SlideShare a Scribd company logo
1 of 29
Copyright Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Chapter EightChapter Eight
Agency SystemsAgency Systems
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Learning ObjectivesLearning Objectives
 The reasons good record keeping isThe reasons good record keeping is
critical to law enforcementcritical to law enforcement
 Operator security (right to know and needOperator security (right to know and need
to know).to know).
 Purpose ofPurpose of Record Management SystemsRecord Management Systems
(RMS), Jail Management Systems (JMS)(RMS), Jail Management Systems (JMS)
andand Evidence Management SystemsEvidence Management Systems
(EMS)(EMS)
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Learning ObjectivesLearning Objectives
 Impact ofImpact of Freedom of Information ActFreedom of Information Act
(FOIA)(FOIA) on police recordson police records
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Police RecordsPolice Records
Information retainedInformation retained
By police agenciesBy police agencies
runs the spectrumruns the spectrum
from crime reports tofrom crime reports to
Personnel records.Personnel records.
Information needs toInformation needs to
be:be:
 Readily availableReadily available
 Kept for a longKept for a long
timetime
 Held confidentiallyHeld confidentially
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Record Keeping SystemsRecord Keeping Systems
 Police agenciesPolice agencies
create a lot of paper –create a lot of paper –
automated recordautomated record
keeping systems arekeeping systems are
a combination ofa combination of
hardware, software,hardware, software,
policy and procedurepolicy and procedure
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
 First tierFirst tier manufacturers are large companies.manufacturers are large companies.
They are set up to product quality custom-They are set up to product quality custom-
designed software and hardwaredesigned software and hardware
configurations.configurations.
 Second tierSecond tier manufacturers may be largemanufacturers may be large
companies, but the products are off-the-companies, but the products are off-the-
shelf, not custom-designed.shelf, not custom-designed.
Record Keeping SystemsRecord Keeping Systems
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
The result is:The result is:
 Many of these systems are incompatibleMany of these systems are incompatible
 Smaller agencies do not gain the expertiseSmaller agencies do not gain the expertise
that the larger agencies havethat the larger agencies have
 FragmentationFragmentation and its resulting effectsand its resulting effects
continues to growcontinues to grow
Record Keeping SystemsRecord Keeping Systems
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Criminal Justice vs. Police RecordsCriminal Justice vs. Police Records
IncludesIncludes everyevery piecepiece
of info gathered inof info gathered in
and used by theand used by the
criminal justicecriminal justice
system.system.
A fully integrated policeA fully integrated police
records managementrecords management
system is going to havesystem is going to have
access to all of theaccess to all of the
other recordsother records
maintained by differentmaintained by different
criminal justicecriminal justice
organizations.organizations.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Local Agency
Prison RecordsCourt Records
Probation Records
A few of the sources of informationA few of the sources of information
Police Officer
Other
Agencies
Vehicle Records
NCIC
Commercial
Records
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Local Agency
Prison RecordsCourt Records
Probation Records
Both Input and OutputBoth Input and Output
Police Officer
Other
Agencies
Vehicle Records
NCIC
Commercial
Records
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Information Security and AccuracyInformation Security and Accuracy
In law enforcement, when information isIn law enforcement, when information is
compromised, authorized users primarilycompromised, authorized users primarily
do itdo it intentionallyintentionally..
In other words, most
security breaches are as a
result of intentional acts,
not hackers, etc.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Information Security and AccuracyInformation Security and Accuracy
 Law enforcement personnel also have generalLaw enforcement personnel also have general
access to a wide variety of information aboutaccess to a wide variety of information about
the average person that isthe average person that is confidential andconfidential and
protected by lawprotected by law..
 Generally, information available to lawGenerally, information available to law
enforcement users is considered privilegedenforcement users is considered privileged
information (for official use only)information (for official use only)
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Right to know vs. Need to knowRight to know vs. Need to know
Derived from theDerived from the
officer’sofficer’s
occupation.occupation. PolicePolice
officers have aofficers have a
right to knowright to know
certain privilegedcertain privileged
information.information.
Derived from theDerived from the
situationsituation. Does the. Does the
officer need toofficer need to
know thisknow this
information in orderinformation in order
to further his/herto further his/her
criminalcriminal
investigation?investigation?
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
 Training people to realize theirTraining people to realize their ethicalethical
responsibilitiesresponsibilities with confidentialwith confidential
information.information.
 Having clear rules and regulationsHaving clear rules and regulations
concerning the field use of equipmentconcerning the field use of equipment
 Using passwordsUsing passwords
 Data logsData logs
 Different levels of accessDifferent levels of access
 AuthenticationAuthentication
First layer of protection . . .First layer of protection . . .
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Privacy IssuesPrivacy Issues
For example, the names of victimsFor example, the names of victims
sexual assault.sexual assault. Failure to protectFailure to protect thethe
victims’ privacy can result invictims’ privacy can result in civilcivil
litigation.litigation.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
For Law Enforcement Agencies:For Law Enforcement Agencies:
 Information about someone can beInformation about someone can be
considered their personal propertyconsidered their personal property
 Victims trust the agency will not reveal theVictims trust the agency will not reveal the
informationinformation
 If the information is reveals, it could causeIf the information is reveals, it could cause
the person to suffer (e.g., defamation)the person to suffer (e.g., defamation)
 Using a person’s likeness (photo) raisesUsing a person’s likeness (photo) raises
issues of ownershipissues of ownership
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
 The times in which law enforcementThe times in which law enforcement
agencies are prevented from interceptingagencies are prevented from intercepting
communications by private citizenscommunications by private citizens
 Fulfill a citizen’s demand to know whatFulfill a citizen’s demand to know what
information the government has obtainedinformation the government has obtained
[Freedom of Information Act FOIA)][Freedom of Information Act FOIA)]
 Government take affirmative acts to informGovernment take affirmative acts to inform
people of information.people of information.
To Balance Public ConfidenceTo Balance Public Confidence
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Turning Data into InformationTurning Data into Information
IndexingIndexing
 Master file withMaster file with
cross-referencedcross-referenced
numbersnumbers
 Now done withNow done with
databases.databases.
 Evolved into. . .Evolved into. . .
Relational databasesRelational databases
 Foundation ofFoundation of
RecordsRecords
ManagementManagement
Systems (RMSSystems (RMS))
 Can be link toCan be link to
external sources ofexternal sources of
informationinformation
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Record Management SystemRecord Management System
 Several smaller systems (likeSeveral smaller systems (like
CAD and GIS)CAD and GIS)
 That exchange information withThat exchange information with
a master servera master server
 You may only ask questions of aYou may only ask questions of a
specific database within anspecific database within an
agencyagency
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Jail Management SystemJail Management System
 InformationInformation
containing:containing:
 Inmates statusInmates status
 PhotographsPhotographs
 FingerprintsFingerprints
 VisitationsVisitations
 Special needsSpecial needs
 Medical informationMedical information
 Security information –Security information –
like gang affiliationlike gang affiliation
Screen capture provided by Crimestar, Inc.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Evidence Management SystemsEvidence Management Systems
 Documents chain ofDocuments chain of
custodycustody
 Assists in orderlyAssists in orderly
transfer of evidencetransfer of evidence
to labs and courtsto labs and courts
 Assists in the properAssists in the proper
storage of evidencestorage of evidence
Screen capture provided by Crimestar, Inc.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Case Management SystemsCase Management Systems
 Assists detectivesAssists detectives
and detectiveand detective
supervisors in thesupervisors in the
assignment of casesassignment of cases
and coordinatingand coordinating
investigationsinvestigations Screen capture provided by Crimestar, Inc.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Many different uses of police dataMany different uses of police data
Screen captures provided by Crimestar, Inc.
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Many different uses of police dataMany different uses of police data
Strategic Purposes:Strategic Purposes:
 DeploymentDeployment
 Crime AnalysisCrime Analysis
Two types ofTwo types of
inquiries:inquiries:
 ConditionalConditional
 Ad Hoc queryAd Hoc query
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
New mobile office systemsNew mobile office systems
The mobile OfficeThe mobile Office
consists of:consists of:
 VehicleVehicle
 Mobile Radio SystemMobile Radio System
 Mobile DataMobile Data
Computer (laptop inComputer (laptop in
vehicle)vehicle)
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
New mobile office systemsNew mobile office systems
Allow officers toAllow officers to
access:access:
 MugshotsMugshots
 FingerprintsFingerprints
 GIS mapsGIS maps
 Aerial PhotographsAerial Photographs
Challenges:Challenges:
 BandwidthBandwidth
Photograph provided by Woodcrest Vehicles
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
New mobile office systemsNew mobile office systems
 Like a desk top PC,Like a desk top PC,
the Mobile Office hasthe Mobile Office has
a computer CPU,a computer CPU,
usually mounted inusually mounted in
the truckthe truck
Copyright Protected 2005: Hi Tech Criminal Justice, Raymo
Image ProcessingImage Processing
 DocumentsDocuments
 PhotographsPhotographs
 FingerprintsFingerprints
 Crime SceneCrime Scene
photographsphotographs
Can be:Can be:
 ScannedScanned
 DigitizedDigitized
 Stored in aStored in a
databasedatabase
Copyright Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Go to theGo to the Student ResourcesStudent Resources page atpage at
www.hitechcj.comwww.hitechcj.com

More Related Content

What's hot

MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?Lumension
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Researchmarciahofmann
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Texas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesTexas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesJim Brashear
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsMMMTechLaw
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyDonny Shimamoto
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Cyber Threats and Insurance
Cyber Threats and InsuranceCyber Threats and Insurance
Cyber Threats and InsuranceEric Dean
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 BC:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 Basireesha
 

What's hot (19)

MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?California Data Privacy Laws: Is Compliance Good Enough?
California Data Privacy Laws: Is Compliance Good Enough?
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Hot Topics in Data Breach Litigation
Hot Topics in Data Breach LitigationHot Topics in Data Breach Litigation
Hot Topics in Data Breach Litigation
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Data Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident SimulationData Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident Simulation
 
Texas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New ChangesTexas Privacy Laws - Tough New Changes
Texas Privacy Laws - Tough New Changes
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Cyber Threats and Insurance
Cyber Threats and InsuranceCyber Threats and Insurance
Cyber Threats and Insurance
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 BC:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
 

Viewers also liked

Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsHi Tech Criminal Justice
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record ManagementKhokan Sardar
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Online Crime Management system
Online Crime Management system Online Crime Management system
Online Crime Management system shinyvaibhav
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Applicationsatvirsandhu9
 

Viewers also liked (6)

Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and Tactics
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record Management
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Online Crime Management system
Online Crime Management system Online Crime Management system
Online Crime Management system
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Application
 

Similar to Agency Systems

Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About MeNextNet Partners
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
 
Developing a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeDeveloping a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeMarcelo Gomes Freire
 

Similar to Agency Systems (20)

Information Exchange
Information ExchangeInformation Exchange
Information Exchange
 
Introduction to Police Technology
Introduction to Police TechnologyIntroduction to Police Technology
Introduction to Police Technology
 
A Brief History of Police Technology
A Brief History of Police TechnologyA Brief History of Police Technology
A Brief History of Police Technology
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 
Emerging and Future Technologies
Emerging and Future TechnologiesEmerging and Future Technologies
Emerging and Future Technologies
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
External Systems
External SystemsExternal Systems
External Systems
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
223 - Computer ethics
223 - Computer ethics223 - Computer ethics
223 - Computer ethics
 
Steven Greschner - About Me
Steven Greschner  - About MeSteven Greschner  - About Me
Steven Greschner - About Me
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
Developing a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeDeveloping a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat Cybercrime
 

More from Hi Tech Criminal Justice

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headingsHi Tech Criminal Justice
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)Hi Tech Criminal Justice
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersHi Tech Criminal Justice
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlHi Tech Criminal Justice
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesHi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Hi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Hi Tech Criminal Justice
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisHi Tech Criminal Justice
 

More from Hi Tech Criminal Justice (20)

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headings
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck Rodgers
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and Control
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign Dignitaries
 
An introduction to federal courts
An introduction to federal courtsAn introduction to federal courts
An introduction to federal courts
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and Analysis
 
Leadership texas hold em style
Leadership texas hold em styleLeadership texas hold em style
Leadership texas hold em style
 
Implementing and Managing Technology
Implementing and Managing TechnologyImplementing and Managing Technology
Implementing and Managing Technology
 
Personnel and Training
Personnel and TrainingPersonnel and Training
Personnel and Training
 
Technology in the Street
Technology in the StreetTechnology in the Street
Technology in the Street
 
Major Incident and Disaster Response
Major Incident and Disaster ResponseMajor Incident and Disaster Response
Major Incident and Disaster Response
 
Technology in Investigations
Technology in InvestigationsTechnology in Investigations
Technology in Investigations
 
The Internet and Law Enforcement
The Internet and Law EnforcementThe Internet and Law Enforcement
The Internet and Law Enforcement
 
Communication Dispatch Centers
Communication Dispatch CentersCommunication Dispatch Centers
Communication Dispatch Centers
 
Geographic Information Systems
Geographic Information SystemsGeographic Information Systems
Geographic Information Systems
 
Networks
NetworksNetworks
Networks
 
Wireless Communications
Wireless CommunicationsWireless Communications
Wireless Communications
 

Recently uploaded

WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsCharles Obaleagbon
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiVIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...babafaisel
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceanilsa9823
 
Cheap Rate Call girls Kalkaji 9205541914 shot 1500 night
Cheap Rate Call girls Kalkaji 9205541914 shot 1500 nightCheap Rate Call girls Kalkaji 9205541914 shot 1500 night
Cheap Rate Call girls Kalkaji 9205541914 shot 1500 nightDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵anilsa9823
 
Presentation.pptx about blender what is blender
Presentation.pptx about blender what is blenderPresentation.pptx about blender what is blender
Presentation.pptx about blender what is blenderUbaidurrehman997675
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdftbatkhuu1
 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Delhi Call girls
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...home
 
NO1 Trending kala jadu Love Marriage Black Magic Punjab Powerful Black Magic ...
NO1 Trending kala jadu Love Marriage Black Magic Punjab Powerful Black Magic ...NO1 Trending kala jadu Love Marriage Black Magic Punjab Powerful Black Magic ...
NO1 Trending kala jadu Love Marriage Black Magic Punjab Powerful Black Magic ...Amil baba
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentationamedia6
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...Pooja Nehwal
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...Suhani Kapoor
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfAmirYakdi
 
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...Yantram Animation Studio Corporation
 

Recently uploaded (20)

WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past Questions
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
 
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiVIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
 
Cheap Rate Call girls Kalkaji 9205541914 shot 1500 night
Cheap Rate Call girls Kalkaji 9205541914 shot 1500 nightCheap Rate Call girls Kalkaji 9205541914 shot 1500 night
Cheap Rate Call girls Kalkaji 9205541914 shot 1500 night
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
 
Presentation.pptx about blender what is blender
Presentation.pptx about blender what is blenderPresentation.pptx about blender what is blender
Presentation.pptx about blender what is blender
 
Editorial design Magazine design project.pdf
Editorial design Magazine design project.pdfEditorial design Magazine design project.pdf
Editorial design Magazine design project.pdf
 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
 
NO1 Trending kala jadu Love Marriage Black Magic Punjab Powerful Black Magic ...
NO1 Trending kala jadu Love Marriage Black Magic Punjab Powerful Black Magic ...NO1 Trending kala jadu Love Marriage Black Magic Punjab Powerful Black Magic ...
NO1 Trending kala jadu Love Marriage Black Magic Punjab Powerful Black Magic ...
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentation
 
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
 
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
 

Agency Systems

  • 1. Copyright Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Chapter EightChapter Eight Agency SystemsAgency Systems
  • 2. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Learning ObjectivesLearning Objectives  The reasons good record keeping isThe reasons good record keeping is critical to law enforcementcritical to law enforcement  Operator security (right to know and needOperator security (right to know and need to know).to know).  Purpose ofPurpose of Record Management SystemsRecord Management Systems (RMS), Jail Management Systems (JMS)(RMS), Jail Management Systems (JMS) andand Evidence Management SystemsEvidence Management Systems (EMS)(EMS)
  • 3. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Learning ObjectivesLearning Objectives  Impact ofImpact of Freedom of Information ActFreedom of Information Act (FOIA)(FOIA) on police recordson police records
  • 4. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Police RecordsPolice Records Information retainedInformation retained By police agenciesBy police agencies runs the spectrumruns the spectrum from crime reports tofrom crime reports to Personnel records.Personnel records. Information needs toInformation needs to be:be:  Readily availableReadily available  Kept for a longKept for a long timetime  Held confidentiallyHeld confidentially
  • 5. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Record Keeping SystemsRecord Keeping Systems  Police agenciesPolice agencies create a lot of paper –create a lot of paper – automated recordautomated record keeping systems arekeeping systems are a combination ofa combination of hardware, software,hardware, software, policy and procedurepolicy and procedure
  • 6. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo  First tierFirst tier manufacturers are large companies.manufacturers are large companies. They are set up to product quality custom-They are set up to product quality custom- designed software and hardwaredesigned software and hardware configurations.configurations.  Second tierSecond tier manufacturers may be largemanufacturers may be large companies, but the products are off-the-companies, but the products are off-the- shelf, not custom-designed.shelf, not custom-designed. Record Keeping SystemsRecord Keeping Systems
  • 7. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo The result is:The result is:  Many of these systems are incompatibleMany of these systems are incompatible  Smaller agencies do not gain the expertiseSmaller agencies do not gain the expertise that the larger agencies havethat the larger agencies have  FragmentationFragmentation and its resulting effectsand its resulting effects continues to growcontinues to grow Record Keeping SystemsRecord Keeping Systems
  • 8. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Criminal Justice vs. Police RecordsCriminal Justice vs. Police Records IncludesIncludes everyevery piecepiece of info gathered inof info gathered in and used by theand used by the criminal justicecriminal justice system.system. A fully integrated policeA fully integrated police records managementrecords management system is going to havesystem is going to have access to all of theaccess to all of the other recordsother records maintained by differentmaintained by different criminal justicecriminal justice organizations.organizations.
  • 9. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Local Agency Prison RecordsCourt Records Probation Records A few of the sources of informationA few of the sources of information Police Officer Other Agencies Vehicle Records NCIC Commercial Records
  • 10. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Local Agency Prison RecordsCourt Records Probation Records Both Input and OutputBoth Input and Output Police Officer Other Agencies Vehicle Records NCIC Commercial Records
  • 11. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Information Security and AccuracyInformation Security and Accuracy In law enforcement, when information isIn law enforcement, when information is compromised, authorized users primarilycompromised, authorized users primarily do itdo it intentionallyintentionally.. In other words, most security breaches are as a result of intentional acts, not hackers, etc.
  • 12. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Information Security and AccuracyInformation Security and Accuracy  Law enforcement personnel also have generalLaw enforcement personnel also have general access to a wide variety of information aboutaccess to a wide variety of information about the average person that isthe average person that is confidential andconfidential and protected by lawprotected by law..  Generally, information available to lawGenerally, information available to law enforcement users is considered privilegedenforcement users is considered privileged information (for official use only)information (for official use only)
  • 13. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Right to know vs. Need to knowRight to know vs. Need to know Derived from theDerived from the officer’sofficer’s occupation.occupation. PolicePolice officers have aofficers have a right to knowright to know certain privilegedcertain privileged information.information. Derived from theDerived from the situationsituation. Does the. Does the officer need toofficer need to know thisknow this information in orderinformation in order to further his/herto further his/her criminalcriminal investigation?investigation?
  • 14. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo  Training people to realize theirTraining people to realize their ethicalethical responsibilitiesresponsibilities with confidentialwith confidential information.information.  Having clear rules and regulationsHaving clear rules and regulations concerning the field use of equipmentconcerning the field use of equipment  Using passwordsUsing passwords  Data logsData logs  Different levels of accessDifferent levels of access  AuthenticationAuthentication First layer of protection . . .First layer of protection . . .
  • 15. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Privacy IssuesPrivacy Issues For example, the names of victimsFor example, the names of victims sexual assault.sexual assault. Failure to protectFailure to protect thethe victims’ privacy can result invictims’ privacy can result in civilcivil litigation.litigation.
  • 16. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo For Law Enforcement Agencies:For Law Enforcement Agencies:  Information about someone can beInformation about someone can be considered their personal propertyconsidered their personal property  Victims trust the agency will not reveal theVictims trust the agency will not reveal the informationinformation  If the information is reveals, it could causeIf the information is reveals, it could cause the person to suffer (e.g., defamation)the person to suffer (e.g., defamation)  Using a person’s likeness (photo) raisesUsing a person’s likeness (photo) raises issues of ownershipissues of ownership
  • 17. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo  The times in which law enforcementThe times in which law enforcement agencies are prevented from interceptingagencies are prevented from intercepting communications by private citizenscommunications by private citizens  Fulfill a citizen’s demand to know whatFulfill a citizen’s demand to know what information the government has obtainedinformation the government has obtained [Freedom of Information Act FOIA)][Freedom of Information Act FOIA)]  Government take affirmative acts to informGovernment take affirmative acts to inform people of information.people of information. To Balance Public ConfidenceTo Balance Public Confidence
  • 18. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Turning Data into InformationTurning Data into Information IndexingIndexing  Master file withMaster file with cross-referencedcross-referenced numbersnumbers  Now done withNow done with databases.databases.  Evolved into. . .Evolved into. . . Relational databasesRelational databases  Foundation ofFoundation of RecordsRecords ManagementManagement Systems (RMSSystems (RMS))  Can be link toCan be link to external sources ofexternal sources of informationinformation
  • 19. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Record Management SystemRecord Management System  Several smaller systems (likeSeveral smaller systems (like CAD and GIS)CAD and GIS)  That exchange information withThat exchange information with a master servera master server  You may only ask questions of aYou may only ask questions of a specific database within anspecific database within an agencyagency
  • 20. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Jail Management SystemJail Management System  InformationInformation containing:containing:  Inmates statusInmates status  PhotographsPhotographs  FingerprintsFingerprints  VisitationsVisitations  Special needsSpecial needs  Medical informationMedical information  Security information –Security information – like gang affiliationlike gang affiliation Screen capture provided by Crimestar, Inc.
  • 21. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Evidence Management SystemsEvidence Management Systems  Documents chain ofDocuments chain of custodycustody  Assists in orderlyAssists in orderly transfer of evidencetransfer of evidence to labs and courtsto labs and courts  Assists in the properAssists in the proper storage of evidencestorage of evidence Screen capture provided by Crimestar, Inc.
  • 22. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Case Management SystemsCase Management Systems  Assists detectivesAssists detectives and detectiveand detective supervisors in thesupervisors in the assignment of casesassignment of cases and coordinatingand coordinating investigationsinvestigations Screen capture provided by Crimestar, Inc.
  • 23. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Many different uses of police dataMany different uses of police data Screen captures provided by Crimestar, Inc.
  • 24. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Many different uses of police dataMany different uses of police data Strategic Purposes:Strategic Purposes:  DeploymentDeployment  Crime AnalysisCrime Analysis Two types ofTwo types of inquiries:inquiries:  ConditionalConditional  Ad Hoc queryAd Hoc query
  • 25. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo New mobile office systemsNew mobile office systems The mobile OfficeThe mobile Office consists of:consists of:  VehicleVehicle  Mobile Radio SystemMobile Radio System  Mobile DataMobile Data Computer (laptop inComputer (laptop in vehicle)vehicle)
  • 26. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo New mobile office systemsNew mobile office systems Allow officers toAllow officers to access:access:  MugshotsMugshots  FingerprintsFingerprints  GIS mapsGIS maps  Aerial PhotographsAerial Photographs Challenges:Challenges:  BandwidthBandwidth Photograph provided by Woodcrest Vehicles
  • 27. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo New mobile office systemsNew mobile office systems  Like a desk top PC,Like a desk top PC, the Mobile Office hasthe Mobile Office has a computer CPU,a computer CPU, usually mounted inusually mounted in the truckthe truck
  • 28. Copyright Protected 2005: Hi Tech Criminal Justice, Raymo Image ProcessingImage Processing  DocumentsDocuments  PhotographsPhotographs  FingerprintsFingerprints  Crime SceneCrime Scene photographsphotographs Can be:Can be:  ScannedScanned  DigitizedDigitized  Stored in aStored in a databasedatabase
  • 29. Copyright Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Go to theGo to the Student ResourcesStudent Resources page atpage at www.hitechcj.comwww.hitechcj.com