SlideShare une entreprise Scribd logo
1  sur  21
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Chapter NineChapter Nine
External SystemsExternal Systems
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Learning ObjectivesLearning Objectives
 The history of and developments at theThe history of and developments at the
National Crime Information Center (NCIC)National Crime Information Center (NCIC)
 Uniform Crime ReportingUniform Crime Reporting andand National CrimeNational Crime
Victimization SurveyVictimization Survey
 National Incident-Based Reporting SystemNational Incident-Based Reporting System
 Potential Sources of government informationPotential Sources of government information
 Government vs. Commercial databaseGovernment vs. Commercial database
 Regional information sharing schemesRegional information sharing schemes
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Sources of InformationSources of Information
Two broad classifications of records aTwo broad classifications of records a
police officer might access:police officer might access:
 Public RecordsPublic Records – Available to the– Available to the
public and about something that haspublic and about something that has
happenedhappened
 Investigative RecordsInvestigative Records – About things– About things
that are going on. More restrictive sothat are going on. More restrictive so
a case in not compromised.a case in not compromised.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
External sources of information are oftenExternal sources of information are often
more extensive than local sources:more extensive than local sources:
 Offenders move around leaving an informationOffenders move around leaving an information
trailtrail
 Small agencies do not have the resources toSmall agencies do not have the resources to
maintain large or extensive databasesmaintain large or extensive databases
 Many crimes are complex and cross-Many crimes are complex and cross-
jurisdictionaljurisdictional
Sources of InformationSources of Information
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
National Crime Information CenterNational Crime Information Center
 First database with nationwide accessFirst database with nationwide access
 Each participating agency is responsibleEach participating agency is responsible
to enter, update and delete their ownto enter, update and delete their own
recordsrecords
 Local agencies can query NCIC through aLocal agencies can query NCIC through a
statestate control terminal agency (CTA)control terminal agency (CTA)
 TheThe Interstate Identification Index (III)Interstate Identification Index (III)
receives offender information from CTAsreceives offender information from CTAs
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
NCIC 2000NCIC 2000
 Has reduced fingerprint and photographicHas reduced fingerprint and photographic
information of wanted persons to digitalinformation of wanted persons to digital
informationinformation
 Allows agencies to submit sameAllows agencies to submit same
information in a digital formatinformation in a digital format
 Ultimately will allow police officers toUltimately will allow police officers to
access fingerprint and photograph dataaccess fingerprint and photograph data
from their patrol vehiclesfrom their patrol vehicles
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
 NCIC 2000 provides the softwareNCIC 2000 provides the software
application free of chargeapplication free of charge
 System is designed to run withSystem is designed to run with
standard computer andstandard computer and
communications equipmentcommunications equipment
 Local agencies must acquire theLocal agencies must acquire the
hardware necessary to run the softwarehardware necessary to run the software
NCIC 2000NCIC 2000
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Legal questionsLegal questions
A police officer can checkA police officer can check
for warrantsfor warrants
during a brief detention.during a brief detention.
 Can the officer take theCan the officer take the
person’s fingerprints?person’s fingerprints?
 Is the officer escalatingIs the officer escalating
the detention by takingthe detention by taking
the prints?the prints?
 Is taking a fingerprintIs taking a fingerprint
during a detention aduring a detention a
seizure (4seizure (4thth
amendment)?amendment)?
Photograph provided by Cross Match Technologies, Inc
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Safety IssuesSafety Issues
During a traffic stop, the violator has moreDuring a traffic stop, the violator has more
prefect information than the officer.prefect information than the officer.
 The violator knows if he was onlyThe violator knows if he was only
speeding or fleeing from a crime scene.speeding or fleeing from a crime scene.
 With this lack of information, approachingWith this lack of information, approaching
the violator for a print is dangerous.the violator for a print is dangerous.
 The violator could take this opportunity toThe violator could take this opportunity to
flee or attack the officerflee or attack the officer
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Uniformed Crime ReportsUniformed Crime Reports
The U.S. Department of Justice hasThe U.S. Department of Justice has
two programs that gather statisticstwo programs that gather statistics
on crime:on crime:
 Uniformed Crime Reports (UCR)Uniformed Crime Reports (UCR)
 National Crime Victimization SurveyNational Crime Victimization Survey
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
UCRUCR
 Agencies voluntarily report crimes to theAgencies voluntarily report crimes to the
FBI monthlyFBI monthly
 Consists of crimes categorized as Part I orConsists of crimes categorized as Part I or
Part IIPart II
 Eight Part I crimes: Homicide, ForcibleEight Part I crimes: Homicide, Forcible
Rape, Robbery, Aggravated Assault,Rape, Robbery, Aggravated Assault,
Burglary, Larceny/Theft, Motor VehicleBurglary, Larceny/Theft, Motor Vehicle
Theft, and ArsonTheft, and Arson
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
National Crime VictimizationNational Crime Victimization
SurveySurvey
NCVS statistics come from the victimsNCVS statistics come from the victims
themselves.themselves.
 Complements the UCR informationComplements the UCR information
 Many victims do not report crimesMany victims do not report crimes
 UCR and NCVS together provide aUCR and NCVS together provide a
more comprehensive picture on crimemore comprehensive picture on crime
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
DifferencesDifferences
UCRUCR
 Rape: only reportsRape: only reports
female victimsfemale victims
 Legal definitions ofLegal definitions of
crimes importantcrimes important
because of specificbecause of specific
intentintent
NCVSNCVS
 Rape: reports bothRape: reports both
male and femalemale and female
victimsvictims
 Does not reportDoes not report
homicide, arson,homicide, arson,
commercial crimescommercial crimes
and crimes againstand crimes against
children under 12children under 12
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
SimilaritiesSimilarities
 Both UCR and NCVS give lawBoth UCR and NCVS give law
enforcement personnel informationenforcement personnel information
that can be used strategicallythat can be used strategically
 Data have little or no tactical valueData have little or no tactical value
 Information provided is a flat fileInformation provided is a flat file
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
National Incident-Based ReportingNational Incident-Based Reporting
SystemSystem
 NIBRSNIBRS reports all the crimesreports all the crimes that occurredthat occurred
during a single occurred or incident (e.g.,during a single occurred or incident (e.g.,
Burglary, Assault, Murder, Arson)Burglary, Assault, Murder, Arson)
 UCR follows theUCR follows the hierarchyhierarchy rulerule
 NIBRS looks at a crime and all of itsNIBRS looks at a crime and all of its
components as an incident (the elements)components as an incident (the elements)
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
 Likely to replace UCR in the futureLikely to replace UCR in the future
 Significantly more detailed, so there will beSignificantly more detailed, so there will be
more common information available tomore common information available to
analyze cross-jurisdictional crimesanalyze cross-jurisdictional crimes
 Will require police officers to spend moreWill require police officers to spend more
time completing reports and reducetime completing reports and reduce
available timeavailable time
 Eventually, agencies will more effectiveEventually, agencies will more effective
Byproducts of NIBRSByproducts of NIBRS
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Government DatabasesGovernment Databases
 The Regional Information Sharing SystemsThe Regional Information Sharing Systems
(RISS)(RISS) www.iir.com/RISSwww.iir.com/RISS
 National Drug Pointer Index (NFPIX)National Drug Pointer Index (NFPIX)
www.usdoj.gov/dea/programs/ndpix.htmwww.usdoj.gov/dea/programs/ndpix.htm
 National Tracing CenterNational Tracing Center
www.atf.govwww.atf.gov
 National White Collar Crime CenterNational White Collar Crime Center
www.nw3c.orgwww.nw3c.org
 Financial Crime Enforcement Network (FinCEN)Financial Crime Enforcement Network (FinCEN)
www.fincen.govwww.fincen.gov
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Driver’s License andDriver’s License and
Motor Vehicle Registration InformationMotor Vehicle Registration Information
 State or local police officers accessState or local police officers access
driver’s license information through thedriver’s license information through the
agency RMS to the state authorityagency RMS to the state authority
 Accessing license information fromAccessing license information from
another state is done through NLETSanother state is done through NLETS
(National Law Enforcement(National Law Enforcement
Telecommunications System)Telecommunications System)
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
Commercial Sources of InformationCommercial Sources of Information
 Began with catalog salesBegan with catalog sales
 Evolved into direct marketing and marketEvolved into direct marketing and market
surveyssurveys
 Direct marketers began sharingDirect marketers began sharing
information with marketers of non-information with marketers of non-
competitive goodscompetitive goods
 Companies forms that collect, organize,Companies forms that collect, organize,
and sell information.and sell information.
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond
 Personal information firms also collectPersonal information firms also collect
information from public recordsinformation from public records
(marriages, deaths, births, civil actions,(marriages, deaths, births, civil actions,
arrests, etc)arrests, etc)
Commercial Sources of InformationCommercial Sources of Information
Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Explore Forensic Science atExplore Forensic Science at
www.forensicprofiles.comwww.forensicprofiles.com

Contenu connexe

Tendances

A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying reviewAnonDownload
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAPDavid Sweigert
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsHi Tech Criminal Justice
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15difordham
 
Ковбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградойКовбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградойPositive Hack Days
 
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...Ethisphere
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William BoothbyHanah Croft
 

Tendances (16)

File000155
File000155File000155
File000155
 
File000165
File000165File000165
File000165
 
A question of trust - uk spying review
A question of trust  - uk spying reviewA question of trust  - uk spying review
A question of trust - uk spying review
 
File000146
File000146File000146
File000146
 
File000158
File000158File000158
File000158
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
 
File000154
File000154File000154
File000154
 
923L16_INH_new
923L16_INH_new923L16_INH_new
923L16_INH_new
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and Tactics
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15
 
Chapter14
Chapter14Chapter14
Chapter14
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
Ковбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградойКовбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградой
 
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William Boothby
 
Yellow Dot Program - Memo
Yellow Dot Program - MemoYellow Dot Program - Memo
Yellow Dot Program - Memo
 

En vedette

The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlHi Tech Criminal Justice
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)Hi Tech Criminal Justice
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersHi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Hi Tech Criminal Justice
 
Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headingsHi Tech Criminal Justice
 

En vedette (18)

The Internet and Law Enforcement
The Internet and Law EnforcementThe Internet and Law Enforcement
The Internet and Law Enforcement
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and Control
 
Wireless Communications
Wireless CommunicationsWireless Communications
Wireless Communications
 
Communication Dispatch Centers
Communication Dispatch CentersCommunication Dispatch Centers
Communication Dispatch Centers
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck Rodgers
 
Criminal Investigations Part Two
Criminal Investigations Part TwoCriminal Investigations Part Two
Criminal Investigations Part Two
 
Implementing and Managing Technology
Implementing and Managing TechnologyImplementing and Managing Technology
Implementing and Managing Technology
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
Major Incident and Disaster Response
Major Incident and Disaster ResponseMajor Incident and Disaster Response
Major Incident and Disaster Response
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)
 
Geographic Information Systems
Geographic Information SystemsGeographic Information Systems
Geographic Information Systems
 
Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headings
 
Information Exchange
Information ExchangeInformation Exchange
Information Exchange
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
An introduction to federal courts
An introduction to federal courtsAn introduction to federal courts
An introduction to federal courts
 
Police Report Writing
Police Report WritingPolice Report Writing
Police Report Writing
 

Similaire à External Systems

Developing a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeDeveloping a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeMarcelo Gomes Freire
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police forceK J Singh
 
Tools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsTools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsIDLegalAid
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptOlusegun Mosugu
 
Computers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docxComputers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docxmaxinesmith73660
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingVi Tính Hoàng Nam
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalatorLassonde Institute
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementBernard Marr
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesHi Tech Criminal Justice
 

Similaire à External Systems (20)

Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 
Introduction to Police Technology
Introduction to Police TechnologyIntroduction to Police Technology
Introduction to Police Technology
 
A Brief History of Police Technology
A Brief History of Police TechnologyA Brief History of Police Technology
A Brief History of Police Technology
 
Developing a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat CybercrimeDeveloping a Legal Framework to Combat Cybercrime
Developing a Legal Framework to Combat Cybercrime
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Agency Systems
Agency SystemsAgency Systems
Agency Systems
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police force
 
Tools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsTools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft Victims
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
 
Computers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docxComputers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docx
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
RoboCop World
RoboCop WorldRoboCop World
RoboCop World
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
The great traffic stop de escalator
The great traffic stop de escalatorThe great traffic stop de escalator
The great traffic stop de escalator
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law Enforcement
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign Dignitaries
 

Plus de Hi Tech Criminal Justice

Plus de Hi Tech Criminal Justice (6)

Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and Analysis
 
Leadership texas hold em style
Leadership texas hold em styleLeadership texas hold em style
Leadership texas hold em style
 
Technology in the Street
Technology in the StreetTechnology in the Street
Technology in the Street
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Networks
NetworksNetworks
Networks
 

Dernier

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 

Dernier (20)

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 

External Systems

  • 1. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Chapter NineChapter Nine External SystemsExternal Systems
  • 2. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Learning ObjectivesLearning Objectives  The history of and developments at theThe history of and developments at the National Crime Information Center (NCIC)National Crime Information Center (NCIC)  Uniform Crime ReportingUniform Crime Reporting andand National CrimeNational Crime Victimization SurveyVictimization Survey  National Incident-Based Reporting SystemNational Incident-Based Reporting System  Potential Sources of government informationPotential Sources of government information  Government vs. Commercial databaseGovernment vs. Commercial database  Regional information sharing schemesRegional information sharing schemes
  • 3. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Sources of InformationSources of Information Two broad classifications of records aTwo broad classifications of records a police officer might access:police officer might access:  Public RecordsPublic Records – Available to the– Available to the public and about something that haspublic and about something that has happenedhappened  Investigative RecordsInvestigative Records – About things– About things that are going on. More restrictive sothat are going on. More restrictive so a case in not compromised.a case in not compromised.
  • 4. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond External sources of information are oftenExternal sources of information are often more extensive than local sources:more extensive than local sources:  Offenders move around leaving an informationOffenders move around leaving an information trailtrail  Small agencies do not have the resources toSmall agencies do not have the resources to maintain large or extensive databasesmaintain large or extensive databases  Many crimes are complex and cross-Many crimes are complex and cross- jurisdictionaljurisdictional Sources of InformationSources of Information
  • 5. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond National Crime Information CenterNational Crime Information Center  First database with nationwide accessFirst database with nationwide access  Each participating agency is responsibleEach participating agency is responsible to enter, update and delete their ownto enter, update and delete their own recordsrecords  Local agencies can query NCIC through aLocal agencies can query NCIC through a statestate control terminal agency (CTA)control terminal agency (CTA)  TheThe Interstate Identification Index (III)Interstate Identification Index (III) receives offender information from CTAsreceives offender information from CTAs
  • 6. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond NCIC 2000NCIC 2000  Has reduced fingerprint and photographicHas reduced fingerprint and photographic information of wanted persons to digitalinformation of wanted persons to digital informationinformation  Allows agencies to submit sameAllows agencies to submit same information in a digital formatinformation in a digital format  Ultimately will allow police officers toUltimately will allow police officers to access fingerprint and photograph dataaccess fingerprint and photograph data from their patrol vehiclesfrom their patrol vehicles
  • 7. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond  NCIC 2000 provides the softwareNCIC 2000 provides the software application free of chargeapplication free of charge  System is designed to run withSystem is designed to run with standard computer andstandard computer and communications equipmentcommunications equipment  Local agencies must acquire theLocal agencies must acquire the hardware necessary to run the softwarehardware necessary to run the software NCIC 2000NCIC 2000
  • 8. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Legal questionsLegal questions A police officer can checkA police officer can check for warrantsfor warrants during a brief detention.during a brief detention.  Can the officer take theCan the officer take the person’s fingerprints?person’s fingerprints?  Is the officer escalatingIs the officer escalating the detention by takingthe detention by taking the prints?the prints?  Is taking a fingerprintIs taking a fingerprint during a detention aduring a detention a seizure (4seizure (4thth amendment)?amendment)? Photograph provided by Cross Match Technologies, Inc
  • 9. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Safety IssuesSafety Issues During a traffic stop, the violator has moreDuring a traffic stop, the violator has more prefect information than the officer.prefect information than the officer.  The violator knows if he was onlyThe violator knows if he was only speeding or fleeing from a crime scene.speeding or fleeing from a crime scene.  With this lack of information, approachingWith this lack of information, approaching the violator for a print is dangerous.the violator for a print is dangerous.  The violator could take this opportunity toThe violator could take this opportunity to flee or attack the officerflee or attack the officer
  • 10. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Uniformed Crime ReportsUniformed Crime Reports The U.S. Department of Justice hasThe U.S. Department of Justice has two programs that gather statisticstwo programs that gather statistics on crime:on crime:  Uniformed Crime Reports (UCR)Uniformed Crime Reports (UCR)  National Crime Victimization SurveyNational Crime Victimization Survey
  • 11. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond UCRUCR  Agencies voluntarily report crimes to theAgencies voluntarily report crimes to the FBI monthlyFBI monthly  Consists of crimes categorized as Part I orConsists of crimes categorized as Part I or Part IIPart II  Eight Part I crimes: Homicide, ForcibleEight Part I crimes: Homicide, Forcible Rape, Robbery, Aggravated Assault,Rape, Robbery, Aggravated Assault, Burglary, Larceny/Theft, Motor VehicleBurglary, Larceny/Theft, Motor Vehicle Theft, and ArsonTheft, and Arson
  • 12. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond National Crime VictimizationNational Crime Victimization SurveySurvey NCVS statistics come from the victimsNCVS statistics come from the victims themselves.themselves.  Complements the UCR informationComplements the UCR information  Many victims do not report crimesMany victims do not report crimes  UCR and NCVS together provide aUCR and NCVS together provide a more comprehensive picture on crimemore comprehensive picture on crime
  • 13. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond DifferencesDifferences UCRUCR  Rape: only reportsRape: only reports female victimsfemale victims  Legal definitions ofLegal definitions of crimes importantcrimes important because of specificbecause of specific intentintent NCVSNCVS  Rape: reports bothRape: reports both male and femalemale and female victimsvictims  Does not reportDoes not report homicide, arson,homicide, arson, commercial crimescommercial crimes and crimes againstand crimes against children under 12children under 12
  • 14. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond SimilaritiesSimilarities  Both UCR and NCVS give lawBoth UCR and NCVS give law enforcement personnel informationenforcement personnel information that can be used strategicallythat can be used strategically  Data have little or no tactical valueData have little or no tactical value  Information provided is a flat fileInformation provided is a flat file
  • 15. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond National Incident-Based ReportingNational Incident-Based Reporting SystemSystem  NIBRSNIBRS reports all the crimesreports all the crimes that occurredthat occurred during a single occurred or incident (e.g.,during a single occurred or incident (e.g., Burglary, Assault, Murder, Arson)Burglary, Assault, Murder, Arson)  UCR follows theUCR follows the hierarchyhierarchy rulerule  NIBRS looks at a crime and all of itsNIBRS looks at a crime and all of its components as an incident (the elements)components as an incident (the elements)
  • 16. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond  Likely to replace UCR in the futureLikely to replace UCR in the future  Significantly more detailed, so there will beSignificantly more detailed, so there will be more common information available tomore common information available to analyze cross-jurisdictional crimesanalyze cross-jurisdictional crimes  Will require police officers to spend moreWill require police officers to spend more time completing reports and reducetime completing reports and reduce available timeavailable time  Eventually, agencies will more effectiveEventually, agencies will more effective Byproducts of NIBRSByproducts of NIBRS
  • 17. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Government DatabasesGovernment Databases  The Regional Information Sharing SystemsThe Regional Information Sharing Systems (RISS)(RISS) www.iir.com/RISSwww.iir.com/RISS  National Drug Pointer Index (NFPIX)National Drug Pointer Index (NFPIX) www.usdoj.gov/dea/programs/ndpix.htmwww.usdoj.gov/dea/programs/ndpix.htm  National Tracing CenterNational Tracing Center www.atf.govwww.atf.gov  National White Collar Crime CenterNational White Collar Crime Center www.nw3c.orgwww.nw3c.org  Financial Crime Enforcement Network (FinCEN)Financial Crime Enforcement Network (FinCEN) www.fincen.govwww.fincen.gov
  • 18. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Driver’s License andDriver’s License and Motor Vehicle Registration InformationMotor Vehicle Registration Information  State or local police officers accessState or local police officers access driver’s license information through thedriver’s license information through the agency RMS to the state authorityagency RMS to the state authority  Accessing license information fromAccessing license information from another state is done through NLETSanother state is done through NLETS (National Law Enforcement(National Law Enforcement Telecommunications System)Telecommunications System)
  • 19. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond Commercial Sources of InformationCommercial Sources of Information  Began with catalog salesBegan with catalog sales  Evolved into direct marketing and marketEvolved into direct marketing and market surveyssurveys  Direct marketers began sharingDirect marketers began sharing information with marketers of non-information with marketers of non- competitive goodscompetitive goods  Companies forms that collect, organize,Companies forms that collect, organize, and sell information.and sell information.
  • 20. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond  Personal information firms also collectPersonal information firms also collect information from public recordsinformation from public records (marriages, deaths, births, civil actions,(marriages, deaths, births, civil actions, arrests, etc)arrests, etc) Commercial Sources of InformationCommercial Sources of Information
  • 21. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Explore Forensic Science atExplore Forensic Science at www.forensicprofiles.comwww.forensicprofiles.com