish line. The bombs killed two individuals and injured over two hundred fifty others would where close by. Dzhokhar Tsarnaev and Tamerlan Tsarnaev were the primary suspects in the case that were identified by the Federal Bureau of Investigations (FBI). A day after the bombings a massive manhunt ensued to find the individuals. However, one of the interesting aspects about the case is how the FBI was able to identify the suspects. An unprecedented amount of digital data was available for use and the FBI and other organizations utilized crowdsourcing techniques to help funnel through the data.
The advent of digital technologies coupled with the falling costs of storage capabilities has led to a situation in which massive amounts of digital data can be generated at any given time. The power of crowds can be harnessed to help sift through troves of data to work towards a common objective. Crowdsourcing has been used in a wide array of different situations to complete many unrelated tasks that require more human resources than any one person, or even one team, could provide. For instance, a crowd can provide enough manpower to accomplish a goal in hours that an individual could not complete in many years. The work is divided up and if enough people are involved then the total contribution can reach staggering proportions. This analysis will consider all of the available technologies and opportunities that the FBI had at their disposal during the Boston Bombing and discuss how these technologies were used to apprehend the suspects and what ethical and legal implications may be relevant to this case.
Closed Circuit Television
Boston had a network of closed circuit surveillance cameras in place during the Boston Bombings. The camera network was able to capture images of the suspects that were described as "grainy" or being of a low resolution. Many major U.S. cities have implemented surveillance technologies to help patrol urban areas. These cameras increase the likelihood that a suspect will be caught on camera, however, at the same time, these technologies can create a massive amount of footage that is so enormous that it can be of little use. However, new advancements in facial recognition software and other technologies are increasing the ability for law enforcement officers to make more efficient use of the data being collected (Kelly, 2013 ).
Figure 1 - CCTV Footage of the Suspects (Kelly, 2013 )
Although the use of new technologies may be promising for law enforcement, it also creates a wide range of privacy concerns. The debate between national security and individual liberties, especially privacy, has reached new proportions as technology has increased the ability for the state to create mass surveillance programs. Terrorist events such as those that occurred on September 11th, 2001, have increase the government's use of different surveillance and monitoring activities through the Patriot Act and other legislations. After the tragedy that occurred on 9/11, the balance between privacy, individual liberties, and security was definitely tilted towards security.
The arguments in defense of curtailing various certain civil liberties were made in order try to prevent future acts of terrorism in the U.S. Although many countries took similar actions; most were not as comprehensive as some of the policies that the U.S. implemented. Edward Snowden, who worked for the National Security Agency through subcontractor Booz Allen in the NSA's Oahu office, alerted the world to the extent of the surveillance measures being conducted in the U.S. After Snowden fled to Hong Kong, China, newspapers began printing the documents that he had leaked to them, many of them detailing invasive spying practices against American citizens (Bio, 2014). Snowden was quoted as stating that his motivation stemmed from the following statement:
"I don't want to live in a society that does these sort of things ... I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under."
Snowden's, and others, leaks about the level of surveillance being conducted on the internet and through all communication mediums, coupled with the fact that CCTV cameras are now being used with facial recognition has sparked a national debate about the balance between privacy and security. Technology has allowed society to...
data collection includes survey form, structured interviews using closed ended questions, and gathering information regarding a sample size appropriate to analyze and draw conclusion on the basis of the research results. The statistical techniques are used for data analysis to analyze collected data in quantitative research methods. The qualitative data is gathered through case study method and open ended question of an unstructured interview from notable sample. The qualitative
Attacks on Pearl Harbor and the World Trade Center had similar historical events surrounding each attack. Franklin Delano Roosevelt and George W. Bush used similar policies to combat further attacks and unite the nation The paper highlights the entwined American reactions to the September 11 attacks and the Pearl Harbor attacks. The paper illustrates the similarities in which the over-prevailing backgrounds of each event created reactions to the devastating measures that
Physical Security in Public AreasAbstract/SummaryThis paper examines the effectiveness of physical security measures in public areas, by looking at spaces such as schools, airports, stadiums, and malls. It discusses current strategies, including surveillance cameras, metal detectors, and access control systems. It also examines the need customized approaches since all spaces are different. Schools require security that balances safety with an open, welcoming environment, whereas airports can use stricter, more invasive
Patriot Act Homeland Security Act 21st Century form foundation United States' domestic response terrorist attacks September 11, 2001. Many legal political voices advocated acts resulted a reduction rights citizens a loss civil liberties. The Patriot Act and the Homeland Security Act: Are they a violation of our constitutional rights? According to the U.S. government, the Patriot Act and the Homeland Security Act gave the government the necessary tools to investigate acts of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now