310 likes | 420 Views
Chapter 2. Computers in Government, Law Enforcement, and the Military. Introduction. Computers and the Government Electoral process, postal services, census, and taxes Computers in Law Enforcement
E N D
Chapter 2 Computers in Government, Law Enforcement, and the Military
Introduction • Computers and the Government Electoral process, postal services, census, and taxes • Computers in Law Enforcement Evidence and criminal record databases, traffic violations, stolen vehicles, missing children, wireless 911 • Computers and Homeland Security Tracking visitors, surveillance, crisis management • Computers in the Military UAVs, PackBots, smart bombs, tracking troop movement, computer simulations
Computers and Government • Streamline office functions • Make information publicly available • Handle processing of applications and forms • Analyze and store data and statistics • Manage budgets and payrolls
The Election Process • Campaign polling • Often done electronically • Results are analyzed using software applications • Demographic groups are specifically targeted • Voters and candidates can research online • Candidate’s web site • Voting records • Campaign finance databases • News sources
United States Postal Service • Uses an optical character recognition (OCR) system • Translates characters into digital images • Looks up addresses in a database • Applies a POSTNET bar code • Routes mail using a bar code sorter • Provides customer service and products on its Web site Calculate shipping costs, buy stamps, hold and forward mail, change address
Census Bureau • Optical mark recognition system scans data • Computers tabulate data • Handheld computers are envisioned for the next census • Will store contact information for people who have not filled out census forms • Will have the ability to input data electronically • Census statistics are available to the public online
Internal Revenue Service • Tax preparation software or a tax preparation Web site can guide taxpayers through the process of filing taxes Analyzes the form for errors and missed deductions • Forms may be mailed or submitted electronically through the IRS e-File system • Refunds may be given via direct deposit • IRS web site provides comprehensive information • Recent tax news for specific demographic groups • Forms for downloading • Tracking of refunds
Computers In Law Enforcement • Officers today usually carry a PDA to • Write tickets • Fill out accident reports • Complete routine police work • Scan driver’s license bar codes • Download criminal and driving records from databases with the driver’s license bar code • Many squad cars come equipped with a laptop Allows information retrieval from headquarters while on the road
Tracking Evidence • Police enter documentation about evidence into a handheld computer • Wirelessly transmits the information to an evidence database • Prints out a bar code sticker that is placed on the physical evidence • DNA evidence is stored in the CODIS (Combined DNA Index System) database Forensic and offender indexes • Fingerprint evidence is stored in the AFIS (Integrated Automated Fingerprint Identification System) database Fingerprint images are scanned electronically
Storing Criminal Records • NCIC (National Crime Information Center) • FBI database of criminal justice information • Officers check subject’s previous record after arrest • NICS (National Instant Criminal Background Check System) • FBI system to help gun dealers perform background checks on potential buyers • Dealer calls the Bureau of Identification to run a query on several databases • Databases of violent sexual offenders Relevant information often made public online
Enforcing Traffic Laws • Red-light systems use computer tech to catch drivers who run red lights • Cameras are positioned at intersection corners • A sensor loop triggers the computer if a car moves over a certain speed • The computer adds the time, location, etc. to photos • A citation is sent to the offender • Traffic violation fines may often be accessed and paid online
Tracking Stolen Vehicles • LoJack is a stolen vehicle recovery system • A wireless radio-frequency transmitter is placed in the car • The vehicle identification number of a stolen vehicle is checked against the NCIC • A signal is sent to the device • The device sends a homing signal back to a tracking computer with a map • Key pass theft system Uses a motion sensor and uniquely coded key pass to detect unauthorized motion of a vehicle
Amber Alert System • Immediately notifies public for help in recovering missing children • Uses EAS (Emergency Alert System) technology • EAS broadcasts alert on radio and television; dynamic message signs • NCMEC (National Center for Missing and Exploited Children) also provides alerts
Providing Wireless 911 • Enhanced 911 (E-911) displays phone number and address information on operator’s computer The ANI (automatic number identifier) and ALI (automatic location identifier) databases provide the information • ANI and ALI do not work with cell phones • FCC requires that all cell phone providers equip phones with GPS (global positioning system) receivers Computer links this information to the ALI database
VeriChip • Implantable microchip that stores personal information • Useful for tracking people with illnesses or in danger; missing pets • Raises privacy and legal issues
Homeland Security • The U.S. VISIT system is being implemented to identify fake documents Visitor and Immigrant Status Indication Technology is a database of biometric identifiers • Foreign students must provide personal information to the SEVIS system • SEVIS (Student and Exchange Visa Information Service) is an Internet-based database to verify enrollment • Some criticism due to lack of privacy and technological errors
Homeland Security, cont. • Surveillance using computer vision systems • U.S.-Canadian border uses digital camera at ports of entry to detect unusual movements • Software uses artificial intelligence to analyze data from cameras • Alerts are sent electronically • Managing crises through collaboration • Web-based collaboration systems help track and manage events during a crisis • Information can be shared and viewed in real time by authorized users
Computers in the Military • The military is constantly working to improve technologies for equipment and systems • Wars and conflicts have historically brought new products into commercial use by citizens • Recent trends use advanced computer technology • GPS (global positioning system) technology for navigation and weapons • Rugged laptops with wireless technologies for troop communication • Computer simulations for training
Unmanned Aerial Vehicles (UAVs) • Used to gather intelligence in crowded areas • Day or nighttime surveillance • Lightweight, remote-controlled drones • GPS for determining location • Chemical-agent detector • Color or night vision miniature camera • Relays live images to video recorder or ground receiver • May be used by police, oil companies, or news organizations in the future
Remote-Controlled Robots • Used in small or hazardous locations • React to their environment through detectors • Cameras • Microphones • Sonar and infrared sensors • Laser scanners • Radio antenna and network hub • New robots are being developed to steer vehicles without human help Used to deliver humanitarian aid or retrieve troops
Precision-Guided Bombs Smart bombs are guided to their targets using satellite-guidance capability • Intended to maximize damage to the target and minimize civilian casualties and collateral damage • Uses GPS to pinpoint location • Dependent on human intelligence Mapping of location and entering coordinates • Technology may be used in airplanes and cars in the future
Tracking Troop Movement • GPS is used to track troop movement • Helps troops accurately determine their location and the enemy’s position • Coordinates actions of different units on the ground, in the air, or at sea • Provides better rescue and response • Used to drop cargo packages from the air • GPS jamming systems are being developed to reduce effectiveness of enemy GPS guidance systems
Computer Simulation for Training • Live training with military equipment is expensive and dangerous Computer simulations can provide training without the associated risks and costs • Computer simulations use computers and software to create battle scenarios • One computer simulates each military vehicle • Networked computers simulate an entire battle • Multiple repetitions can provide practice, feedback, and analysis • Dependent on expert assumptions and algorithms
Conclusion • Government Electoral process, USPS, Census Bureau, IRS • Law Enforcement • Evidence and criminal record databases • Traffic laws, missing children, wireless 911 calls • Homeland Security Crisis management, surveillance of borders • Military UAVs, remote-controlled robots, smart bombs, tracking troop movement, computer simulations