1 / 11

Computers in Law Enforcement

Computers in Law Enforcement. By Sterlin Sanders. Introduction. How computers are used in law enforcement? Controversy? Increase or Decrease? Helpful or Problematic?. Computers used as Databases. Abilities of the Criminal Databases FBI and the NCIC GBI and the GCIC

primo
Download Presentation

Computers in Law Enforcement

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computers in Law Enforcement By Sterlin Sanders

  2. Introduction • How computers are used in law enforcement? • Controversy? • Increase or Decrease? • Helpful or Problematic?

  3. Computers used as Databases • Abilities of the Criminal Databases • FBI and the NCIC • GBI and the GCIC • Hazlehurst Police Dept. and the “Megatron” • Interviewee: Lt. Larry Allen

  4. Computers used as Mobile Devices • What is a Mobile Data Terminal (MDT)? • Advantages (DBPD “Virtual Partner”) • Verbal response • Quick Ticket • Quick Crash • Quick Map • Increase in citations == Decrease in stop time

  5. Computers used as Mobile Devices • Disadvantages of MDT • Expensive • Small coverage area • MDT software • Alternative • The CAD system • Interviewee: Stacey Bridges

  6. Computers used as Internet Crime Tools • What is Hacking? • Solutions • Computer Forensics • Electronic Surveillance

  7. Computer Forensics • What is Computer Forensics? • Issues • Steve Martin Report • Melissa Virus • Paypal Inc.

  8. Electronic Surveillance • What is Electronic Surveillance • Issues • Carnivore • Magic Lantern • Government believe: • Stop Terrorism • People believe: • Government wants power • Government will spy on the innocent • Violating Privacy Rights

  9. Computers used as Identification Tools • What is Biometrics • Type of Biometrics • Authentication • Identification

  10. Biometrics • Authentication • Identification • Risks • False-positve identification • High watch list == low accuracy • Copied or stolen biometric data • Issues

  11. Conclusion • Computers are helpful • Computers can cause problems • Increase in computer use

More Related