SlideShare a Scribd company logo
1 of 17
Computers, Technology,
and
Criminalistics in
Policing
After studying this chapter, the student should be able to:
Describe Computers in Policing.
LO2 Discuss Fingerprint Technology.
Discuss Modem Forensics or Criminalistics.
Discuss DNA Profiling (Genetic Fingerprinting),
Computers, technology, and modern forensics or criminalistics
have revolutionized policing and have made die police more
effective in crime-fighting and other duties. Modern technology
is very familiar to the students reading this text. However, many
might not be aware diat little was known of this technology on
the day they were bom. The past few decades have seen
advances in technology that most of us would never have
foreseen. The computer chip has revolutionized society. The
criminal justice system and die police, in particular, have
benefited greatly from this technological revolution. This
chapter will discuss computers in policing, fingerprint
technology, modern forensics or criminalistics, and DNA
profiling (genetic fingerprinting).
Describe Computers in Policing
In 1964, St. Louis was die only city in die United States with a
computer system for its police department. By 1968, 10 states
and 50 cities had computer-based criminal justice information
systems. Today, almost every law enforcement agency uses
computers in many phases of their operations. Computer use in
police work has increased exponentially since 1964.
The following sections discuss the most commonly used
applications of computers in police work.
Computer-Aided Dispatch
Before the computer revolution, the police communications
system was slow and cumbersome. A citizen would call the
police with a seven-digit telephone number. A police telephone
operator would take the information, write it on an index card,
and put the card on a conveyor belt, where it would travel to die
dispatcher's desk. The dispatcher would then manually search
maps and records for the police car diat covered die area from
which the call originated and then call the car, giving die
officer all the information from the index card. All records were
kept manually.
Computers, Techr«*ogy, and Criminalistics in Policing "195
Computers, Technology, and Criminalistics in Policing 197
o
I a
i
z
I
196
Computers, Technology, and Criminalistics in Policing 197
(
computer-aided dispatch (CAD)
System that allows almost immediate communication between
the police dispatcher and police units in the field.
, , Log into
www.cengagebrain.com
- £ to practice your vocabulary with flash cards and more.
)
(
196
)The 911 emergency telephone number system was introduced
by American Telephone and Telegraph (AT&T) in 1968. The
most recent available data indicate diat 92 percent of local
police departments and 94 percent of sheriffs offices
participated in an emergency 911 system. In addition, 73
percent of local police departments and 71 percent of sheriffs'
offices had enhanced 911 systems, capable of automatically
displaying information such as a caller's phone number, address,
and special needs. (U.S. Department of Justice, Bureau of
Justice Statistics 2; Hickman and Reaves, Local Police lj
Hickman and Reaves, Sheriffs Offices 1)
Today computi allows almost immediate communication
between the police dispatcher and police units in the field.
Numerous CAD system software packages are available for
purchase by police departments. With typical CAD systems,
after a 911 operator takes a call from a citizen, the operator
codes the information into the computer, and die information
immediately flashes on die dispatchers screen. The CAD system
prioritizes the calls on the dispatchers screen,
Critical Issues in Policing
putting more serious calls (such as crimes in progress and heart
attacks) above less serious calls (such as past crimes and
nonemergency requests for assistance). The system verifies the
caller's address and telephone number, as well as determining
the most direct route to the location. The system also searches a
database for dangers near die location to which the officers are
responding, calls from the same location within the last 24
hours, and any previous history of calls from that location. The
CAD system constandy maintains the status of each patrol unit.
In this way, the dispatcher knows which units are available and
where all units are located. The system also determines which
patrol unit is closest to the location needing police assistance.
Some CAD systems have automatic transponders within patrol
units. These enable dispatch personnel to monitor visually all
patrol vehicles via a computer monitor and to assign them in
coordination widi this computer-generated information.
Enhanced CAD (Enhanced 911, or E911) The technology
director for the National Emergency Number Association
reports that 96 percent
Computers, Technology, and Criminalistics in Policing 197
of the nation is covered by dispatch centers that have enhanced
911 capabilities. (Alford)
With an E911 system, when a person calls 911 for assistance,
vital information is immediately flashed on a screen in front of
the operator. The screen gives die exact address of the
telephone being used; die name of the telephone subscriber;
whedier it is a residence, business, or pay telephone; the police
patrol beat it is on; the nearest ambulance; and the closest fire
department. This system gives the police the ability to assist
people at risk even if they cannot communicate because of
illness, injury, or an inability to speak English. For example, if
a sick or injured person initiates a call to 911 for assistance and
dien passes out or can no longer continue the conversation for
some other reason, the police, having the information in the
computer, are still able to respond with assistance.
Some enhanced CAD and enhanced 911 systems, use mobile
digital tisials (MDTs) in each patrol unit. In systems using
MDTs, voice communications are replaced by electronic
transmissions that appear on an officer's MDT, a device put into
a police vehicle that allows the electronic transmission of
messages between die police dispatcher and the officer in the
field. Officers receive messages via a computer screen and
transmit messages via a keyboard.
The combination of geographic information systems (GIS),
global positioning systems (GPS), and automatic vehicle
location (AVL) widi CAD and MDT software has increased die
ability of departments to control and monitor dieir patrol
functions. A department can quickly trace an officer's vehicle
location when an officer is incapacitated and cannot verbally
communicate his or her
location. These systems also enable dispatchers to quickly
determine which patrol units are nearest to a reported
emergency incident so die closest can be dispatched to the
scene.
Cell Phone Technology Today, nearly half
of all 911 calls are placed from a cell phone, and most
sophisticated 911 systems have the ability to trace the cell
phone or get a location from which die call is coming. This aids
the police greatly. As an example, in July 2006, an 18-year-old
woman was taken from die deserted streets of lower Manhattan
in die early morning hours to a seedv hotel I in Weehawken,
New Jersey, where she was raped and murdered. The suspect
stuffed die victims body into a suitcase and dumped it in a trash
bin behind an apartment building two blocks away. He then
drove back to New York Cits and registered into another hotel.
Police were able to find the suspect because he had taken the
victim's cell phone and used it to make some calls to his mother
and girlfriend. Police started their investigation by tracking her
cell phone, which led them to the people the killer had called.
The cell phone number appeared on caller IDs on the phones die
killer had called. The police were able to take him into custody
shortlv thereafter. (Baker Al, B5)
R911 is a way for the police to contact the community by
telephone in the event of an emergency or serious situation, by
a simple digital click—much more quickly and over a larger
area than if die officers had to go door to door to notify
residents. This technology was first used in DuPage County,
Illinois, in 1996 and has been utilized by many municipalities
since die terrorist attacks of September 11, 2001. It was used
very successfully in Arlington, Virginia, following die terrorist
attack on the Pentagon and enabled die rapid mobilization of
off-duty officers. (Daigneau 44-45) During the California
wildfires of
October 2007, San Diego mobile digital terminal (MDT) city
officials implemented A device put into a police a reverse
911 system with vehide ^ ^ automated warning calls
electronic transmission of going to residents, urging
mesSages between die police diem to evacuate. (Time 35)
dispatcher ^ &e officer
in the field.
Log into www.cengagebrain.com to practice your vocabulary
with flash cards and more.
(
National Crime Information Center (NCIC)
National Crime Information Center (NCIC) Computerized
database of criminal information maintained by the FBI.
automated crime analysis
The automated collection and
analysis of data regarding c
rime
(when, where, who, what, how,
and why) to discen criminal
patterns and assist in the effective
assignment of personnel to
combat crime,
m
t
Log into
www.cengagebrain.com
, w-
to practice your vocabulary with » flash cards and more.
)Automated Databases
As we have come into the twenty-first century, computer
technology is doing dungs previously unimaginable in policing.
The availability of automated databases has revolutionized
police work. An automated database is an enormous electronic
filing cabinet diat is capable of storing information and
retrieving it in any desired format.
The FBI created a major automated database, the
National Crime Information Center (NfCIC) in 1967.
The NCIC collects and retrieves data about people wanted for
crimes anywhere in the United States; stolen and lost property,
including stolen automobiles, license plates, identifiable
property, boats, and securities; and other criminal justice
information. The NCIC also contains criminal history files and
die status (prison, jail, probation, or parole) of criminals. The
NCIC has millions of active records, which are completely
automated by computer. The NCIC provides virtually
uninterrupted operation day or night, seven days a week.
Although the NCIC
is operated by the FBI, approximately 70 percent of its use is by
local, state, and other federal agencies.
In 2000, the NCIC was renamed NCIC 2000 and provided a
major upgrade to the services mentioned above, and extended
these services down to the patrol car and the mobile officer.
With this system, a police officer can identify fugitives and
missing persons quickly using automated fingerprint
identification system (AFIS) technology, which will be
discussed later in this chapter. The officer places a subjects
finger on a fingerprint reader in a patrol car, and the reader
transmits the image to the NCIC computer. Within minutes, the
computer forwards a reply to die officer. A printer installed in
patrol cars allows officers to get copies of a suspects
photograph, fingerprint image, signature, and tattoos, along
with composite drawings of unknown subjects. The printer can
also receive images of stolen goods, including cars. The new
system provides for enhanced name searches (based on
phonetically similar names); prisoner, probation and parole
records; convicted sex offender registries; and other services.
Two other major automated forensic databases are discussed
later in this chapter: die Integrated Automated Fingerprint
Identification System (IAFIS) and the Combined DNA Index
System (CODIS).
Automated Crime Analysis (Crime Mapping)
Numerous software application programs aid the police in
automated c analysis or crime mapping. Crime analysis entails
die collection and analysis of data regarding crime (when,
where, who, what, how, and why) to discern criminal patterns
and assist in die effective assignment of personnel to combat
crime. The most basic use of crime analysis is to determine
where and when crimes occur so that personnel can be assigned
to catch perpetrators in die act of committing the crime or to
prevent them from committing it.
The forerunner in the use of modern sophisticated automated
crime analysis was the New York City Police Departments
CompStat program. CompStat provides instant statistical
updating of all reported crimes, arrests, and other police
activities, such as traffic and other citations. This program and
its movie screen-type visual displays provide the framework for
the weekly crime analysis meetings at the New York City Police
Department (NYPD)'s headquarters during which precinct
commanders must account for all increases in crime and provide
strategies to combat these crimes. The keynote of the NYPD
reengineering program of the mid-1990s and the envy of police
departments diroughout the world, Comp-Stat is a process that
began to evolve in early 1994 when, after changes in the
leadership of many of the NYPD's bureaus, disturbing
information emerged. It appeared diat the NYPD did not know
most of its own current crime statistics, and diere was a time
lag of three to six months in its statistical reporting methods.
Upon learning this, the department made a concerted effort to
generate crime activity data on a weekly basis. CompStat has
been credited witii causing crime in New York City to drop to
levels not seen since die 1960s. Numerous cities are now using
CompStat programs and other forms of automated crime
analysis and crime mapping.
o f
Q-0
198
Computers, Technology, and Criminalistics in Policing 197
Computers, Technology, and Criminalistics in Policing 197
198
Critical Issues in Policing
(
computer-aided investigations (computer-aided case
management)
The use of computers to perform case management
and other
functions in investigations.
Log into
www.cengagebrain.com
to practice your vocabulary with flash cards and more.
)
q fcj z MJ SB
O CO co 5
DC LU
<" Q- Z O Lu
o o
LU =3
9
< LU
2 Q
9 D
Computer-aidetl investigation and
are
revolutionizing the criminal investigation process.
Since the 1990s, British police have operated a computer-aided
investigation system called the Home Office Large Major
Enquiry System (HOLMES, which is a reference to the
legendary fictional detective Sherlock Holmes). It is a
sophisticated computer program developed for British
investigators to aid them in managing complex investigations.
(In Great Britain, an investigation is called an enquiry.)
HOLMES is a complete case management system that can
retrieve, process, organize, recognize, interrelate, and retrieve
all aspects of information on a case. It also keeps track of
ongoing progress, or die lack of it, in investigations. The
system was created in response to the infamous Yorkshire
Ripper case, in which 13 women were killed between 1974 and
1981. When the perpetrator was finally apprehended in 1981, it
was discovered that he had been detained and questioned by at
least six different police departments in connection widi the
attacks. Because sharing of information on related eases was so
cumbersome for the neighboring forces at that time, the
connection was never made. (Sutter 50-52)
Despite the computers influence in the investigative process, it
will never replace the investigator. The successful investigation
of crimes and other police incidents will always primarily
depend on the intelligence and hard work of investigators and
police officers. As a prime example, recall the 2002 Beltway
Sniper case, a series of random shootings that terrorized
Washington, D.C. and its suburbs. The Beltway snipers killed
ten people and wounded another three. Despite using geographic
profiling and other computer models in one of die most intense
manhunts in U.S. criminal history, the suspects were identified
based on leads provided by one of the snipers about a seemingly
unrelated case in Alabama. Moreover, despite the formation of a
massive law enforcement dragnet for the suspects, diey were
caught after an alert motorist saw diem sleeping in their car 50
miles from die closest crime scene. (National Institute of Justice
Journal 11-13)
Mobile Technology
The concept of mobile computing was introduced several
decades ago with the development and use of CAD and MDTs
(discussed earlier in this chapter), which supplied officers with
computer-aided dispatch data. Since then, mobile
computerization and technology has expanded exponentially.
Current systems give patrol officers the tools they need to
function as if they were in an office while remaining out in the
community performing police work. These systems provide
patrol officers with records management systems (RMS),
computer-aided dispatch, mobile data terminals, mobile wireless
report entry (MRE), AVL/GPS mapping, and many other
capabilities once only available in traditional offices. Mobile
technologies enable patrol officers to access real-time data and
file reports via laptops in patrol vehicles or through personal
communication devices, such as a personal digital assistant
(PDA) or BlackBerry. Mobile technology minimizes routine
paperwork that must be done at the station house or police
headquarters, thus
reducing the amount of time that officers must be "out of
service."
One of die latest mobile technological innovations is
Computers, Technology, and Criminalistics in Policing 190"
Computers, Technology, and Criminalistics in Policing 199"
(
roof of a patrol vehicle or in its light bar. (Gordon and Wolf 8-
13)
LPR technology was initially designed for use in parking lots
(to record die time a vehicle entered), for access control
(allowing authorized vehi
cles into a secure area), and for paying tolls. This technology is
now also being used for border control and traffic fine
enforcement.
lOi
Discuss Fingerprint Technology
Fingerprints have historically offered an infallible means of
personal identificatio
n. Criminal identification by means of fingerprints is one of the
most potent factors in apprehending fugitives who might
otherwise escape arrest and continue their criminal activities
indefinitely. This type of identification makes possible an
accurate de
termination of a persons pre
vious arrests and convictions, which results in the imposition of
more equitable sentences by the judiciary. In addition, this
)
license plate recognition (LPR) technology
Employs cameras and computer software to discern the letters
and numbers of vehicle license plates and then compares them
with records contained in state and federal databases, including
records from the department of motor vehicles and NCIC,
inked prints (ten-prints)
Result of the process of rolling each finger onto a ten-print
card.
latent prints
Fingerprint impressions left at a crime scene.
,i, Log intowww.cengagebrain.com * far to practice your
vocabulary with flash cards and more.
License Plate Recognition (LPR) camera.
license plate recognition (LPR) technology. LPR technology can
be used to search for stolen vehicles, vehicles listed in AMBER
Alerts, or vehicles driven by wanted persons. This technology
employs cameras and computer software to discern the letters
and numbers of vehicle license plates and then compares them
with records contained in state and federal databases, including
records from the department of motor vehicles and the NCIC.
Imaging cameras can be placed on the front or
system of identification enables die prosecutor to present his or
her case in light of the offenders previous record. It provides
probation officers and parole board members with definite
information upon which to base their judgment in dealing with
criminals in their jurisdiction.
Fingerprints may be recorded on standard fingerprint cards or
recorded digitally and transmitted electronically for
comparison. By comparing fingerprints at the scene of a crime
with the fingerprint record of suspects, officials can establish
absolute proof of the presence or identity of a person.
Basic Categories of Fingerprints
There are two basic categories of fingerprints: inked prints or
ten-prints, and latent prints.
+ Inked prints or ten-prints are the result of the
process of rolling each finger onto a ten-print card (each finger
is rolled onto a separate box on die card) using fingerprinting
ink. Inked prints are kept on file at local police departments,
state criminal justice information agencies, and the FBI. When a
person is arrested, he or she is fingerprinted and those inked
prints are compared with fingerprints on file of known
criminals. Inked prints or ten-prints are also taken for numerous
other types of investigations such as employment background
and license applications.
+ Latent prints are impressions left on evidence. These prints
may be "lifted" and dien compared with inked prints on file in
order to establish the identity of the perpetrator. Latent prints
are impressions produced by the ridged skin on human fingers,
palms, and soles of the feet. Latent print examiners analyze and
compare latent prints to known prints of individuals in an effort
to make identifications or exclusions. The uniqueness,
permanence, and arrangement of the friction ridges allow
examiners to positively match two prints and to determine
whether an area of a friction ridge impression originated from
one source to the exclusion of others.
1
1
200
1
1
2O0
Critical Issues in Policing
Computers, Technology Revolutionize Policing

More Related Content

Similar to Computers, Technology Revolutionize Policing

Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Technology in crime fighting (project)
Technology in crime fighting  (project)Technology in crime fighting  (project)
Technology in crime fighting (project)Latoya Moncrieffe
 
Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Lillian Ekwosi-Egbulem
 
Digital Technologies: Today’s New Crime Fighters
 Digital Technologies: Today’s New Crime Fighters Digital Technologies: Today’s New Crime Fighters
Digital Technologies: Today’s New Crime FightersConnected Futures
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementBernard Marr
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docxtodd271
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrimeRoel Palmaers
 
M.N.Krishnamurthy IPS Director General of Police (Administration , Community...
M.N.Krishnamurthy IPS Director  General of Police (Administration , Community...M.N.Krishnamurthy IPS Director  General of Police (Administration , Community...
M.N.Krishnamurthy IPS Director General of Police (Administration , Community...IPPAI
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime PredictionProdapt Solutions
 
Crime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And DatabasesCrime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And Databasesafraidferry231
 
Crime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And DatabasesCrime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And Databasesafraidferry231
 
Urban Shield 2015 Menken Blog
Urban Shield 2015 Menken BlogUrban Shield 2015 Menken Blog
Urban Shield 2015 Menken BlogJeff Menken
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
The Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New YorkThe Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New YorkGuardian Security Training
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Magnum Defense Marketing Deck
Magnum Defense Marketing DeckMagnum Defense Marketing Deck
Magnum Defense Marketing DeckMichael Goldstein
 

Similar to Computers, Technology Revolutionize Policing (20)

Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
L Scope
L ScopeL Scope
L Scope
 
Technology in crime fighting (project)
Technology in crime fighting  (project)Technology in crime fighting  (project)
Technology in crime fighting (project)
 
Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement
 
Digital Technologies: Today’s New Crime Fighters
 Digital Technologies: Today’s New Crime Fighters Digital Technologies: Today’s New Crime Fighters
Digital Technologies: Today’s New Crime Fighters
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law Enforcement
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrime
 
M.N.Krishnamurthy IPS Director General of Police (Administration , Community...
M.N.Krishnamurthy IPS Director  General of Police (Administration , Community...M.N.Krishnamurthy IPS Director  General of Police (Administration , Community...
M.N.Krishnamurthy IPS Director General of Police (Administration , Community...
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Crime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And DatabasesCrime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And Databases
 
Crime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And DatabasesCrime Fighting Computer Systems And Databases
Crime Fighting Computer Systems And Databases
 
Urban Shield 2015 Menken Blog
Urban Shield 2015 Menken BlogUrban Shield 2015 Menken Blog
Urban Shield 2015 Menken Blog
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
The Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New YorkThe Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New York
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
777
777777
777
 
Magnum Defense Marketing Deck
Magnum Defense Marketing DeckMagnum Defense Marketing Deck
Magnum Defense Marketing Deck
 

More from maxinesmith73660

You have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docxYou have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docxmaxinesmith73660
 
You have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docxYou have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docxmaxinesmith73660
 
You have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docxYou have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docxmaxinesmith73660
 
You have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docxYou have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docxmaxinesmith73660
 
You have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docxYou have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docxmaxinesmith73660
 
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docxYou have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docxmaxinesmith73660
 
You have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docxYou have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docxmaxinesmith73660
 
You have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docxYou have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docxmaxinesmith73660
 
You have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docxYou have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docxmaxinesmith73660
 
You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxmaxinesmith73660
 
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docxYou have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docxmaxinesmith73660
 
You have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docxYou have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docxmaxinesmith73660
 
You have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docxYou have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docxmaxinesmith73660
 
You have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docxYou have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docxmaxinesmith73660
 
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docxYou have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docxmaxinesmith73660
 
You have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docxYou have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docxmaxinesmith73660
 
You have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxYou have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxmaxinesmith73660
 
You have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docxYou have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docxmaxinesmith73660
 
You have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docxYou have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docxmaxinesmith73660
 
You have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docxYou have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docxmaxinesmith73660
 

More from maxinesmith73660 (20)

You have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docxYou have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docx
 
You have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docxYou have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docx
 
You have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docxYou have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docx
 
You have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docxYou have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docx
 
You have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docxYou have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docx
 
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docxYou have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
 
You have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docxYou have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docx
 
You have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docxYou have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docx
 
You have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docxYou have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docx
 
You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docx
 
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docxYou have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
 
You have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docxYou have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docx
 
You have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docxYou have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docx
 
You have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docxYou have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docx
 
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docxYou have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
 
You have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docxYou have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docx
 
You have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxYou have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docx
 
You have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docxYou have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docx
 
You have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docxYou have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docx
 
You have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docxYou have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docx
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Computers, Technology Revolutionize Policing

  • 1. Computers, Technology, and Criminalistics in Policing After studying this chapter, the student should be able to: Describe Computers in Policing. LO2 Discuss Fingerprint Technology. Discuss Modem Forensics or Criminalistics. Discuss DNA Profiling (Genetic Fingerprinting), Computers, technology, and modern forensics or criminalistics have revolutionized policing and have made die police more effective in crime-fighting and other duties. Modern technology is very familiar to the students reading this text. However, many might not be aware diat little was known of this technology on the day they were bom. The past few decades have seen advances in technology that most of us would never have foreseen. The computer chip has revolutionized society. The criminal justice system and die police, in particular, have benefited greatly from this technological revolution. This chapter will discuss computers in policing, fingerprint technology, modern forensics or criminalistics, and DNA profiling (genetic fingerprinting). Describe Computers in Policing In 1964, St. Louis was die only city in die United States with a computer system for its police department. By 1968, 10 states and 50 cities had computer-based criminal justice information systems. Today, almost every law enforcement agency uses computers in many phases of their operations. Computer use in
  • 2. police work has increased exponentially since 1964. The following sections discuss the most commonly used applications of computers in police work. Computer-Aided Dispatch Before the computer revolution, the police communications system was slow and cumbersome. A citizen would call the police with a seven-digit telephone number. A police telephone operator would take the information, write it on an index card, and put the card on a conveyor belt, where it would travel to die dispatcher's desk. The dispatcher would then manually search maps and records for the police car diat covered die area from which the call originated and then call the car, giving die officer all the information from the index card. All records were kept manually. Computers, Techr«*ogy, and Criminalistics in Policing "195 Computers, Technology, and Criminalistics in Policing 197
  • 3. o I a i z I 196 Computers, Technology, and Criminalistics in Policing 197 ( computer-aided dispatch (CAD) System that allows almost immediate communication between the police dispatcher and police units in the field. , , Log into www.cengagebrain.com - £ to practice your vocabulary with flash cards and more. ) ( 196 )The 911 emergency telephone number system was introduced by American Telephone and Telegraph (AT&T) in 1968. The most recent available data indicate diat 92 percent of local police departments and 94 percent of sheriffs offices participated in an emergency 911 system. In addition, 73 percent of local police departments and 71 percent of sheriffs' offices had enhanced 911 systems, capable of automatically displaying information such as a caller's phone number, address, and special needs. (U.S. Department of Justice, Bureau of Justice Statistics 2; Hickman and Reaves, Local Police lj Hickman and Reaves, Sheriffs Offices 1) Today computi allows almost immediate communication between the police dispatcher and police units in the field. Numerous CAD system software packages are available for purchase by police departments. With typical CAD systems,
  • 4. after a 911 operator takes a call from a citizen, the operator codes the information into the computer, and die information immediately flashes on die dispatchers screen. The CAD system prioritizes the calls on the dispatchers screen, Critical Issues in Policing putting more serious calls (such as crimes in progress and heart attacks) above less serious calls (such as past crimes and nonemergency requests for assistance). The system verifies the caller's address and telephone number, as well as determining the most direct route to the location. The system also searches a database for dangers near die location to which the officers are responding, calls from the same location within the last 24 hours, and any previous history of calls from that location. The CAD system constandy maintains the status of each patrol unit. In this way, the dispatcher knows which units are available and where all units are located. The system also determines which patrol unit is closest to the location needing police assistance. Some CAD systems have automatic transponders within patrol units. These enable dispatch personnel to monitor visually all patrol vehicles via a computer monitor and to assign them in coordination widi this computer-generated information. Enhanced CAD (Enhanced 911, or E911) The technology director for the National Emergency Number Association reports that 96 percent Computers, Technology, and Criminalistics in Policing 197 of the nation is covered by dispatch centers that have enhanced 911 capabilities. (Alford) With an E911 system, when a person calls 911 for assistance, vital information is immediately flashed on a screen in front of the operator. The screen gives die exact address of the telephone being used; die name of the telephone subscriber; whedier it is a residence, business, or pay telephone; the police
  • 5. patrol beat it is on; the nearest ambulance; and the closest fire department. This system gives the police the ability to assist people at risk even if they cannot communicate because of illness, injury, or an inability to speak English. For example, if a sick or injured person initiates a call to 911 for assistance and dien passes out or can no longer continue the conversation for some other reason, the police, having the information in the computer, are still able to respond with assistance. Some enhanced CAD and enhanced 911 systems, use mobile digital tisials (MDTs) in each patrol unit. In systems using MDTs, voice communications are replaced by electronic transmissions that appear on an officer's MDT, a device put into a police vehicle that allows the electronic transmission of messages between die police dispatcher and the officer in the field. Officers receive messages via a computer screen and transmit messages via a keyboard. The combination of geographic information systems (GIS), global positioning systems (GPS), and automatic vehicle location (AVL) widi CAD and MDT software has increased die ability of departments to control and monitor dieir patrol functions. A department can quickly trace an officer's vehicle location when an officer is incapacitated and cannot verbally communicate his or her location. These systems also enable dispatchers to quickly determine which patrol units are nearest to a reported emergency incident so die closest can be dispatched to the scene. Cell Phone Technology Today, nearly half of all 911 calls are placed from a cell phone, and most sophisticated 911 systems have the ability to trace the cell phone or get a location from which die call is coming. This aids the police greatly. As an example, in July 2006, an 18-year-old woman was taken from die deserted streets of lower Manhattan in die early morning hours to a seedv hotel I in Weehawken,
  • 6. New Jersey, where she was raped and murdered. The suspect stuffed die victims body into a suitcase and dumped it in a trash bin behind an apartment building two blocks away. He then drove back to New York Cits and registered into another hotel. Police were able to find the suspect because he had taken the victim's cell phone and used it to make some calls to his mother and girlfriend. Police started their investigation by tracking her cell phone, which led them to the people the killer had called. The cell phone number appeared on caller IDs on the phones die killer had called. The police were able to take him into custody shortlv thereafter. (Baker Al, B5) R911 is a way for the police to contact the community by telephone in the event of an emergency or serious situation, by a simple digital click—much more quickly and over a larger area than if die officers had to go door to door to notify residents. This technology was first used in DuPage County, Illinois, in 1996 and has been utilized by many municipalities since die terrorist attacks of September 11, 2001. It was used very successfully in Arlington, Virginia, following die terrorist attack on the Pentagon and enabled die rapid mobilization of off-duty officers. (Daigneau 44-45) During the California wildfires of October 2007, San Diego mobile digital terminal (MDT) city officials implemented A device put into a police a reverse 911 system with vehide ^ ^ automated warning calls electronic transmission of going to residents, urging mesSages between die police diem to evacuate. (Time 35) dispatcher ^ &e officer in the field. Log into www.cengagebrain.com to practice your vocabulary with flash cards and more. ( National Crime Information Center (NCIC) National Crime Information Center (NCIC) Computerized
  • 7. database of criminal information maintained by the FBI. automated crime analysis The automated collection and analysis of data regarding c rime (when, where, who, what, how, and why) to discen criminal patterns and assist in the effective assignment of personnel to combat crime, m t Log into www.cengagebrain.com , w- to practice your vocabulary with » flash cards and more. )Automated Databases As we have come into the twenty-first century, computer technology is doing dungs previously unimaginable in policing. The availability of automated databases has revolutionized police work. An automated database is an enormous electronic filing cabinet diat is capable of storing information and retrieving it in any desired format. The FBI created a major automated database, the National Crime Information Center (NfCIC) in 1967. The NCIC collects and retrieves data about people wanted for crimes anywhere in the United States; stolen and lost property, including stolen automobiles, license plates, identifiable property, boats, and securities; and other criminal justice information. The NCIC also contains criminal history files and die status (prison, jail, probation, or parole) of criminals. The NCIC has millions of active records, which are completely automated by computer. The NCIC provides virtually
  • 8. uninterrupted operation day or night, seven days a week. Although the NCIC is operated by the FBI, approximately 70 percent of its use is by local, state, and other federal agencies. In 2000, the NCIC was renamed NCIC 2000 and provided a major upgrade to the services mentioned above, and extended these services down to the patrol car and the mobile officer. With this system, a police officer can identify fugitives and missing persons quickly using automated fingerprint identification system (AFIS) technology, which will be discussed later in this chapter. The officer places a subjects finger on a fingerprint reader in a patrol car, and the reader transmits the image to the NCIC computer. Within minutes, the computer forwards a reply to die officer. A printer installed in patrol cars allows officers to get copies of a suspects photograph, fingerprint image, signature, and tattoos, along with composite drawings of unknown subjects. The printer can also receive images of stolen goods, including cars. The new system provides for enhanced name searches (based on phonetically similar names); prisoner, probation and parole records; convicted sex offender registries; and other services. Two other major automated forensic databases are discussed later in this chapter: die Integrated Automated Fingerprint Identification System (IAFIS) and the Combined DNA Index System (CODIS). Automated Crime Analysis (Crime Mapping) Numerous software application programs aid the police in automated c analysis or crime mapping. Crime analysis entails die collection and analysis of data regarding crime (when, where, who, what, how, and why) to discern criminal patterns and assist in die effective assignment of personnel to combat crime. The most basic use of crime analysis is to determine where and when crimes occur so that personnel can be assigned to catch perpetrators in die act of committing the crime or to prevent them from committing it. The forerunner in the use of modern sophisticated automated
  • 9. crime analysis was the New York City Police Departments CompStat program. CompStat provides instant statistical updating of all reported crimes, arrests, and other police activities, such as traffic and other citations. This program and its movie screen-type visual displays provide the framework for the weekly crime analysis meetings at the New York City Police Department (NYPD)'s headquarters during which precinct commanders must account for all increases in crime and provide strategies to combat these crimes. The keynote of the NYPD reengineering program of the mid-1990s and the envy of police departments diroughout the world, Comp-Stat is a process that began to evolve in early 1994 when, after changes in the leadership of many of the NYPD's bureaus, disturbing information emerged. It appeared diat the NYPD did not know most of its own current crime statistics, and diere was a time lag of three to six months in its statistical reporting methods. Upon learning this, the department made a concerted effort to generate crime activity data on a weekly basis. CompStat has been credited witii causing crime in New York City to drop to levels not seen since die 1960s. Numerous cities are now using CompStat programs and other forms of automated crime analysis and crime mapping.
  • 10. o f Q-0 198 Computers, Technology, and Criminalistics in Policing 197 Computers, Technology, and Criminalistics in Policing 197 198 Critical Issues in Policing ( computer-aided investigations (computer-aided case management) The use of computers to perform case management and other functions in investigations. Log into www.cengagebrain.com to practice your vocabulary with flash cards and more. )
  • 11.
  • 12. q fcj z MJ SB O CO co 5 DC LU <" Q- Z O Lu o o LU =3 9 < LU 2 Q 9 D Computer-aidetl investigation and are revolutionizing the criminal investigation process. Since the 1990s, British police have operated a computer-aided investigation system called the Home Office Large Major Enquiry System (HOLMES, which is a reference to the legendary fictional detective Sherlock Holmes). It is a sophisticated computer program developed for British investigators to aid them in managing complex investigations. (In Great Britain, an investigation is called an enquiry.) HOLMES is a complete case management system that can retrieve, process, organize, recognize, interrelate, and retrieve all aspects of information on a case. It also keeps track of ongoing progress, or die lack of it, in investigations. The system was created in response to the infamous Yorkshire Ripper case, in which 13 women were killed between 1974 and 1981. When the perpetrator was finally apprehended in 1981, it was discovered that he had been detained and questioned by at least six different police departments in connection widi the attacks. Because sharing of information on related eases was so cumbersome for the neighboring forces at that time, the
  • 13. connection was never made. (Sutter 50-52) Despite the computers influence in the investigative process, it will never replace the investigator. The successful investigation of crimes and other police incidents will always primarily depend on the intelligence and hard work of investigators and police officers. As a prime example, recall the 2002 Beltway Sniper case, a series of random shootings that terrorized Washington, D.C. and its suburbs. The Beltway snipers killed ten people and wounded another three. Despite using geographic profiling and other computer models in one of die most intense manhunts in U.S. criminal history, the suspects were identified based on leads provided by one of the snipers about a seemingly unrelated case in Alabama. Moreover, despite the formation of a massive law enforcement dragnet for the suspects, diey were caught after an alert motorist saw diem sleeping in their car 50 miles from die closest crime scene. (National Institute of Justice Journal 11-13) Mobile Technology The concept of mobile computing was introduced several decades ago with the development and use of CAD and MDTs (discussed earlier in this chapter), which supplied officers with computer-aided dispatch data. Since then, mobile computerization and technology has expanded exponentially. Current systems give patrol officers the tools they need to function as if they were in an office while remaining out in the community performing police work. These systems provide patrol officers with records management systems (RMS), computer-aided dispatch, mobile data terminals, mobile wireless report entry (MRE), AVL/GPS mapping, and many other capabilities once only available in traditional offices. Mobile technologies enable patrol officers to access real-time data and file reports via laptops in patrol vehicles or through personal communication devices, such as a personal digital assistant (PDA) or BlackBerry. Mobile technology minimizes routine paperwork that must be done at the station house or police headquarters, thus
  • 14. reducing the amount of time that officers must be "out of service." One of die latest mobile technological innovations is Computers, Technology, and Criminalistics in Policing 190" Computers, Technology, and Criminalistics in Policing 199" ( roof of a patrol vehicle or in its light bar. (Gordon and Wolf 8- 13) LPR technology was initially designed for use in parking lots (to record die time a vehicle entered), for access control (allowing authorized vehi cles into a secure area), and for paying tolls. This technology is now also being used for border control and traffic fine enforcement. lOi Discuss Fingerprint Technology Fingerprints have historically offered an infallible means of personal identificatio n. Criminal identification by means of fingerprints is one of the most potent factors in apprehending fugitives who might otherwise escape arrest and continue their criminal activities indefinitely. This type of identification makes possible an accurate de termination of a persons pre vious arrests and convictions, which results in the imposition of more equitable sentences by the judiciary. In addition, this ) license plate recognition (LPR) technology Employs cameras and computer software to discern the letters
  • 15. and numbers of vehicle license plates and then compares them with records contained in state and federal databases, including records from the department of motor vehicles and NCIC, inked prints (ten-prints) Result of the process of rolling each finger onto a ten-print card. latent prints Fingerprint impressions left at a crime scene. ,i, Log intowww.cengagebrain.com * far to practice your vocabulary with flash cards and more. License Plate Recognition (LPR) camera. license plate recognition (LPR) technology. LPR technology can be used to search for stolen vehicles, vehicles listed in AMBER Alerts, or vehicles driven by wanted persons. This technology employs cameras and computer software to discern the letters and numbers of vehicle license plates and then compares them with records contained in state and federal databases, including records from the department of motor vehicles and the NCIC. Imaging cameras can be placed on the front or system of identification enables die prosecutor to present his or her case in light of the offenders previous record. It provides probation officers and parole board members with definite information upon which to base their judgment in dealing with criminals in their jurisdiction. Fingerprints may be recorded on standard fingerprint cards or recorded digitally and transmitted electronically for comparison. By comparing fingerprints at the scene of a crime with the fingerprint record of suspects, officials can establish absolute proof of the presence or identity of a person. Basic Categories of Fingerprints There are two basic categories of fingerprints: inked prints or ten-prints, and latent prints. + Inked prints or ten-prints are the result of the process of rolling each finger onto a ten-print card (each finger
  • 16. is rolled onto a separate box on die card) using fingerprinting ink. Inked prints are kept on file at local police departments, state criminal justice information agencies, and the FBI. When a person is arrested, he or she is fingerprinted and those inked prints are compared with fingerprints on file of known criminals. Inked prints or ten-prints are also taken for numerous other types of investigations such as employment background and license applications. + Latent prints are impressions left on evidence. These prints may be "lifted" and dien compared with inked prints on file in order to establish the identity of the perpetrator. Latent prints are impressions produced by the ridged skin on human fingers, palms, and soles of the feet. Latent print examiners analyze and compare latent prints to known prints of individuals in an effort to make identifications or exclusions. The uniqueness, permanence, and arrangement of the friction ridges allow examiners to positively match two prints and to determine whether an area of a friction ridge impression originated from one source to the exclusion of others. 1 1 200 1 1 2O0 Critical Issues in Policing