1 / 45

Computer Technology in Law Enforcement

Computer Technology in Law Enforcement. Eileen and Tom Edwin 29 November 2006. Investigation Technology. Technology. Modern police cruisers contain the following equipment: Laptops Radar (Radio Detection And Ranging) Radio/ Scanners Video Cameras. Laptops.

una
Download Presentation

Computer Technology in Law Enforcement

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Technology in Law Enforcement Eileen and Tom Edwin 29 November 2006

  2. Investigation Technology

  3. Technology • Modern police cruisers contain the following equipment: • Laptops • Radar (Radio Detection And Ranging) • Radio/ Scanners • Video Cameras

  4. Laptops • Allow officers to type reports, saves time. • Can save reports to flash drives and print later. • Transfer info from computer directly to database with flash drives. • Will eventually allow officers to receive calls through wireless networks and as well access information like license plates and images such as mug shots.

  5. Radar • Radio Detection And Ranging • Remote sensor that gives off electromagnetic waves ( radio, microwaves and light) and uses these waves to measure presence, location and motion. • Used to monitor on coming and receding traffic by police officers.

  6. Radio/Scanners • Transmit and receive Federal Government assigned frequencies in Vhf and Uhf frequencies above standard broadcast FM stations of the radio spectrum and can’t be heard on standard car or home radio. • Most frequencies are used by Public Safety (Police, Ambulance and Rescue crews) • Two types of scanners portable (handheld) and table ( found in cars) • Frequent users • Public Safety, News Media, Home & Personal Security, Corporate Security, Neighborhood Watch, Radio Hobbyists, Public Buildings, Hospital and School Security.

  7. Video Cameras • Recently installed in patrol cars • Used to monitor work done by officers • Used to show how arrests are made

  8. Investigation Programs • Pattern Recognition • Investigative Information Management System (I2MS)

  9. Pattern Recognition • Finding patterns concerning the locations of the crimes. • Tries to recognize and predict patterns of illegal behavior.

  10. I2MS • Developed by CSC for Air force Office of Special Investigation ( AFOSI). • Focuses on criminal investigations and counterintelligence in Air Force. • enables agents to view recently entered information from half way around the world. • has the ability to record data from arrests, track location of gathered evidence, and store images like maps, fingerprints and other electronic documents.

  11. Internet and Computer Crime

  12. Computer as Instrument Includes: Embezzlement Fraud Larceny Computer as Object Includes: Theft Viruses Types of Computer and Internet Crime

  13. Electronic Fingerprint Tracking what a person does on a computer via memory and history -- Is called an electronic fingerprint

  14. Memory • Cache • RAM • Hard Disk Drive • Any other memory

  15. History Check internet history on browser – Can clear by holding CTRL + H keys (though it should be known that nothing is ever permanently deleted from a computer)

  16. Terrorism Hugely aided by computer technology

  17. Cryptology Definition: The branch of science that deals with secret communications using codes and ciphers Code – the use of symbols to represent numbers, letters, or words Cipher – system of representing letters with other letters to form images

  18. Codes • Can stand for words or letters • Tell location in pages and sections of book where word is found Example: Morse code *Decoding takes a long time

  19. Ciphers Substitution Cipher So “Meet you at the corner” looks like: ABCDEFGHIJKLMNOPQRSTUVWXYZ NMZAYBXCWDVEUFTGSHRIQJPKOL UYYI OTQ NI ICY ZTHFYH

  20. Columnar Transposition Message is: “Meet you at the corner”

  21. Looks like: MEETY OUATT HECOR NERXX

  22. Code looks like: MOHN EUEE EACR TTOX YTRX (read from top to bottom, left to right)

  23. How Do Computers Fit into Cryptology? • Easier to create • Easier to decrypt • Easier to break * “So far, it is far easier for a computer to encrypt a message than to break it”

  24. Stenography Definition: hiding files in plain view using encryption Hiding text within text, images within images, and text within images or vice versa

  25. Without embedded text With embedded text

  26. Capturing Pedophiles • Join same networks and groups • Create profiles • Interact • Set up meeting • Finally catch them

  27. Other Methods • Tapping IP addresses • Installing keylogging hardware/software • Skimmers • Sniffers

  28. Forensic Technology

  29. Definition • Forensics is the method of gathering and analyzing evidence and information at a crime scene.

  30. Forensics History • 1598 – Fortunatus Fidelis is credited as being the first person to us modern forensic science. • Early 1800’s – forensic science becomes an accepted branch of medicine. • 1921 – John Larson creates the first successful lie detector. • 1923 – First police department crime laboratory established in the U.S.

  31. Forensics History • 1924 – Larson’s lie detector becomes widely used in police interrogations around the country. • 1932 – FBI creates national crime laboratory. • 1948 – American Academy of Forensic Science is established. • 1967 – FBI creates National Crime Information Center.

  32. Modern Forensic Science • Every year new updates are seen that push the boundaries of forensic science • Newer and newer technologies are creating better possibilities for investigators around the country.

  33. National Virtual Translation Center • Center established in early 2000 to help investigators with international cases. • Instantly translate documents and intelligence in over a dozen languages. • Helps investigators with international cases and suspects.

  34. Stable Isotope Ratio Mass Spectrometry • New method of substance testing. • Testing using this method will allow investigators to see if two substances came from the same source. • Allows for much more accurate testing in criminal investigations.

  35. Mitochondrial DNA Analysis • A new type of DNA testing that allows for a much more accurate suspect pool. • Usually limits your suspect pool to a certain family or bloodline.

  36. Regional Computer Forensic Laboratories • These laboratories are used to detect evidence of computer crime. • Can scan any electronic device. • There are now several around the country for easy access.

  37. Databases • CODIS – Combined DNA Index System • Created by FBI in early 1990s, as a blending of forensic science and computer technology. • Has 3 levels (local, state, National) • Allows laboratories participating in the program to compare and exchange information on national level. • As of Sept. 2006 has produced 36,800 hits and assisted in 39,200 investigations nationwide.

  38. CODIS • CODIS is the Combined DNA Index System. • Any law enforcement agency can put DNA into the national database. • Other agencies can then access the DNA sequences to see if they match any current suspects. • Allows for easy access to scanning suspect’s DNA for a match to crimes.

  39. Surveillance

  40. Car • Discreetly follow suspect • Observe actions

  41. Audio and Video Recording • Warrant for installation • If fails, equipment in moving vehicles *Technologies have constantly been changing and updating – less visible and more powerful

  42. Thermal imaging • Capturing infrared light emitted by objects to form images • The cooler the object, the less clear the image will be • Good for moonless, cloudy nights • Disturbances in ground • Changes to walls

  43. Image Enhancement • “Night vision” • Captures the little amount of light available and uses it to for images • More commonly used than thermal imaging

  44. Gait Recognition • Computer vision • Traditional radar system “ The ultimate goal is detect, classify, and identify humans at distances up to 500 feet away under day or night, all-weather conditions” Identify a person based on the way they walk

  45. *Please note that computer technology in law enforcement encompasses a vast and broad range of technology. Furthermore, some of this new technology is not released to the public due to security and effectiveness issues. The technologies described are only some of the equipment and methods used by law enforcement today. It is unquestionable that new technologies will be created to help law enforcement fight crime. Future law enforcement personnel will undoubtedly encounter technology not even mentioned in this presentation.

More Related