110 likes | 291 Views
Computers in Law Enforcement. By Sterlin Sanders. Introduction. How computers are used in law enforcement? Controversy? Increase or Decrease? Helpful or Problematic?. Computers used as Databases. Abilities of the Criminal Databases FBI and the NCIC GBI and the GCIC
E N D
Computers in Law Enforcement By Sterlin Sanders
Introduction • How computers are used in law enforcement? • Controversy? • Increase or Decrease? • Helpful or Problematic?
Computers used as Databases • Abilities of the Criminal Databases • FBI and the NCIC • GBI and the GCIC • Hazlehurst Police Dept. and the “Megatron” • Interviewee: Lt. Larry Allen
Computers used as Mobile Devices • What is a Mobile Data Terminal (MDT)? • Advantages (DBPD “Virtual Partner”) • Verbal response • Quick Ticket • Quick Crash • Quick Map • Increase in citations == Decrease in stop time
Computers used as Mobile Devices • Disadvantages of MDT • Expensive • Small coverage area • MDT software • Alternative • The CAD system • Interviewee: Stacey Bridges
Computers used as Internet Crime Tools • What is Hacking? • Solutions • Computer Forensics • Electronic Surveillance
Computer Forensics • What is Computer Forensics? • Issues • Steve Martin Report • Melissa Virus • Paypal Inc.
Electronic Surveillance • What is Electronic Surveillance • Issues • Carnivore • Magic Lantern • Government believe: • Stop Terrorism • People believe: • Government wants power • Government will spy on the innocent • Violating Privacy Rights
Computers used as Identification Tools • What is Biometrics • Type of Biometrics • Authentication • Identification
Biometrics • Authentication • Identification • Risks • False-positve identification • High watch list == low accuracy • Copied or stolen biometric data • Issues
Conclusion • Computers are helpful • Computers can cause problems • Increase in computer use