SlideShare une entreprise Scribd logo
1  sur  21
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Chapter NineChapter Nine
External SystemsExternal Systems
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Learning ObjectivesLearning Objectives
 The history of and developments at theThe history of and developments at the
National Crime Information Center (NCIC)National Crime Information Center (NCIC)
 Uniform Crime ReportingUniform Crime Reporting andand National CrimeNational Crime
Victimization SurveyVictimization Survey
 National Incident-Based Reporting SystemNational Incident-Based Reporting System
 Potential Sources of government informationPotential Sources of government information
 Government vs. Commercial databaseGovernment vs. Commercial database
 Regional information sharing schemesRegional information sharing schemes
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Sources of InformationSources of Information
Two broad classifications of records aTwo broad classifications of records a
police officer might access:police officer might access:
 Public RecordsPublic Records – Available to the– Available to the
public and about something that haspublic and about something that has
happenedhappened
 Investigative RecordsInvestigative Records – About things– About things
that are going on. More restrictive sothat are going on. More restrictive so
a case in not compromised.a case in not compromised.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
External sources of information are oftenExternal sources of information are often
more extensive than local sources:more extensive than local sources:
 Offenders move around leaving an informationOffenders move around leaving an information
trailtrail
 Small agencies do not have the resources toSmall agencies do not have the resources to
maintain large or extensive databasesmaintain large or extensive databases
 Many crimes are complex and cross-Many crimes are complex and cross-
jurisdictionaljurisdictional
Sources of InformationSources of Information
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
National Crime Information CenterNational Crime Information Center
 First database with nationwide accessFirst database with nationwide access
 Each participating agency is responsibleEach participating agency is responsible
to enter, update and delete their ownto enter, update and delete their own
recordsrecords
 Local agencies can query NCIC through aLocal agencies can query NCIC through a
statestate control terminal agency (CTA)control terminal agency (CTA)
 TheThe Interstate Identification Index (III)Interstate Identification Index (III)
receives offender information from CTAsreceives offender information from CTAs
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
NCIC 2000NCIC 2000
 Has reduced fingerprint and photographicHas reduced fingerprint and photographic
information of wanted persons to digitalinformation of wanted persons to digital
informationinformation
 Allows agencies to submit sameAllows agencies to submit same
information in a digital formatinformation in a digital format
 Ultimately will allow police officers toUltimately will allow police officers to
access fingerprint and photograph dataaccess fingerprint and photograph data
from their patrol vehiclesfrom their patrol vehicles
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
 NCIC 2000 provides the softwareNCIC 2000 provides the software
application free of chargeapplication free of charge
 System is designed to run withSystem is designed to run with
standard computer andstandard computer and
communications equipmentcommunications equipment
 Local agencies must acquire theLocal agencies must acquire the
hardware necessary to run the softwarehardware necessary to run the software
NCIC 2000NCIC 2000
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Legal questionsLegal questions
A police officer can checkA police officer can check
for warrantsfor warrants
during a brief detention.during a brief detention.
 Can the officer take theCan the officer take the
person’s fingerprints?person’s fingerprints?
 Is the officer escalatingIs the officer escalating
the detention by takingthe detention by taking
the prints?the prints?
 Is taking a fingerprintIs taking a fingerprint
during a detention aduring a detention a
seizure (4seizure (4thth
amendment)?amendment)?
Photograph provided by Cross Match Technologies, Inc
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Safety IssuesSafety Issues
During a traffic stop, the violator has moreDuring a traffic stop, the violator has more
prefect information than the officer.prefect information than the officer.
 The violator knows if he was onlyThe violator knows if he was only
speeding or fleeing from a crime scene.speeding or fleeing from a crime scene.
 With this lack of information, approachingWith this lack of information, approaching
the violator for a print is dangerous.the violator for a print is dangerous.
 The violator could take this opportunity toThe violator could take this opportunity to
flee or attack the officerflee or attack the officer
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Uniformed Crime ReportsUniformed Crime Reports
The U.S. Department of Justice hasThe U.S. Department of Justice has
two programs that gather statisticstwo programs that gather statistics
on crime:on crime:
 Uniformed Crime Reports (UCR)Uniformed Crime Reports (UCR)
 National Crime Victimization SurveyNational Crime Victimization Survey
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
UCRUCR
 Agencies voluntarily report crimes to theAgencies voluntarily report crimes to the
FBI monthlyFBI monthly
 Consists of crimes categorized as Part I orConsists of crimes categorized as Part I or
Part IIPart II
 Eight Part I crimes: Homicide, ForcibleEight Part I crimes: Homicide, Forcible
Rape, Robbery, Aggravated Assault,Rape, Robbery, Aggravated Assault,
Burglary, Larceny/Theft, Motor VehicleBurglary, Larceny/Theft, Motor Vehicle
Theft, and ArsonTheft, and Arson
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
National Crime VictimizationNational Crime Victimization
SurveySurvey
NCVS statistics come from the victimsNCVS statistics come from the victims
themselves.themselves.
 Complements the UCR informationComplements the UCR information
 Many victims do not report crimesMany victims do not report crimes
 UCR and NCVS together provide aUCR and NCVS together provide a
more comprehensive picture on crimemore comprehensive picture on crime
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
DifferencesDifferences
UCRUCR
 Rape: only reportsRape: only reports
female victimsfemale victims
 Legal definitions ofLegal definitions of
crimes importantcrimes important
because of specificbecause of specific
intentintent
NCVSNCVS
 Rape: reports bothRape: reports both
male and femalemale and female
victimsvictims
 Does not reportDoes not report
homicide, arson,homicide, arson,
commercial crimescommercial crimes
and crimes againstand crimes against
children under 12children under 12
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
SimilaritiesSimilarities
 Both UCR and NCVS give lawBoth UCR and NCVS give law
enforcement personnel informationenforcement personnel information
that can be used strategicallythat can be used strategically
 Data have little or no tactical valueData have little or no tactical value
 Information provided is a flat fileInformation provided is a flat file
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
National Incident-Based ReportingNational Incident-Based Reporting
SystemSystem
 NIBRSNIBRS reports all the crimesreports all the crimes that occurredthat occurred
during a single occurred or incident (e.g.,during a single occurred or incident (e.g.,
Burglary, Assault, Murder, Arson)Burglary, Assault, Murder, Arson)
 UCR follows theUCR follows the hierarchyhierarchy rulerule
 NIBRS looks at a crime and all of itsNIBRS looks at a crime and all of its
components as an incident (the elements)components as an incident (the elements)
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
 Likely to replace UCR in the futureLikely to replace UCR in the future
 Significantly more detailed, so there will beSignificantly more detailed, so there will be
more common information available tomore common information available to
analyze cross-jurisdictional crimesanalyze cross-jurisdictional crimes
 Will require police officers to spend moreWill require police officers to spend more
time completing reports and reducetime completing reports and reduce
available timeavailable time
 Eventually, agencies will more effectiveEventually, agencies will more effective
Byproducts of NIBRSByproducts of NIBRS
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Government DatabasesGovernment Databases
 The Regional Information Sharing SystemsThe Regional Information Sharing Systems
(RISS)(RISS) www.iir.com/RISSwww.iir.com/RISS
 National Drug Pointer Index (NFPIX)National Drug Pointer Index (NFPIX)
www.usdoj.gov/dea/programs/ndpix.htmwww.usdoj.gov/dea/programs/ndpix.htm
 National Tracing CenterNational Tracing Center
www.atf.govwww.atf.gov
 National White Collar Crime CenterNational White Collar Crime Center
www.nw3c.orgwww.nw3c.org
 Financial Crime Enforcement Network (FinCEN)Financial Crime Enforcement Network (FinCEN)
www.fincen.govwww.fincen.gov
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Driver’s License andDriver’s License and
Motor Vehicle Registration InformationMotor Vehicle Registration Information
 State or local police officers accessState or local police officers access
driver’s license information through thedriver’s license information through the
agency RMS to the state authorityagency RMS to the state authority
 Accessing license information fromAccessing license information from
another state is done through NLETSanother state is done through NLETS
(National Law Enforcement(National Law Enforcement
Telecommunications System)Telecommunications System)
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Commercial Sources of InformationCommercial Sources of Information
 Began with catalog salesBegan with catalog sales
 Evolved into direct marketing and marketEvolved into direct marketing and market
surveyssurveys
 Direct marketers began sharingDirect marketers began sharing
information with marketers of non-information with marketers of non-
competitive goodscompetitive goods
 Companies forms that collect, organize,Companies forms that collect, organize,
and sell information.and sell information.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
 Personal information firms also collectPersonal information firms also collect
information from public recordsinformation from public records
(marriages, deaths, births, civil actions,(marriages, deaths, births, civil actions,
arrests, etc)arrests, etc)
Commercial Sources of InformationCommercial Sources of Information
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Explore Forensic Science atExplore Forensic Science at
www.forensicprofiles.comwww.forensicprofiles.com

Contenu connexe

Tendances

A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying reviewAnonDownload
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAPDavid Sweigert
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsHi Tech Criminal Justice
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15difordham
 
Ковбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградойКовбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградойPositive Hack Days
 
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...Ethisphere
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William BoothbyHanah Croft
 

Tendances (16)

File000155
File000155File000155
File000155
 
File000165
File000165File000165
File000165
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying review
 
File000146
File000146File000146
File000146
 
File000158
File000158File000158
File000158
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
 
File000154
File000154File000154
File000154
 
923L16_INH_new
923L16_INH_new923L16_INH_new
923L16_INH_new
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and Tactics
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15
 
Chapter14
Chapter14Chapter14
Chapter14
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
Ковбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградойКовбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградой
 
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William Boothby
 
Yellow Dot Program - Memo
Yellow Dot Program - MemoYellow Dot Program - Memo
Yellow Dot Program - Memo
 

En vedette

The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlHi Tech Criminal Justice
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)Hi Tech Criminal Justice
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersHi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Hi Tech Criminal Justice
 
Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headingsHi Tech Criminal Justice
 

En vedette (18)

The Internet and Law Enforcement
The Internet and Law EnforcementThe Internet and Law Enforcement
The Internet and Law Enforcement
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and Control
 
Wireless Communications
Wireless CommunicationsWireless Communications
Wireless Communications
 
Communication Dispatch Centers
Communication Dispatch CentersCommunication Dispatch Centers
Communication Dispatch Centers
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck Rodgers
 
Criminal Investigations Part Two
Criminal Investigations Part TwoCriminal Investigations Part Two
Criminal Investigations Part Two
 
Implementing and Managing Technology
Implementing and Managing TechnologyImplementing and Managing Technology
Implementing and Managing Technology
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
Major Incident and Disaster Response
Major Incident and Disaster ResponseMajor Incident and Disaster Response
Major Incident and Disaster Response
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)
 
Geographic Information Systems
Geographic Information SystemsGeographic Information Systems
Geographic Information Systems
 
Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headings
 
Information Exchange
Information ExchangeInformation Exchange
Information Exchange
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
An introduction to federal courts
An introduction to federal courtsAn introduction to federal courts
An introduction to federal courts
 
Police Report Writing
Police Report WritingPolice Report Writing
Police Report Writing
 

Similaire à External Systems

Developing a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeDeveloping a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeMarcelo Gomes Freire
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police forceK J Singh
 
Tools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsTools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsIDLegalAid
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptOlusegun Mosugu
 
Computers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docxComputers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docxmaxinesmith73660
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingVi Tính Hoàng Nam
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalatorLassonde Institute
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementBernard Marr
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesHi Tech Criminal Justice
 

Similaire à External Systems (20)

Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 
Introduction to Police Technology
Introduction to Police TechnologyIntroduction to Police Technology
Introduction to Police Technology
 
A Brief History of Police Technology
A Brief History of Police TechnologyA Brief History of Police Technology
A Brief History of Police Technology
 
Developing a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeDeveloping a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat Cybercrime
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Agency Systems
Agency SystemsAgency Systems
Agency Systems
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police force
 
Tools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsTools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft Victims
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
 
Computers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docxComputers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docx
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
RoboCop World
RoboCop WorldRoboCop World
RoboCop World
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalator
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law Enforcement
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign Dignitaries
 

Plus de Hi Tech Criminal Justice

Plus de Hi Tech Criminal Justice (6)

Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and Analysis
 
Leadership texas hold em style
Leadership texas hold em styleLeadership texas hold em style
Leadership texas hold em style
 
Technology in the Street
Technology in the StreetTechnology in the Street
Technology in the Street
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Networks
NetworksNetworks
Networks
 

Dernier

Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Dernier (20)

Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

External Systems

  • 1. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Chapter NineChapter Nine External SystemsExternal Systems
  • 2. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Learning ObjectivesLearning Objectives  The history of and developments at theThe history of and developments at the National Crime Information Center (NCIC)National Crime Information Center (NCIC)  Uniform Crime ReportingUniform Crime Reporting andand National CrimeNational Crime Victimization SurveyVictimization Survey  National Incident-Based Reporting SystemNational Incident-Based Reporting System  Potential Sources of government informationPotential Sources of government information  Government vs. Commercial databaseGovernment vs. Commercial database  Regional information sharing schemesRegional information sharing schemes
  • 3. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Sources of InformationSources of Information Two broad classifications of records aTwo broad classifications of records a police officer might access:police officer might access:  Public RecordsPublic Records – Available to the– Available to the public and about something that haspublic and about something that has happenedhappened  Investigative RecordsInvestigative Records – About things– About things that are going on. More restrictive sothat are going on. More restrictive so a case in not compromised.a case in not compromised.
  • 4. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond External sources of information are oftenExternal sources of information are often more extensive than local sources:more extensive than local sources:  Offenders move around leaving an informationOffenders move around leaving an information trailtrail  Small agencies do not have the resources toSmall agencies do not have the resources to maintain large or extensive databasesmaintain large or extensive databases  Many crimes are complex and cross-Many crimes are complex and cross- jurisdictionaljurisdictional Sources of InformationSources of Information
  • 5. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond National Crime Information CenterNational Crime Information Center  First database with nationwide accessFirst database with nationwide access  Each participating agency is responsibleEach participating agency is responsible to enter, update and delete their ownto enter, update and delete their own recordsrecords  Local agencies can query NCIC through aLocal agencies can query NCIC through a statestate control terminal agency (CTA)control terminal agency (CTA)  TheThe Interstate Identification Index (III)Interstate Identification Index (III) receives offender information from CTAsreceives offender information from CTAs
  • 6. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond NCIC 2000NCIC 2000  Has reduced fingerprint and photographicHas reduced fingerprint and photographic information of wanted persons to digitalinformation of wanted persons to digital informationinformation  Allows agencies to submit sameAllows agencies to submit same information in a digital formatinformation in a digital format  Ultimately will allow police officers toUltimately will allow police officers to access fingerprint and photograph dataaccess fingerprint and photograph data from their patrol vehiclesfrom their patrol vehicles
  • 7. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond  NCIC 2000 provides the softwareNCIC 2000 provides the software application free of chargeapplication free of charge  System is designed to run withSystem is designed to run with standard computer andstandard computer and communications equipmentcommunications equipment  Local agencies must acquire theLocal agencies must acquire the hardware necessary to run the softwarehardware necessary to run the software NCIC 2000NCIC 2000
  • 8. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Legal questionsLegal questions A police officer can checkA police officer can check for warrantsfor warrants during a brief detention.during a brief detention.  Can the officer take theCan the officer take the person’s fingerprints?person’s fingerprints?  Is the officer escalatingIs the officer escalating the detention by takingthe detention by taking the prints?the prints?  Is taking a fingerprintIs taking a fingerprint during a detention aduring a detention a seizure (4seizure (4thth amendment)?amendment)? Photograph provided by Cross Match Technologies, Inc
  • 9. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Safety IssuesSafety Issues During a traffic stop, the violator has moreDuring a traffic stop, the violator has more prefect information than the officer.prefect information than the officer.  The violator knows if he was onlyThe violator knows if he was only speeding or fleeing from a crime scene.speeding or fleeing from a crime scene.  With this lack of information, approachingWith this lack of information, approaching the violator for a print is dangerous.the violator for a print is dangerous.  The violator could take this opportunity toThe violator could take this opportunity to flee or attack the officerflee or attack the officer
  • 10. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Uniformed Crime ReportsUniformed Crime Reports The U.S. Department of Justice hasThe U.S. Department of Justice has two programs that gather statisticstwo programs that gather statistics on crime:on crime:  Uniformed Crime Reports (UCR)Uniformed Crime Reports (UCR)  National Crime Victimization SurveyNational Crime Victimization Survey
  • 11. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond UCRUCR  Agencies voluntarily report crimes to theAgencies voluntarily report crimes to the FBI monthlyFBI monthly  Consists of crimes categorized as Part I orConsists of crimes categorized as Part I or Part IIPart II  Eight Part I crimes: Homicide, ForcibleEight Part I crimes: Homicide, Forcible Rape, Robbery, Aggravated Assault,Rape, Robbery, Aggravated Assault, Burglary, Larceny/Theft, Motor VehicleBurglary, Larceny/Theft, Motor Vehicle Theft, and ArsonTheft, and Arson
  • 12. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond National Crime VictimizationNational Crime Victimization SurveySurvey NCVS statistics come from the victimsNCVS statistics come from the victims themselves.themselves.  Complements the UCR informationComplements the UCR information  Many victims do not report crimesMany victims do not report crimes  UCR and NCVS together provide aUCR and NCVS together provide a more comprehensive picture on crimemore comprehensive picture on crime
  • 13. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond DifferencesDifferences UCRUCR  Rape: only reportsRape: only reports female victimsfemale victims  Legal definitions ofLegal definitions of crimes importantcrimes important because of specificbecause of specific intentintent NCVSNCVS  Rape: reports bothRape: reports both male and femalemale and female victimsvictims  Does not reportDoes not report homicide, arson,homicide, arson, commercial crimescommercial crimes and crimes againstand crimes against children under 12children under 12
  • 14. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond SimilaritiesSimilarities  Both UCR and NCVS give lawBoth UCR and NCVS give law enforcement personnel informationenforcement personnel information that can be used strategicallythat can be used strategically  Data have little or no tactical valueData have little or no tactical value  Information provided is a flat fileInformation provided is a flat file
  • 15. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond National Incident-Based ReportingNational Incident-Based Reporting SystemSystem  NIBRSNIBRS reports all the crimesreports all the crimes that occurredthat occurred during a single occurred or incident (e.g.,during a single occurred or incident (e.g., Burglary, Assault, Murder, Arson)Burglary, Assault, Murder, Arson)  UCR follows theUCR follows the hierarchyhierarchy rulerule  NIBRS looks at a crime and all of itsNIBRS looks at a crime and all of its components as an incident (the elements)components as an incident (the elements)
  • 16. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond  Likely to replace UCR in the futureLikely to replace UCR in the future  Significantly more detailed, so there will beSignificantly more detailed, so there will be more common information available tomore common information available to analyze cross-jurisdictional crimesanalyze cross-jurisdictional crimes  Will require police officers to spend moreWill require police officers to spend more time completing reports and reducetime completing reports and reduce available timeavailable time  Eventually, agencies will more effectiveEventually, agencies will more effective Byproducts of NIBRSByproducts of NIBRS
  • 17. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Government DatabasesGovernment Databases  The Regional Information Sharing SystemsThe Regional Information Sharing Systems (RISS)(RISS) www.iir.com/RISSwww.iir.com/RISS  National Drug Pointer Index (NFPIX)National Drug Pointer Index (NFPIX) www.usdoj.gov/dea/programs/ndpix.htmwww.usdoj.gov/dea/programs/ndpix.htm  National Tracing CenterNational Tracing Center www.atf.govwww.atf.gov  National White Collar Crime CenterNational White Collar Crime Center www.nw3c.orgwww.nw3c.org  Financial Crime Enforcement Network (FinCEN)Financial Crime Enforcement Network (FinCEN) www.fincen.govwww.fincen.gov
  • 18. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Driver’s License andDriver’s License and Motor Vehicle Registration InformationMotor Vehicle Registration Information  State or local police officers accessState or local police officers access driver’s license information through thedriver’s license information through the agency RMS to the state authorityagency RMS to the state authority  Accessing license information fromAccessing license information from another state is done through NLETSanother state is done through NLETS (National Law Enforcement(National Law Enforcement Telecommunications System)Telecommunications System)
  • 19. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Commercial Sources of InformationCommercial Sources of Information  Began with catalog salesBegan with catalog sales  Evolved into direct marketing and marketEvolved into direct marketing and market surveyssurveys  Direct marketers began sharingDirect marketers began sharing information with marketers of non-information with marketers of non- competitive goodscompetitive goods  Companies forms that collect, organize,Companies forms that collect, organize, and sell information.and sell information.
  • 20. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond  Personal information firms also collectPersonal information firms also collect information from public recordsinformation from public records (marriages, deaths, births, civil actions,(marriages, deaths, births, civil actions, arrests, etc)arrests, etc) Commercial Sources of InformationCommercial Sources of Information
  • 21. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Explore Forensic Science atExplore Forensic Science at www.forensicprofiles.comwww.forensicprofiles.com