1 / 31

Chapter 2

Chapter 2. Computers in Government, Law Enforcement, and the Military. Introduction. Computers and the Government Electoral process, postal services, census, and taxes Computers in Law Enforcement

elon
Download Presentation

Chapter 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 2 Computers in Government, Law Enforcement, and the Military

  2. Introduction • Computers and the Government Electoral process, postal services, census, and taxes • Computers in Law Enforcement Evidence and criminal record databases, traffic violations, stolen vehicles, missing children, wireless 911 • Computers and Homeland Security Tracking visitors, surveillance, crisis management • Computers in the Military UAVs, PackBots, smart bombs, tracking troop movement, computer simulations

  3. Computers and Government • Streamline office functions • Make information publicly available • Handle processing of applications and forms • Analyze and store data and statistics • Manage budgets and payrolls

  4. The Election Process • Campaign polling • Often done electronically • Results are analyzed using software applications • Demographic groups are specifically targeted • Voters and candidates can research online • Candidate’s web site • Voting records • Campaign finance databases • News sources

  5. Table 2-1: Computerized voting systems

  6. Direct recording electronic machines

  7. United States Postal Service • Uses an optical character recognition (OCR) system • Translates characters into digital images • Looks up addresses in a database • Applies a POSTNET bar code • Routes mail using a bar code sorter • Provides customer service and products on its Web site Calculate shipping costs, buy stamps, hold and forward mail, change address

  8. Census Bureau • Optical mark recognition system scans data • Computers tabulate data • Handheld computers are envisioned for the next census • Will store contact information for people who have not filled out census forms • Will have the ability to input data electronically • Census statistics are available to the public online

  9. Internal Revenue Service • Tax preparation software or a tax preparation Web site can guide taxpayers through the process of filing taxes Analyzes the form for errors and missed deductions • Forms may be mailed or submitted electronically through the IRS e-File system • Refunds may be given via direct deposit • IRS web site provides comprehensive information • Recent tax news for specific demographic groups • Forms for downloading • Tracking of refunds

  10. Computers In Law Enforcement • Officers today usually carry a PDA to • Write tickets • Fill out accident reports • Complete routine police work • Scan driver’s license bar codes • Download criminal and driving records from databases with the driver’s license bar code • Many squad cars come equipped with a laptop Allows information retrieval from headquarters while on the road

  11. Tracking Evidence • Police enter documentation about evidence into a handheld computer • Wirelessly transmits the information to an evidence database • Prints out a bar code sticker that is placed on the physical evidence • DNA evidence is stored in the CODIS (Combined DNA Index System) database Forensic and offender indexes • Fingerprint evidence is stored in the AFIS (Integrated Automated Fingerprint Identification System) database Fingerprint images are scanned electronically

  12. Storing Criminal Records • NCIC (National Crime Information Center) • FBI database of criminal justice information • Officers check subject’s previous record after arrest • NICS (National Instant Criminal Background Check System) • FBI system to help gun dealers perform background checks on potential buyers • Dealer calls the Bureau of Identification to run a query on several databases • Databases of violent sexual offenders Relevant information often made public online

  13. Enforcing Traffic Laws • Red-light systems use computer tech to catch drivers who run red lights • Cameras are positioned at intersection corners • A sensor loop triggers the computer if a car moves over a certain speed • The computer adds the time, location, etc. to photos • A citation is sent to the offender • Traffic violation fines may often be accessed and paid online

  14. Tracking Stolen Vehicles • LoJack is a stolen vehicle recovery system • A wireless radio-frequency transmitter is placed in the car • The vehicle identification number of a stolen vehicle is checked against the NCIC • A signal is sent to the device • The device sends a homing signal back to a tracking computer with a map • Key pass theft system Uses a motion sensor and uniquely coded key pass to detect unauthorized motion of a vehicle

  15. Amber Alert System • Immediately notifies public for help in recovering missing children • Uses EAS (Emergency Alert System) technology • EAS broadcasts alert on radio and television; dynamic message signs • NCMEC (National Center for Missing and Exploited Children) also provides alerts

  16. Providing Wireless 911 • Enhanced 911 (E-911) displays phone number and address information on operator’s computer The ANI (automatic number identifier) and ALI (automatic location identifier) databases provide the information • ANI and ALI do not work with cell phones • FCC requires that all cell phone providers equip phones with GPS (global positioning system) receivers Computer links this information to the ALI database

  17. VeriChip • Implantable microchip that stores personal information • Useful for tracking people with illnesses or in danger; missing pets • Raises privacy and legal issues

  18. Homeland Security • The U.S. VISIT system is being implemented to identify fake documents Visitor and Immigrant Status Indication Technology is a database of biometric identifiers • Foreign students must provide personal information to the SEVIS system • SEVIS (Student and Exchange Visa Information Service) is an Internet-based database to verify enrollment • Some criticism due to lack of privacy and technological errors

  19. Homeland Security, cont. • Surveillance using computer vision systems • U.S.-Canadian border uses digital camera at ports of entry to detect unusual movements • Software uses artificial intelligence to analyze data from cameras • Alerts are sent electronically • Managing crises through collaboration • Web-based collaboration systems help track and manage events during a crisis • Information can be shared and viewed in real time by authorized users

  20. Real-time computerized incidence maps

  21. Computers in the Military • The military is constantly working to improve technologies for equipment and systems • Wars and conflicts have historically brought new products into commercial use by citizens • Recent trends use advanced computer technology • GPS (global positioning system) technology for navigation and weapons • Rugged laptops with wireless technologies for troop communication • Computer simulations for training

  22. Unmanned Aerial Vehicles (UAVs) • Used to gather intelligence in crowded areas • Day or nighttime surveillance • Lightweight, remote-controlled drones • GPS for determining location • Chemical-agent detector • Color or night vision miniature camera • Relays live images to video recorder or ground receiver • May be used by police, oil companies, or news organizations in the future

  23. Unmanned aerial vehicle (UAV)

  24. Remote-Controlled Robots • Used in small or hazardous locations • React to their environment through detectors • Cameras • Microphones • Sonar and infrared sensors • Laser scanners • Radio antenna and network hub • New robots are being developed to steer vehicles without human help Used to deliver humanitarian aid or retrieve troops

  25. PackBot

  26. Precision-Guided Bombs Smart bombs are guided to their targets using satellite-guidance capability • Intended to maximize damage to the target and minimize civilian casualties and collateral damage • Uses GPS to pinpoint location • Dependent on human intelligence Mapping of location and entering coordinates • Technology may be used in airplanes and cars in the future

  27. Smart bomb

  28. Tracking Troop Movement • GPS is used to track troop movement • Helps troops accurately determine their location and the enemy’s position • Coordinates actions of different units on the ground, in the air, or at sea • Provides better rescue and response • Used to drop cargo packages from the air • GPS jamming systems are being developed to reduce effectiveness of enemy GPS guidance systems

  29. Computer Simulation for Training • Live training with military equipment is expensive and dangerous Computer simulations can provide training without the associated risks and costs • Computer simulations use computers and software to create battle scenarios • One computer simulates each military vehicle • Networked computers simulate an entire battle • Multiple repetitions can provide practice, feedback, and analysis • Dependent on expert assumptions and algorithms

  30. Conclusion • Government Electoral process, USPS, Census Bureau, IRS • Law Enforcement • Evidence and criminal record databases • Traffic laws, missing children, wireless 911 calls • Homeland Security Crisis management, surveillance of borders • Military UAVs, remote-controlled robots, smart bombs, tracking troop movement, computer simulations

More Related