SlideShare a Scribd company logo
1 of 21
CRIMINOLOGY IN THE FUTURE
By: Candace Gallegos, Brian Wetjen,
(Mimi) Carole Harvill, Jesse Palmer,
Michelle Majette
Outline
• Predictive Policing
• Biometrics
• DNA
• Future Problems
• Cybercrimes
Predictive policing
• Hot spots – crime
mapping
• DATA
• Geographic
• Man power
Biometrics
• Face
• Voice
• Fingerprints
• DNA
Deoxyribonucleic
(DNA)
DNA---interrogation that
uses an actual fragment of a
human being to obtain highly
personal information
Familial DNA search does not
substantiate probable cause---yields
unreasonable search and seizure
There is a fine line between true justice
and inalienable rights
An ISP owns digital data stored in the maintains
records of consumer information; traffic, content
data, email, text messaging, and mobile phone
usage.
There is a fine line between true justice
and inalienable rights
Cybercrime---digital tracking of
personal information
Predictive Policing---identifying probable
crime
The probable area is a suspicious
area; therefore an individual in
this location is, by default, under
suspicion.
There is a fine line between true justice
and inalienable rights
What & Where is DNA?
DNA is a grouping of biological
organisms that are passed from
adults to their off-springs.
DNA is found inside a special cell
called the nucleus and is in a very
small package called a chromosome.
The Path of DNA?
The German biochemist Frederich Miescher
first observed DNA in the late 1800s.
DNA analysis was introduced into policing in
1986 when officers in central England use it to
solve the sexual assault case of two young
girls.
The Path of DNA?
The German biochemist Frederich Miescher
first observed DNA in the late 1800s.
DNA analysis was introduced into policing in
1986 when officers in central England use it to
solve the sexual assault case of two young
girls.
How does DNA work in Policing?
• Forensic Scientist scan 13
DNA regions (loci) that
vary from person to
person and use it to
create a DNA profile.
• This process called DNA
fingerprinting is then
used to test the samples
that have been collected
from a crime scene or
victim.
• Other ways that DNA is
used are:
• Exonerate a suspect.
• Identify victims in a
catastrophe.
• Establish Paternity.
• Identify endangered
species.
• Match organ donors.
• Authenticate
consumables such as
caviar and wine.
The future of & problems with DNA
FUTURE
• In the future scientists
and criminalists are
wanting to retrieve
DNA samples at from
a person at birth and
store it for future.
• Combine DNA from all
countries into one
main database.
PROBLEMS
• The public’s interest
in the violation of
their privacy.
• People are not
wanting to have
their DNA
information stored
and it may or may
not be used.
IMPLEMENTING CYBERCRIME
SPYWARE
CYBERCRIME
• DEFINITION
– Any crimes that involve the use of computers or
the manipulation of digital data as well as any
violation of a federal or state cyber crime statute.
• EXAMPLE OF CYBERCRIMES
– Phishing
– Hacking
CYBERCRIME
• CRIME-FIGHTING METHODOLOGIES
– FBI cybercrime spyware program: Computer and
Internet Protocol Address Verifier
• In existence since 2004 but went public in 2007
• Used to track the source of e-mail bomb threats against
Timberline High School in Washington State
• Where able to catch and convict the subject based on
evidence obtained with the CIPAV
CONCLUSION
QUESTIONS
Bibliography
Ferguson, A. G. (2011, November 28). “Predictive Policing” and the Fourth Amendment.
Retrieved from American Criminal Law Review:
http://www.americancriminallawreview.com/Drupal/blogs/blog-
entry/%E2%80%9Cpredictive-policing%E2%80%9D-and-fourth-amendment-11-28-
2011
Risher, M. T. (2012, April 26). “Utilizing DNA Technology to Solve Cold Cases Act of 2011”.
Retrieved from American Civil Liberties Union:
http://www.aclu.org/files/assets/aclu_testimony_on_familal_searching_2012_04_2
4.pdf
Risling, G. (2012, July 1). 'Predictive Policing' Technology Lowers Crime In Los Angeles.
Retrieved from Huffington Post:
http://www.huffingtonpost.com/2012/07/01/predictive-policing-technology-los-
angeles_n_1641276.html
Rodriguez, K. (2011, August 25). Dangerous Cybercrime Treaty Pushes Surveillance and
Secrecy Worldwide . Retrieved from Electronic Frontier Foundation:
https://www.eff.org/deeplinks/2011/08/cybercrime-treaty-pushes-surveillance-
secrecy-worldwide
Scientific American. (2011, November 22). Stop the Genetic Dragnet. Retrieved from
Scientific American: http://www.scientificamerican.com/article.cfm?id=stop-the-
genetic-dragnet
CYBERCRIME
• REFERENCES
Begun, D. (2009). FBI Uses Spyware to Capture Cyber Criminals. Retreived 13:30, Oct 26,
20012, from Hot Hardware: www.hothardware.com/news/FBI.
Schmalleger, F. (2012). Criminology today: An integrative introduction. (6th
ed.). Upper
Saddle River, NJ: Pearson/Prentice Hall. Chapter 13, pages 371, 373, and 374.

More Related Content

What's hot

4 impact of crime
4 impact of crime4 impact of crime
4 impact of crimemrmarr
 
Basic introduction to crime
Basic introduction to crimeBasic introduction to crime
Basic introduction to crimenbteacher
 
Basics of criminology
Basics of criminologyBasics of criminology
Basics of criminologyDEEPRAVIN
 
A Presentation on Crime and its classification
A Presentation on Crime and its classification A Presentation on Crime and its classification
A Presentation on Crime and its classification Sultan Mahmood
 
Victims of Crime
Victims of CrimeVictims of Crime
Victims of CrimeDani Cathro
 
7 Media Representations of Crime
7 Media Representations of Crime7 Media Representations of Crime
7 Media Representations of Crimemattyp99
 
Concept of crime
Concept of crimeConcept of crime
Concept of crimeSonuVashist
 
Types of Crime presentation
Types of Crime presentationTypes of Crime presentation
Types of Crime presentationAmeena Patel
 
Schools of criminology
Schools of criminologySchools of criminology
Schools of criminologyWARIFVACIM
 
Biological Theory of Crime
Biological Theory of CrimeBiological Theory of Crime
Biological Theory of CrimeA K DAS's | Law
 
Criminal investigation presentation
Criminal investigation presentationCriminal investigation presentation
Criminal investigation presentationcwe1sh
 

What's hot (20)

4 impact of crime
4 impact of crime4 impact of crime
4 impact of crime
 
Basic introduction to crime
Basic introduction to crimeBasic introduction to crime
Basic introduction to crime
 
Basics of criminology
Basics of criminologyBasics of criminology
Basics of criminology
 
A Presentation on Crime and its classification
A Presentation on Crime and its classification A Presentation on Crime and its classification
A Presentation on Crime and its classification
 
Victims of Crime
Victims of CrimeVictims of Crime
Victims of Crime
 
CRIMINAL PROFILING
CRIMINAL PROFILINGCRIMINAL PROFILING
CRIMINAL PROFILING
 
Criminology essay
Criminology  essayCriminology  essay
Criminology essay
 
Know the main causes of crimes
Know the main causes of crimesKnow the main causes of crimes
Know the main causes of crimes
 
7 Media Representations of Crime
7 Media Representations of Crime7 Media Representations of Crime
7 Media Representations of Crime
 
Concept of crime
Concept of crimeConcept of crime
Concept of crime
 
Types of Crime presentation
Types of Crime presentationTypes of Crime presentation
Types of Crime presentation
 
Mass Murder
Mass MurderMass Murder
Mass Murder
 
Crime scene investigation
Crime scene investigationCrime scene investigation
Crime scene investigation
 
Organized Crime
Organized CrimeOrganized Crime
Organized Crime
 
Schools of criminology
Schools of criminologySchools of criminology
Schools of criminology
 
Criminology powerpoint one
Criminology powerpoint oneCriminology powerpoint one
Criminology powerpoint one
 
Victims and offenders
Victims and offendersVictims and offenders
Victims and offenders
 
Biological Theory of Crime
Biological Theory of CrimeBiological Theory of Crime
Biological Theory of Crime
 
Criminal investigation presentation
Criminal investigation presentationCriminal investigation presentation
Criminal investigation presentation
 
Organize Crime Groups
Organize Crime GroupsOrganize Crime Groups
Organize Crime Groups
 

Similar to Criminology in the future cja 314

How DNA and Criminal Profiling Solve Crimes
How DNA and Criminal Profiling Solve CrimesHow DNA and Criminal Profiling Solve Crimes
How DNA and Criminal Profiling Solve CrimesSam Brandt
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Thermo Fisher Scientific
 
2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in Forensics2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in ForensicsStephen Turner
 
The Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the MissingThe Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the MissingThermo Fisher Scientific
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA
 
DNA Analysis
DNA Analysis DNA Analysis
DNA Analysis Yosok Pun
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
 

Similar to Criminology in the future cja 314 (9)

How DNA and Criminal Profiling Solve Crimes
How DNA and Criminal Profiling Solve CrimesHow DNA and Criminal Profiling Solve Crimes
How DNA and Criminal Profiling Solve Crimes
 
DNA Forensic Study
DNA Forensic StudyDNA Forensic Study
DNA Forensic Study
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014
 
2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in Forensics2019 MAAFS Future of Genomics and Bioinformatics in Forensics
2019 MAAFS Future of Genomics and Bioinformatics in Forensics
 
The Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the MissingThe Potential of Forensic Genetics in Resolving the Fate of the Missing
The Potential of Forensic Genetics in Resolving the Fate of the Missing
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
 
DNA Analysis
DNA Analysis DNA Analysis
DNA Analysis
 
Application of dna fingerprinting
Application of dna fingerprintingApplication of dna fingerprinting
Application of dna fingerprinting
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 

More from Mimi Harvill

Civil disobedience cja 324
Civil disobedience cja 324Civil disobedience cja 324
Civil disobedience cja 324Mimi Harvill
 
Racial profiling and response cja 344
Racial profiling and response cja 344Racial profiling and response cja 344
Racial profiling and response cja 344Mimi Harvill
 
Jury nullification cja 344
Jury nullification cja 344Jury nullification cja 344
Jury nullification cja 344Mimi Harvill
 
Stanford experiment cja 344
Stanford experiment cja 344Stanford experiment cja 344
Stanford experiment cja 344Mimi Harvill
 
Cultural diversity issues cja 344
Cultural diversity issues cja 344Cultural diversity issues cja 344
Cultural diversity issues cja 344Mimi Harvill
 
Lapd news article cja 394
Lapd news article cja 394Lapd news article cja 394
Lapd news article cja 394Mimi Harvill
 
Victims' rights fair and equal cja 394
Victims' rights  fair and equal cja 394Victims' rights  fair and equal cja 394
Victims' rights fair and equal cja 394Mimi Harvill
 
Cultural diversity and ageism1
Cultural diversity and ageism1Cultural diversity and ageism1
Cultural diversity and ageism1Mimi Harvill
 

More from Mimi Harvill (8)

Civil disobedience cja 324
Civil disobedience cja 324Civil disobedience cja 324
Civil disobedience cja 324
 
Racial profiling and response cja 344
Racial profiling and response cja 344Racial profiling and response cja 344
Racial profiling and response cja 344
 
Jury nullification cja 344
Jury nullification cja 344Jury nullification cja 344
Jury nullification cja 344
 
Stanford experiment cja 344
Stanford experiment cja 344Stanford experiment cja 344
Stanford experiment cja 344
 
Cultural diversity issues cja 344
Cultural diversity issues cja 344Cultural diversity issues cja 344
Cultural diversity issues cja 344
 
Lapd news article cja 394
Lapd news article cja 394Lapd news article cja 394
Lapd news article cja 394
 
Victims' rights fair and equal cja 394
Victims' rights  fair and equal cja 394Victims' rights  fair and equal cja 394
Victims' rights fair and equal cja 394
 
Cultural diversity and ageism1
Cultural diversity and ageism1Cultural diversity and ageism1
Cultural diversity and ageism1
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 

Criminology in the future cja 314

  • 1. CRIMINOLOGY IN THE FUTURE By: Candace Gallegos, Brian Wetjen, (Mimi) Carole Harvill, Jesse Palmer, Michelle Majette
  • 2. Outline • Predictive Policing • Biometrics • DNA • Future Problems • Cybercrimes
  • 3. Predictive policing • Hot spots – crime mapping • DATA • Geographic • Man power
  • 4. Biometrics • Face • Voice • Fingerprints • DNA
  • 6. DNA---interrogation that uses an actual fragment of a human being to obtain highly personal information Familial DNA search does not substantiate probable cause---yields unreasonable search and seizure There is a fine line between true justice and inalienable rights
  • 7. An ISP owns digital data stored in the maintains records of consumer information; traffic, content data, email, text messaging, and mobile phone usage. There is a fine line between true justice and inalienable rights Cybercrime---digital tracking of personal information
  • 8. Predictive Policing---identifying probable crime The probable area is a suspicious area; therefore an individual in this location is, by default, under suspicion. There is a fine line between true justice and inalienable rights
  • 9. What & Where is DNA? DNA is a grouping of biological organisms that are passed from adults to their off-springs. DNA is found inside a special cell called the nucleus and is in a very small package called a chromosome.
  • 10. The Path of DNA? The German biochemist Frederich Miescher first observed DNA in the late 1800s. DNA analysis was introduced into policing in 1986 when officers in central England use it to solve the sexual assault case of two young girls.
  • 11. The Path of DNA? The German biochemist Frederich Miescher first observed DNA in the late 1800s. DNA analysis was introduced into policing in 1986 when officers in central England use it to solve the sexual assault case of two young girls.
  • 12. How does DNA work in Policing? • Forensic Scientist scan 13 DNA regions (loci) that vary from person to person and use it to create a DNA profile. • This process called DNA fingerprinting is then used to test the samples that have been collected from a crime scene or victim. • Other ways that DNA is used are: • Exonerate a suspect. • Identify victims in a catastrophe. • Establish Paternity. • Identify endangered species. • Match organ donors. • Authenticate consumables such as caviar and wine.
  • 13.
  • 14. The future of & problems with DNA FUTURE • In the future scientists and criminalists are wanting to retrieve DNA samples at from a person at birth and store it for future. • Combine DNA from all countries into one main database. PROBLEMS • The public’s interest in the violation of their privacy. • People are not wanting to have their DNA information stored and it may or may not be used.
  • 16. CYBERCRIME • DEFINITION – Any crimes that involve the use of computers or the manipulation of digital data as well as any violation of a federal or state cyber crime statute. • EXAMPLE OF CYBERCRIMES – Phishing – Hacking
  • 17. CYBERCRIME • CRIME-FIGHTING METHODOLOGIES – FBI cybercrime spyware program: Computer and Internet Protocol Address Verifier • In existence since 2004 but went public in 2007 • Used to track the source of e-mail bomb threats against Timberline High School in Washington State • Where able to catch and convict the subject based on evidence obtained with the CIPAV
  • 20. Bibliography Ferguson, A. G. (2011, November 28). “Predictive Policing” and the Fourth Amendment. Retrieved from American Criminal Law Review: http://www.americancriminallawreview.com/Drupal/blogs/blog- entry/%E2%80%9Cpredictive-policing%E2%80%9D-and-fourth-amendment-11-28- 2011 Risher, M. T. (2012, April 26). “Utilizing DNA Technology to Solve Cold Cases Act of 2011”. Retrieved from American Civil Liberties Union: http://www.aclu.org/files/assets/aclu_testimony_on_familal_searching_2012_04_2 4.pdf Risling, G. (2012, July 1). 'Predictive Policing' Technology Lowers Crime In Los Angeles. Retrieved from Huffington Post: http://www.huffingtonpost.com/2012/07/01/predictive-policing-technology-los- angeles_n_1641276.html Rodriguez, K. (2011, August 25). Dangerous Cybercrime Treaty Pushes Surveillance and Secrecy Worldwide . Retrieved from Electronic Frontier Foundation: https://www.eff.org/deeplinks/2011/08/cybercrime-treaty-pushes-surveillance- secrecy-worldwide Scientific American. (2011, November 22). Stop the Genetic Dragnet. Retrieved from Scientific American: http://www.scientificamerican.com/article.cfm?id=stop-the- genetic-dragnet
  • 21. CYBERCRIME • REFERENCES Begun, D. (2009). FBI Uses Spyware to Capture Cyber Criminals. Retreived 13:30, Oct 26, 20012, from Hot Hardware: www.hothardware.com/news/FBI. Schmalleger, F. (2012). Criminology today: An integrative introduction. (6th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. Chapter 13, pages 371, 373, and 374.

Editor's Notes

  1. DNA sampling is not an advancement of fingerprinting. Fingerprints can provide valuable information but it is incomparable to DNA analysis. A DNA sample can provide personal information about an individual such as hair color, behavioral traits, predisposition to diseases, and familial affiliations.This detailed “interrogation” is valuable to law enforcement because it is very specific to a particular individual. Matching a DNA sample from the crime scene to a sample in CODIS can be precise (Scientific American, 2011). If a DNA sample does not match any samples in CODIS, a secondary search is conducted. Familial searching provides DNA matches that are similar. Theoretically, close relatives will have similar DNA patterns. Analysis of familial searching will provide several, possibly hundreds, of similar DNA matches. These individuals are now possible suspects to a crime in which they may have no connection (Risher, 2012). An innocent citizen is now under suspicion and interrogation. This can be perceived as a violation of the Fourth Amendment; unreasonable search and seizure. The information obtained from the familial DNA search may not substantiate probable cause. DNA sampling is a valuable tool the law enforcement should be cognizant of the “fine line” between true justice and inalienable rights.
  2. The Electronic Frontier Foundation (EFF), a foundation that protects an individual's Fourth Amendment “digital” rights, argues that the individuals freedom is breached when law enforcement can access sensitive information received from an Internet Service Provider (ISP). The ISP maintains records of consumer information; traffic, content data, email, text messaging, and mobile phone usage. The ISP owns this content; it is at their discretion to provide information to law enforcement agencies. Law enforcement does not need to prove probable cause, mere suspicion of criminal behavior is sufficient to request consumer information from the ISP (Rodriguez, 2011).
  3. Predictive policing uses statistical data identify an area of probable crime. This is advantageous in preventative policing because law enforcement can assess the future outcome the crime data and provide adequate protection to the community (Risling, 2012). The probable area is a suspicious area; therefore an individual in this location is, by default, under suspicion. For example, a man crosses the street hurriedly, and he is carrying a briefcase. In a typical town, one might suppose the man is late for work and is hastily walking to his car. If this town is identified as an area of probable crime this man is acting in a suspicious manner. A police officer would identify him as behaving suspiciously and stop and question him. In both situations the man exhibits the same behavior but the statistics of predictive policing declare him a probable suspect. This individual is assumed guilty without probable cause (Ferguson, 2011). He is an innocent citizen, he has committed no crime yet he lost the personal freedom of walking down the street carrying a briefcase.
  4. The German biochemistFrederichMiescher first observed DNA in the late 1800s, but nearly a century passed on it until the structure of the DNA molecule and realized its central importance to biology.DNA was first used by officers from central England when they approached Dr. Alec Jeffreys of the University of Leicester to ask whether this new technology might be able to assist in the investigation of two potentially linked sexual assault murders of two young girls. Jeffreysanalayzed samples from the deceased girls and developed DNA profiles of the perpetrator in each crime which were found to be identical.
  5. The German biochemistFrederichMiescher first observed DNA in the late 1800s, but nearly a century passed on it until the structure of the DNA molecule and realized its central importance to biology.DNA was first used by officers from central England when they approached Dr. Alec Jeffreys of the University of Leicester to ask whether this new technology might be able to assist in the investigation of two potentially linked sexual assault murders of two young girls. Jeffreysanalayzed samples from the deceased girls and developed DNA profiles of the perpetrator in each crime which were found to be identical.
  6. Any type of organism can be identified by examination of DNA sequences unique to that species. This is what Forensic Scientist do when they are given a DNA sample such as saliva, skin cells or blood found at a crime scene. DNA identification can be quite effective if used intelligently, it has a number other than aiding in solving a crime, it can be used to identify bodies in a mass quantities such as September 11th and finding family members and protecting endangered species.
  7. -Phishing, “an Internet-based scam to steal valuable information such as credit-card numbers, Social Security number, user IDs, and passwords.-Example: fake bank emails asking for log-in info or emails from unknown sources stating you have be awarded money, but you must send them money to receive it.-Hackers are people who use computers for exploration and exploitation.Some hackers such as disgruntled ex-employees don’t hack to steal information but rather to destroy or alter data.
  8. . Because spyware can invade the right of privacy, it has it’s limitation on information it is allowed to retrieve such as actual files, e-mails, and logged keystrokes. This is not to say that spyware does not exist that can identify these things, but as far as the public knows, the government puts a buffer on their capabilities.