Advanced technology and online social networking is changing nearly everything about the way people interact – including how criminals pull off illegal stunts, and how law enforcement responds to these acts. In light of the Boston bombings, which blew up in a flurry of public involvement and social media leads, it’s worth taking a look at how crowdsourcing has spurred crimesourcing, and subsequently, what is now being called investigation-sourcing, or the collective detective.
The Rise Of Crowdsourcing
The advent of crowdsourcing – obtaining services, ideas or products from a large, undefined group, primarily online, rather than a singular traditional outlet – pulls together the resources of the many to benefit a clearly outlined project or goal. First coined in a 2006 edition of Wired magazine, the term crowdsourcing has caught on like wildfire and is now used to describe familiar phenomena like Indiegogo and Kickstarter campaigns (crowdfunding), Threadless.com T-shirt competitions (crowdvoting), reality TV shows like American Idol and even information shared in online message boards and forums.
Some of the most notable examples of crowdsourcing in action:
- In 2006, Netflix started a campaign that invited the public to develop a more accurate way of recommending movies based on similar tastes. Three years later, a company called BellKor’s Pragmatic Chaos cashed in Netflix’s $1 million promise for the algorithm that is well known by Netflix users today.
- One Canadian gold mining company called Goldcorp was facing bankruptcy in 2007 when it put out a call to the public to help locate the gold within its mines. After posting its full datasets online, a member of the public employed never-before-used gold mining techniques to find the gold, save the company and take home the $500,000 reward.
The Cons Of Crimesourcing
Yet, for all the progress made by crowdsourcing, a dark side has also arisen. The streamlined collaboration that seamlessly emerges due to the nature of crowdsourcing has unfortunately also led to what is being called “crimesourcing.” As easily as companies, governments or entrepreneurs can tap into the genius of the crowd, so, too, can criminals. Crimesourcing denotes the process by which criminals, including hackers, mobsters and bank robbers, convince or, more often, con a group of citizens into playing a role in their devious scheme.
Marc Goodman, the LAPD cop who started the county’s first Interpol system in the 1990s and founder of the Future Crimes Institute, says cyber criminals are a lot like start up companies – they want money, they want a challenge, and they want to leverage their skills. Unfortunately, cyber hacks are all too common and criminals can “crimesource” by using the anonymity of the Internet to get unwitting bystanders to be accomplices in their plot. Sometimes, the crime is as typical as hacking into an account, and sometimes crimesourcing can be more creative.
Some of the most ingenious ways criminals are crimesourcing:
- Like the recently popular “flash mobs,” people are organizing online anonymously to decide a time and place to descend upon a designated store to collectively rob the establishment. Sometimes these “flash robs” will happen in broad daylight, end up injuring bystanders and allow for most of the perpetrators to escape.
- In one particularly clever escapade, one bank robber in Seattle posed as an employer on Craigslist and convinced a group of people to dress in their construction gear to apply for a high-paying job, all at the same time at the exact location of the bank he was robbing. Of course, he was dressed in the same gear and got away, as a dozen decoys were already in place when the cops rolled in.
- Dealing in the online realm, one ploy to break into Yahoo email invited users to break CAPTCHA codes in order to receive free pornography; the hacker devised it so that every CAPTCHA code that someone cracked spilled the secrets to another’s sensitive information.
Even amidst the chaos of the Boston manhunt, hackers were taking advantage of the sensationalism in the media, sending out emails with subject lines like “Explosion at Boston Marathon” and “Boston explosion caught on video” that unleashed a virus onto the victim’s computer. The Associated Press’s Twitter account was also hacked in the middle of the week, falsely tweeting that the White House had been attacked, causing the stock market to drop in response.
In a time when technology can allow for great innovation but also great crime, law enforcement is employing some 21st century strategies for catching these smart cyber criminals.
Investigation-sourcing & The Boston Marathon
Is crimesourcing giving way to investigation-sourcing? While there surely is a catchier name for it out there, investigation-sourcing is precisely what the FBI employed to catch the Boston bombers. Using a mixture of social media leads, video camera footage and citizen responses, law enforcement optimized crowdsourcing to jump straight onto the trail of the two bombers.
The Boston bombing is the largest crowdsourcing police operation to date, with floods of information swarming the FBI offices. Though the vast waves of information that were collected during the Boston manhunt culminated in a successful capture, a lot of misinformation was spread, too. Outlets like Reddit, Twitter, The New York Post and even CNN reported falsely accused suspects, while the Boston police Twitter was oversaturated with Tweets and AT&T had to issue a warning that their cell towers were getting overloaded.
Former FBI Chief and manager of Kroll’s cyber-investigations practice, Timothy Ryan, said in an interview that it’s better to over-collect information than to under-collect. Now, with citizen journalism ramping up, as evidenced by the outpour of crowdsourced police data, it’s time to refine the methods even further.
Growing Trends & New Strategies
Smart technology is making detective work smarter, faster and more reliable. It was pretty incredible that the Boston bombers were identified in such a short period of time and caught within one week, but what if, amidst all the data, computers were able to sift through the evidence rather than use the immense manpower it must have required? A Silicon Valley company is working on developing technology that does just that. Crowd Optic is an app that uses visual mining technology to compile images and determine the most popular photos at an event – a helpful analytical tool in emergencies such as the Boston bombing.
Another innovative tool is from Topsy Labs: they’ve got a database of every Tweet ever created since June 2010, as well as the ability to search old Tweets for catchphrases like “bomb,” for example, and then use geo-referencing to pinpoint the locations of these conversations. This is one way that investigators are able to leverage technology to “pull signal from the noise” and hone in on perpetrators of crime.
Call it the “collective detective” or call it “investigation-sourcing,” either way, technology is ramping up to help the FBI catch on to criminals quicker and quicker. Some theories are going around that eventually, predictive analytics will allow law enforcement to predict crimes before they happen, not using psychics like in Minority Report, but just really, really smart technology. Along with this theory and current technology on the market, of course, there are concerns about authorities becoming too much like “Big Brother.”
Hopefully, smart technology will be used for catching criminals and not abusing power. So far, it doesn’t seem like many people are upset that the Boston bombers could be captured so quickly, nor was there a lack of people contributing evidence to the case. Crowdsourcing technology is just at the beginning of its stint in law enforcement; the Boston manhunt really opened the door to using “collective detective” tools for help in solving other crimes – like finding missing children, for example.
Online Tools & Personal Protection
As for protecting yourself online from getting duped by these super smart and sneaky cyber criminals, there are a few tangible actions you can take.
- Protect your identity. Never give out personal or sensitive information online, even to someone claiming to be an employer or an official. Oftentimes, cyber criminals will pose as others to get this information out of you.
- Don’t download anything from an insecure connection or an untrusted network. Even if the website tells you that you need to download a bot for a program to work, make sure the domain is familiar and trusted.
- If you’re really interested in working with someone online, ask for their full identification and do a criminal background check through an online service like Instant Checkmate to verify their legitimacy. Cyber criminals won’t always give you correct information, but if they hesitate to provide these details in the first place, that’s a clear red flag.
From crowdsourcing to crimesourcing to the collective detective, interactive technology is laying the groundwork for some innovative, as well as challenging, opportunities to connect online. The bottom line is that as technology progresses, all sorts of people will find all sorts of uses for it, so it’s important to stay ahead of the curve. Every action will have a reaction, and it’s an exciting time to be navigating the novelty of crowdsourcing technology.Featured photo credit: Optical camera on wall of building watching on parking place from top via Shutterstock
Love this article? Share it with your friends on Facebook