support 24/7
Subscribe!
Home » regulation » technology and police force essay

Technology and police force essay

No surprise technological developments are getting utilized worldwide, Jamaica included, to combat the scourge of crime by removing criminals and apprehending all of them after the action. Snow in his book posited that many commanders in law enforcement today find technology while the key to controlling criminal offense and making our residential areas safer (9). Information Technology (IT) is defined, according to the Oxford Concise English language Dictionary, because the study or use of systems, especially pcs and telecommunications, for storing, retrieving, and sending information.

Technology is usually integrated into each of our everyday hails from innumerable methods. It is almost impossible to go through a day without interfacing with a technical or electronic device. Technology has been of such significant benefit to our lives which it would be foolhardy of us not to explore their usefulness in combating criminal offense ” a societal problem of gigantic proportions. Criminal offenses is a great offence against an individual or maybe the state which is punishable legally. Information Technology can easily play a part in the fight through crime diagnosis, applying procedures in offense fighting, and implementing devices for sustained crime supervision.

Information Technology can be adroitly used in the detection of crime.

Biometrics, product protection and closed-circuit television (CCTV) are among the list of elements which can be utilized. Human beings can be exclusively recognized relying on one or more inbuilt physical traits. According to the Oxford Concise English language Dictionary, Biometrics is the application of statistical examination to neurological data. However , the concern is to use technologies that analyze individual characteristics pertaining to automatically knowing or validating identity in a context in which the biometrics is definitely measurable. The biometric characteristics of an specific can be possibly physical or perhaps behavioural (Zhang 2). Finger printing, face recognition and DNA tests are a few of many ways biometrics may be used. Zhang clarifies that biometric systems job using enrolment and recognition parts. The enrolment portion has a wearer’s characteristics prepared to be used like a criterion, plus the identification component has the software for confirming a captured end customer’s characteristics (8). In 1984, Richard Ramirez, serial monster and rapist in El monte, brought fingerprinting technology to theforefront.

Richard, who later became known as the “Night Stalker, for a little over a yr, while this individual carried out his atrocities, produced efforts to get the police to apprehend him a futile workout. The police had, during the course of their very own investigations, obtained fingerprints in the crime views. These prints, however , had been of very little value as it would have decades to compare them to the hundreds of thousands on data file if the law enforcement had no known think. In 1985, an Automated Finger-print Identification Program (AFIS) transformed all of the constraints of finger-print identification in a matter of minutes. The device was able to favorably identify the fingerprint as that belonging to Richard Ramirez and having been arrested this day following his photograph was released for the press. The police and open public had seen a real life example of the value of using high-tech equipment in criminal id (Snow 1-6). Unlike fingerprint scanning service, face reputation has the advantages of being nonintrusive, natural and easy to use (Jain 1). Confront images could be captured from afar without holding the person being identified, and the identification will not require reaching the person. Additionally , face identification aids in the crime recognition process because face images that have been recorded and archived can afterwards be used to identify a person of particular fascination.

The La Police Department (LAPD) would a test run that has been successful in capturing bad guys and reducing the crime rate (Attir). Facial reputation software was also a key component in Tampa, Florida where a young ladies abductor and murderer was arrested depending on footage captured on tape (Attir). Inspite of their achievement however , ethical concerns have already been raised mainly because it relates to infringements on specific rights or cases of mistaken identification. The chances of making mistakes with DNA, yet , are almost absent. Our systems contain over 45, 1000, 000, 000 miles of Deoxyribonucleic Acidity (DNA) ” a molecule found in the cells of humans, which makes us all extremely unique (Farquart). Recent use of GENETICS identification technology into the justice systems of the growing number of countries has become fast and much reaching. Biological samples, retrieved from crime scenes and individual potential foods, compared with archived DNA users have become a serious feature of policing around Europe, The united states and other parts (Williams and Johnson 1).

Like DNA, counterfeiting is starting to become a major characteristic. Fortunately, however , technology is able to make it a small one. Items are not immune to criminal offense. Counterfeiters and informal marketplaces threaten to erode earnings, disrupt supply chains and tarnish brands. Product security involves the use of smart ink, holograms and watermarks. In 2001, 95 million fake items, using a value of two billion Euros, were seized inside the European Union only. Security actions, for this reason, will be popular over the branded products industry. Intelligent inks offer the packaging material industry added protection against counterfeiters. Using these special ink, a number of features can be incorporated into the packaging. A hologram is known as a photograph associated with an inference subject which, when ever suitably illuminated, produces a three dimensional image. Holograms can be used by packaging materials industry to boost their brands as authentic and verified. As they are nearly impossible to copy and produce by the normal criminal, they are really useful for product brand security as well. Closed-Circuit Television (CCTV) is the utilization of video cameras to transmit a signal to a certain place, over a limited set of monitors. SECURITY CAMERA was first employed in Britain that kicks off in august of 1985 to table rising levels of vandalism on the city’s waterfront.

Less than a 10 years later, in 1993, a few 39 cities had CLOSED-CIRCUIT TELEVISION systems. Simply by March of 1995, the phone number was 80 and by Aug of the following year, above 200 (Goold 16-17). The detection of crime by simply CCTV involves the use of protection, monitoring and surveillance cams. CCTV video security cameras are the foundations of any kind of video security system. Excessive shutter rates of speed, pixel quality and recollection capacity let photographs to be taken when alerted by a movement detector or perhaps on a constant basis (Outsourcing CCTV Monitoring). With motion-detection, the camera software could be programmed to alert people who are employed in the security sector if movements is discovered in certain areas at unauthorized times. Security cameras have in recent years been used in homes to thwart potential burglars. The existence of a camera means that dubious activity may be captured or perhaps recorded and used against them in court. Monitoring and surveillance cameras likewise contribute to the recognition of crime.

Often times, monitoring and surveillance duties happen to be covered by a single camera with software separating the features. Kruegle says that case histories show that the installing of video cctv surveillance systems have developed a sharp fall in shoplifting and employee thefts. This individual said theft was not only confined to beneficial property, but to information too. Video surveillance systems efficiently serve as a deterrent to such offences in addition to detectingand apprehending perpetrators (2). Having determined the existence of crime, the job of crime preventing now comes for the fore. Information Technology incorporates elements such as forensics, wireless technology and the make use of information inside the fight against crime. In line with the Oxford Succinct English Book, forensic relates to or means the application of technological methods and techniques to the investigation of crime. Wikipedia defines forensics as “the application of a broad spectrum of sciences to reply to questions of interest to the legal system.  This may be regarding a crime or to a case. Forensics combines areas just like ballistic tests, DNA sources and laptop forensics. Ballistics deals with the science of projectiles and weapons.

It includes the technicians that deal with the airline flight, behaviour and effects of projectiles, for example , bullets. Equally important may be the firearm plus the analysis of its use in criminal activity. Ballistic research has been used by law enforcement considering that the 1930s. Developments in computer system image image resolution technology within the last decade, nevertheless , have brought ballistic fingerprint scanning into the cutting edge of criminal offense analysis. In 1997, the FBI and ATF create a nationwide level-database known as the National Integrated Ballistics Information Network (NIBIN) to read digitalized ballistic fingerprint of guns accustomed to commit criminal offense (Carter and Vasan 77). In addition to NIBIN, the FBI also offers a databases in which GENETICS profiles are kept. This kind of DNA database is called the Combined DNA Index Program or CODIS. Europe and South America include contributed samples to CODIS making it appropriate for the directories from these kinds of countries. (Kobilinsky, Liotti, and Oeser-Sweat 163).

The United Kingdom also has a Countrywide DNA data source called NDNAD. At the end of 2006 it carried above 4 , 000, 000 samples and grows simply by 30, 000 samples each month with info from criminal offense scenes and suspects. Pattavina, in her book, mentioned that a Nationwide Institute of Justice (NIJ) funded examine conducted around the application of GENETICS databases, indicated that important assistance could be had via these devices in the stress and criminal prosecution of offenders. The study also found that the usage of the databases prevents several. 8 crimes for each GENETICS based certainty. (14-15). Computer systems are not immune system to offense. Despite playing an active function in the examination and storage area of airborne and DNA information, personal computers are themselves sometimes the cause of legal activities.

Laptop forensics is the “collection, upkeep, analysis, and presentation of computer-related evidence (Vacca 4). White training collar crimes, killing, terrorism, counterintelligence, espionage, faking and medicine dealing almost all can require computers. One among three tasks is enjoyed by the pc in a laptop crime. It really is either the target of the criminal offense, the tool of the offense or, evidence repository keeping valuable advice about the crime. Vacca states the objective of computer forensics is to restore, analyze, and present computer-based material in a manner that it is able to be used as data in a court (6). Wifi technology is likewise predominantly employed in the fight against offense. Wireless technology covers cell phones, Global Positioning Systems (GPS) and Radio Frequency Identification (RFID) tags inside the fight against crime. With additional people using cellular phones right now than any other time in history, these are the people we need when a crime happens. Black states that the Oregon State Law enforcement officials received twice the number of cell phone calls from cellular phones in 2006, than they did in 2000, that they can attribute to more people carrying cellular phones.

New York Creciente Michael Bloomberg said in the state with the city addresses that the city plans to set up new technology to ensure that 911 call up centres can easily receive digital images and video sent from cell phones. Cellular phones have been completely instrumental in solving criminal activity in other elements of the world. Authorities in London utilized cellular phone pictures to identify assailants in the London, uk bombings in July 2006 (Reardon). Gps System (GPS), another cellular technology, provides joined the fight against crime. A few minutes after Jones Frisks experienced robbed a bank in Spokane, Buenos aires, police arrested him and recovered $37, 920 he had stuffed in a duffel bag. Unknown to him, the bank teller had given him a GPS checking device invisible inside the supply of bills. Upon receiving notification of the robbery, the police activated the GPS checking program on the computers. They were immediately notified of the money and the robber and relocated to apprehend him.

Police were able to retrieve a absent truck, built with GPS that had taken artwork. Lieutenant Tim Stewart of the North Texas Car Theft Job Force reported that more than 50 pick up truck tractors and 75 trailers were retrieved in short order employing just a few GPS/cellular integrated systems (Snow 141-142). RFID alternatively, according to Hunt, A. Puglia, and M. Puglia, is not as popular in the us. Adoption of the technology for law enforcement applications has slowed down in development due to privateness concernsand lack of knowledge on it is potential for police force. Nevertheless, the uk has been more aggressive in developing and deploying RFID applications in police operations (71). Hunt, A. Puglia and M. Puglia, define RFID because “a wireless communication technology that is used to uniquely recognize tagged items or people (1). The crime preventing potential of RFID is just beginning to arise. Combined with solutions such as GPS and biometric identification, RFID can provide authorities agencies “with new and powerful technical tools to fix crimes (Hunt, A. Puglia and M. Puglia 74).

The use of details incorporates details sharing, the web, and info mining. A large number of countries with multiple law enforcement agencies have got information regional to their section that would be useful for the fight against criminal offense. Such details should be disseminated and shared to increased increase the co-operation among agencies and general public knowledge where crime preventing is concerned. Information sharing gained popularity following the 9/11 Percentage Hearings. It stemmed from the possible lack of response for the United States govt to known information about the organized terrorist acts on the Community Trade Hub prior to the event. Information is definitely power, more in law enforcement officials work as compared to other spheres of activity. The Internet is definitely similarly one more source of details for fighting crime. A murdered Chicago dermatologist’s family members did not leave it to the authorities to go after a potential believe. The group of the departed posted a surveillance camera of a blood-spattered young man flowing from the building. Police and victims of crime will be regularly applying social-networking websites such as Myspace . com, as great versions of “wanted posters. Police organizations have for several years monitored Myspace . com, YouTube, Facebook . com, Xanga and other popular sites to bust line sexual potential predators.

Police in Franklin, Ma, posted a video on YouTube of two males allegedly by using a stolen mastercard at Home Lager. Their fellow workers in local Bellingham, Mass., reported they were after the same men, and matched the faces with jail-booking photos. Data mining in the same way handles information yet from another type of angle. Law enforcement officials agencies, together with the current emphasis on terrorism, will be faced with the daunting job of rummaging large amounts info in order to make knowledgeable decisions. Data mining is an automated instrument that uses advanced methods, including unnatural intelligence “to fully explore and characterize large data sets including one or more info sources, identifyingsignificant, recognizable patterns, trends, and relationships not really easily discovered through classic analytical techniques alone (Gooch 1). Police personnel using data exploration for the purpose of analysis, can hyperlink incidents, offences or within crime trends to additional events to make deployment decisions. Equally important is definitely the need to apply measures for sustained crime management. Technology in the administration of criminal offense incorporates this sort of elements because authentication, digital monitoring and, data interception and retention.

Factors to get the process of authentication are generally grouped into three classes. They may be something the user has, a thing the user knows, and something the person is or does. Virtually any process that verifies someone or something as being real is known as authentication. Kent and Millett establish it while “the technique of establishing assurance in the real truth of a lot of claim (33). Authentication protects offender checking, voice recognition and fingerprint evaluation. Emphasis will probably be placed on the inherent aspect, something the consumer is or does. Leader Bush agreed upon a bill on July 27, 2006 that established a national sex offender computer registry. It allowed citizens anywhere in the United States to find out if a person is a known sex arrest. Despite the fact the registry provides the identity, addresses and place of work of the offenders, the police usually do not always understand where they may be. For example , though sexual predators may be unacceptable to visit certain locations, including schools or playgrounds, as a condition of all their release by prison, the authorities cannot whatever it takes unless they catch them in the take action.

Information Technology, by means of offender tracking, has now given the police a fresh tool which they can use to “monitor the activity of these really dangerous individuals (Snow 140). Extremely risky individuals quickly nabbed by the sound with their voice. The Computer Voice Tension Analyzer (CVSA) is a “voice-based investigative truth verification tool.  Eight year old Rowan Ford’s killers underwent CVSA examinations after their polygraphs examinations were determined to get inconclusive. Because of the precise effects of the CSVA examinations, the two killers had been charged with first-degree killing and rasurado. Fingerprint Evaluation uses computer system algorithms to ascertain similarities between a physical printing and one particular stored in a database. Evaluation is carried out on multiple levels in which algorithms happen to be first compared to the prints to look for the type, and after that subsequently todetermine additional particulars until a match is found. The FBI fingerprint system boasts a great accuracy price in excess of 98% (Lichanska). With their unique attributes, it is easily understood how fingerprints may be used to manage offense.

In addition to authentication, electronic digital monitoring is yet another aspect of offense management that warrants search. Electronic monitoring includes security systems, Physical Information Devices and a radio station frequency monitoring devices. These types of aspects of electronic digital monitoring act like those protected in criminal offenses detection as both offense detection and prevention occasionally employ like techniques. The Oxford Succinct English Book defines monitoring as end of trading observation, especially of a supposed spy or perhaps criminal. Under the umbrella of electronic monitoring, such declaration would be completed electronically which is normally carried out with the use of CLOSED-CIRCUIT TELEVISION. Law enforcement detects surveillance beneficial as it enables them to maintain cultural control, identify and keep an eye on threats, and stop criminal activity.

Alun Micheal, Minister of State in England proffered the following on CLOSED-CIRCUIT TELEVISION: The advantages of CCTV, effectively managed, are left out for obvious reasons: crime avoidance, the deterrent effect of realizing that there is remark, the alerting of authorities at an early stage to halt dangerous scenarios escalating, the operational assist with the police in sizing up a situation, the safer vérité that can be acquired ” the savings in court time can be tremendous ” and, above all, the truth that peoples’ confidence is renewed, that has led to a large number of town organisations being revitalised. Vulnerable groupings in particular feel the advantage. (qtd. in Goold 1)

Geographical Information Systems (GIS) likewise assists the police with criminal offense management. Because so many crime data have a certain location, all types of data, which include registered sex offenders, potential foods and offense locations could be added to a map. Having identified space patterns, police resources could be effectively implemented for offense analysis and prevention. For example , law enforcement may prioritise spots for actions such as medicines or prostitution stings based upon where these crimes because so many prevalent. In “Geographic Information Systems and Crime Analysis in Baltimore County, Maryland,  Philip Canter states that GIS can be used as being a tool to identify contributing elements to crime, thus allowing police to proactively respondto situations before they become difficult (156). Aggressive response may also be had from radio regularity monitoring products. These monitoring devices impose a curfew on offenders and, displays whether or not they are home on the required instances. The system functions through a transmission device worn around the ankle and a receiver connected to the landline telephone with the offender. Digital contact is usually maintained together with the receiver always and the specialists are alerted if the offender strays past an acceptable limit. (Kardasz).

In the same manner data get can be detected, it can also be intercepted. Data interception and retention involves snooping, wire tapping and data retention. Within the last nine weeks of 06\, Lomas studies the Usa Kingdom’s (UK) snooping watchdog revealed that that received 253, 000 asks for to eavesdrop on an individual’s communications. In respect to Lomas, hundreds of UK public systems are official to intercept communication with regards to crime avoidance and detection. Lomas offered the sales and marketing communications commissioner because saying “this highly distressing investigative tool has “contributed to a volume of striking successes in combating crime and terrorism since, it performed a vital role in the battle against serious offense and terrorism that could not be achieved by any other means. Snooping means to research or look around furtively so that they can find out something. Another inconspicuous means of obtaining information is wiretapping.

The U. H. Congress handed the Sales and marketing communications Assistance for Law Enforcement Take action (CALEA) in 1994. CALEA was approved in an effort to help law enforcement’s drive in conducting felony investigations necessitating the tapping of digital telephone sites. Wiretapping, although normally associated with telephones, may include other forms of electronic interaction such as e-mails, faxes, and data moves as a result of developments in technology. This method of information interception can be a very effective tool, allowing law enforcement to detect lawbreaker conspiracies and present the info as evidence. Wiretapping tools are especially helpful as the communicators don’t have any way of understanding they are being intercepted (Cheung). Equally important can be Britain’s passing of regulations in 2006 to aid its law enforcement officials. Data retention laws, requiring telecom operators to store cellphone and net data, had been passed with all the aim of assisting in the battle against terrorism and organized offense. Hermida, Technology Editor to get the BBC News web page, quoted Home Secretary, Charles Clarke straining theimportance with the measures.

Clarke said “agreement on retaining communications info places an important tool against terrorism and serious criminal offense in the hands of police force agencies throughout Europe.  He added that “modern criminality passes across borders and seeks to exploit digital technology,  and that an essential step was taken in providing to people across The european union, a right to live in peace coming from “the adverse impact of terrorism and serious crime (Hermida). Info retention identifies the storage space of electronic digital communication records which includes call record specifics, Internet traffic and transaction info. As a developing country which has a notorious record for criminal offense and violence, Jamaica provides given technology a role to try out in increasing its criminal offense fighting ability.

Former Minister of Countrywide Security, Senator Colonel Trevor MacMillan, released CCTV monitoring system in the towns of Mandeville and could Pen. The minister explained that “the wide scale use of modern tools will be critical in addressing the criminal offenses problem plaguing the nation, since outdated methods have proven to be unproductive, and will need to be shelved (Ministry of Countrywide Security). Advancements are also being created to the government’s Forensic Laboratory’s technology to deal with the anticipated increase in DNA test requests beneath the lastest anti-crime initiative. Strategies to establish a DNA repository was announced by the Perfect Minister to support the police in convicting bad guys. The use of technology, albeit limit, is a part of the right course to eliminate Jamaica of crime.

I . t has significantly changed the approach of law enforcement to crime fighting. Advances in technology has improved, and other instances, totally changed distinguishly the methods found in the areas of detecting, fighting and handling crime. Biometrics, product safety and CLOSED-CIRCUIT TELEVISION have made a great indelible indicate on the recognition capabilities of crime. Equally important is the outstanding impact on the fighting of crime. On this factor, information technology makes excellent utilization of forensics, wifi technology and information. Finally and ineffaceably is the function of information technology in management of crime. Authentication, electronic monitoring and data interception and retention have made strident inroads in the durability of offense management. Information technology in its different roles continually take its byte on crime gradually.

Works Mentioned

Attir, Heidi. Pros and Cons: The use of Facial Recognition Computer software in Offense Prevention. twenty two August 2008. 17 April 2009 . Dark, Kate. Elimination Works: Can easily Your Cellphone Support Fight Offense. 29 May possibly 2008. 19 April 2009 . Carter, Gregg. Gun Control in the United States: A Reference Handbook. ABC-CLIO, 06\. Contributors, Wikipedia. Forensic Scientific research. 16 04 2009. 19 April 2009 . Farquart, Digby. DNA Felony Investigation, Criminal offense Prevention and Detection. 18 January 2007. 18 The spring 2009 . Gooch, Teresa. Info Mining and Value-Added Research. November 2003. 18 04 2009 . Goold, Benjamin. CCTV and Policing: Public Area Surveillance and Police Practices in Britain. Cary: Oxford University Press, 2004. Hermida, Alfred. “UK rapped about data retention law.  24 Febraury 2006. BASSE CONSOMMATION. 21 Apr 2009 . Look, V, A. Puglia and M. Puglia. RFID: A guide to Radio Frequency Identification. Hoboken: Wiley-Interscience, 3 years ago. Jain, Anil. Handbook of Face Identification. New York: Springer-Verlag New York, LLC, 2004. Kardasz, Frank. GPS Tracking of sites Sex Offenders ” Umschlüsselung Wireless Hot spots and Over and above. 20 January 2009. twenty April 2009 . Kasindorf, Matn. Websites Number Wealth of Crime-Solving Clues. four February 3 years ago. 19 04 2009 . Kobilinsky, Liotti, Oeser-Sweat. DNA: Forensic and Legal Applications. Wiley, 2004. Kruegle, Herman. LOW LUX Surveillance. Burlington: Butterworth-Heinemann, 2005. Lichanska, Agnieszka. Fingerprint Evaluation. 2008. twenty April 2009 . Lomas

1

< Prev post Next post >

Find Another Essay On Exploiting My Strengths and Strengthening My Weaknesses

What media self regulation essay

This conventional paper seeks to outline and discuss the merits and demerits of self-regulation. Relevant examples will be cited that illustrate the points elevated. Appropriate definitions of the key words ...

Problem facing u t health care system concerned

Cardiovascular System, Family members Medical Leave Act, Family And Medical Keep Act, Medication Excerpt by Essay: Medical Malpractice/Frivolous Lawsuits The Effect of Medical Malpractice/Frivolous Law suits on Health care The ...

Coruption in pakistan essay

FILE CORRUPTION ERROR ABSTRACT: – Corruption is known as a ‘poison’ which usually squanders the government resources, deters investment which is detrimental to financial growth and political development. It flourishes, ...

Ho chi minh and ngo dinh diem essay

Following the Geneva convention in1954, a was a part of end the First Indochina war. The agreements also lead to the temporary label of the Democratic of Vietnam into two ...

Duty audit and tax analysis in malaysia essay

Taxes Investigation has to be clearly individual from Duty Audit. Duty Investigation can be an inspection from the tax payers business or perhaps individual catalogs, records or perhaps document in ...

Punctuality in the armed forces essay

Punctuality in a army environment is essential as it allows tasks to become completed, and allows leaders to execute accountability, PCCs and PCIs for particular operations. As well, depending on ...

Organization ethics representation essay

Some three years ago, my company chosen to hire a male of Middle-Eastern decent to fill an open project executive position. The gentlemen exemplified what the organization wanted and needed ...

State agreement under worldwide law

International Legislation, State This kind of essay can be examining condition consent below international legislation. Furthermore, it could also be evaluating how international law can be grounded around the actual ...

The legal case of riggs v palmer essay

In the matter of Riggs sixth is v. Palmer, the issue at hand is whether or not Elmer Palmer, a man whom purposely poisoned his grandpa, should be permitted to ...

Children work 1989 term paper

Child Observation, Publication Of Acts, Parental Responsibility, Child Poverty Excerpt coming from Term Newspaper: Although some include called for the abolition of the substitute father or mother juvenile proper rights ...
Category: Regulation,
Words: 4349

Published: 04.01.20

Views: 608

A+ Writing Tools
Get feedback on structure, grammar and clarity for any essay or paper
Payment discover visa paypalamerican-express How do we help? We have compiled for you lists of the best essay topics, as well as examples of written papers. Our service helps students of High School, University, College