Wednesday, February 1, 2023
Fatos Haziri and Enver Buçaj (University for Business and Technology (UBT) and University of Prizren) have posted The Role of Smart Devices in the Detection of Vehicle Theft Related Criminal Offenses on SSRN. Here is the abstract:
The computer is a technological device that is largely used by detectives, police patrols, supervisors, and managers, but also by perpetrators of criminal offenses. Today, computer systems make it easier to identify documents, identify vehicle data such as vehicle identification numbers, year of manufacture, vehicle owner, vehicle technical data e.g. weight, driving power, whether they are wanted vehicles or appear on the list of stolen vehicles, etc. However, despite the positive aspect, computers are largely being used for criminal purposes, by perpetrators of criminal offenses who know how to exploit the wide range of these systems. They may be persons who, with little instruction, are able to create successful counterfeiting operations. Therefore, investigators must be aware of these possibilities, as well as be specialized in examining computers. “Many law enforcement agencies have specifically established separate forensic information systems sections to address this issue. It is important to collect data digitally. This would best be done by IT experts, especially computer experts, who can best take measures to preserve evidence in case of confiscation of computers”. Computer systems have been used in many cases of vehicle theft and forgery, so this should be taken into account by police investigators.
Understanding computer and database systems is important in the stolen vehicle detection process. In the US, investigators can by means of computer software automatically compare data from the Department of Motor Vehicle Registration with data from the National Insurance Crime Bureau (NICB) - a non-profit organization that supports law enforcement agencies in facilitating identification, detection and prosecution of perpetrators of insurance fraud crimes”. Such a program is also used by other countries, mainly those that are part of international security organizations, such as INTERPOL.