Computer Technology in Law Enforcement
description
Transcript of Computer Technology in Law Enforcement
![Page 1: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/1.jpg)
Computer Technology Computer Technology in Law Enforcementin Law Enforcement
Eileen and TomEileen and Tom
EdwinEdwin
29 November 200629 November 2006
![Page 2: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/2.jpg)
Investigation Investigation TechnologyTechnology
![Page 3: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/3.jpg)
TechnologyTechnology
►Modern police cruisers contain the following Modern police cruisers contain the following equipment:equipment: LaptopsLaptops Radar (Radio Detection And Ranging)Radar (Radio Detection And Ranging) Radio/ ScannersRadio/ Scanners Video CamerasVideo Cameras
![Page 4: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/4.jpg)
LaptopsLaptops
►Allow officers to type reports, saves time. Allow officers to type reports, saves time. ►Can save reports to flash drives and print later.Can save reports to flash drives and print later.►Transfer info from computer directly to database Transfer info from computer directly to database
with flash drives. with flash drives. ►Will eventually allow officers to receive calls Will eventually allow officers to receive calls
through wireless networks and as well access through wireless networks and as well access information like license plates and images such information like license plates and images such as mug shotsas mug shots. .
![Page 5: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/5.jpg)
Radar Radar
►Radio Detection And RangingRadio Detection And Ranging►Remote sensor that gives off electromagnetic Remote sensor that gives off electromagnetic
waves ( radio, microwaves and light) and uses waves ( radio, microwaves and light) and uses these waves to measure presence, location and these waves to measure presence, location and motion. motion.
►Used to monitor on coming and receding traffic Used to monitor on coming and receding traffic by police officers. by police officers.
![Page 6: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/6.jpg)
Radio/ScannersRadio/Scanners► Transmit and receive Federal Government assigned frequencies in Transmit and receive Federal Government assigned frequencies in
Vhf and Uhf frequencies above standard broadcast FM stations of Vhf and Uhf frequencies above standard broadcast FM stations of the radio spectrum and can’t be heard on standard car or home the radio spectrum and can’t be heard on standard car or home radio.radio.
► Most frequencies are used by Public Safety (Police, Ambulance and Most frequencies are used by Public Safety (Police, Ambulance and Rescue crews)Rescue crews)
► Two types of scanners portable (handheld) and table ( found in cars)Two types of scanners portable (handheld) and table ( found in cars)► Frequent usersFrequent users
Public Safety, News Media, Home & Personal Security, Public Safety, News Media, Home & Personal Security, Corporate Security, Neighborhood Watch, Radio Hobbyists, Corporate Security, Neighborhood Watch, Radio Hobbyists,
Public Buildings, Hospital and School Security.Public Buildings, Hospital and School Security.
![Page 7: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/7.jpg)
Video CamerasVideo Cameras
►Recently installed in patrol carsRecently installed in patrol cars►Used to monitor work done by officersUsed to monitor work done by officers►Used to show how arrests are made Used to show how arrests are made
![Page 8: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/8.jpg)
Investigation Programs Investigation Programs
►Pattern RecognitionPattern Recognition►Investigative Investigative Information Management Information Management System (I2MS)System (I2MS)
![Page 9: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/9.jpg)
Pattern RecognitionPattern Recognition
►Finding patterns concerning the locations Finding patterns concerning the locations of the crimes.of the crimes.
►Tries to recognize and predict patterns of Tries to recognize and predict patterns of illegal behavior. illegal behavior.
![Page 10: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/10.jpg)
I2MSI2MS►Developed by CSC for Air force Office of Developed by CSC for Air force Office of
Special Investigation ( AFOSI).Special Investigation ( AFOSI). Focuses on criminal investigations and Focuses on criminal investigations and
counterintelligence in Air Force. counterintelligence in Air Force. enables agents to view recently entered information enables agents to view recently entered information
from half way around the world.from half way around the world. has the ability to record data from arrests, track has the ability to record data from arrests, track
location of gathered evidence, and store images like location of gathered evidence, and store images like maps, fingerprints and other electronic documents. maps, fingerprints and other electronic documents.
![Page 11: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/11.jpg)
Internet and Computer CrimeInternet and Computer Crime
![Page 12: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/12.jpg)
Types of Computer and Internet Types of Computer and Internet CrimeCrime
Computer as Computer as InstrumentInstrument
Includes:Includes:► EmbezzlementEmbezzlement► FraudFraud► LarcenyLarceny
Computer as ObjectComputer as Object
Includes:Includes:► TheftTheft► VirusesViruses
![Page 13: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/13.jpg)
Electronic FingerprintElectronic Fingerprint
Tracking what a person does on a Tracking what a person does on a computer via memory and history --computer via memory and history --
Is called an electronic fingerprintIs called an electronic fingerprint
![Page 14: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/14.jpg)
MemoryMemory
► CacheCache► RAMRAM►Hard Disk DriveHard Disk Drive► Any other memoryAny other memory
![Page 15: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/15.jpg)
HistoryHistory
Check internet history on browser –Check internet history on browser –
Can clear by holding CTRL + H keys Can clear by holding CTRL + H keys (though it should be known that (though it should be known that
nothing nothing is ever permanently deleted is ever permanently deleted from a computer)from a computer)
![Page 16: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/16.jpg)
TerrorismTerrorism
Hugely aided by computer technologyHugely aided by computer technology
![Page 17: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/17.jpg)
CryptologyCryptology
Definition: The branch of science that Definition: The branch of science that deals with secret communications deals with secret communications
using codes and ciphersusing codes and ciphers
Code – the use of symbols to represent Code – the use of symbols to represent numbers, letters, or wordsnumbers, letters, or words
Cipher – system of representing letters Cipher – system of representing letters with other letters to form imageswith other letters to form images
![Page 18: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/18.jpg)
CodesCodes
►Can stand for words or lettersCan stand for words or letters►Tell location in pages and sections of Tell location in pages and sections of
book where word is foundbook where word is found
Example: Morse code Example: Morse code
*Decoding takes a long time*Decoding takes a long time
![Page 19: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/19.jpg)
CiphersCiphers
Substitution CipherSubstitution Cipher
So “Meet you at the corner” looks like:So “Meet you at the corner” looks like:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
NMZAYBXCWDVEUFTGSHRIQJPKOL
UYYI OTQ NI ICY ZTHFYH
![Page 20: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/20.jpg)
Columnar TranspositionColumnar Transposition
Message is: “Meet you at the corner”Message is: “Meet you at the corner”
![Page 21: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/21.jpg)
Looks like: Looks like:
MEETYMEETY
OUATTOUATT
HECORHECOR
NERXXNERXX
![Page 22: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/22.jpg)
Code looks like: MOHN EUEE EACR TTOX Code looks like: MOHN EUEE EACR TTOX YTRXYTRX
(read from top to bottom, left to right)(read from top to bottom, left to right)
![Page 23: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/23.jpg)
How Do Computers Fit into How Do Computers Fit into Cryptology?Cryptology?
►Easier to createEasier to create►Easier to decryptEasier to decrypt►Easier to breakEasier to break
* “So far, it is far easier for a computer * “So far, it is far easier for a computer to encrypt a message than to break it”to encrypt a message than to break it”
![Page 24: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/24.jpg)
StenographyStenography
Definition: hiding files in plain view Definition: hiding files in plain view using encryptionusing encryption
Hiding text within text, images within Hiding text within text, images within images, and text within images or vice images, and text within images or vice
versaversa
![Page 25: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/25.jpg)
Without embedded textWithout embedded text With embedded textWith embedded text
![Page 26: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/26.jpg)
Capturing PedophilesCapturing Pedophiles
► Join same networks Join same networks and groupsand groups
► Create profilesCreate profiles► InteractInteract► Set up meetingSet up meeting► Finally catch themFinally catch them
![Page 27: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/27.jpg)
Other MethodsOther Methods
►Tapping IP addressesTapping IP addresses► Installing keylogging Installing keylogging
hardware/softwarehardware/software►SkimmersSkimmers►SniffersSniffers
![Page 28: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/28.jpg)
Forensic TechnologyForensic Technology
![Page 29: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/29.jpg)
DefinitionDefinition
►Forensics is the method of gathering Forensics is the method of gathering and analyzing evidence and and analyzing evidence and information at a crime scene.information at a crime scene.
![Page 30: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/30.jpg)
Forensics HistoryForensics History
►1598 – Fortunatus Fidelis is credited as 1598 – Fortunatus Fidelis is credited as being the first person to us modern being the first person to us modern forensic science.forensic science.
►Early 1800’s – forensic science becomes Early 1800’s – forensic science becomes an accepted branch of medicine.an accepted branch of medicine.
►1921 – John Larson creates the first 1921 – John Larson creates the first successful lie detector.successful lie detector.
►1923 – First police department crime 1923 – First police department crime laboratory established in the U.S.laboratory established in the U.S.
![Page 31: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/31.jpg)
Forensics HistoryForensics History
►1924 – Larson’s lie detector becomes 1924 – Larson’s lie detector becomes widely used in police interrogations widely used in police interrogations around the country.around the country.
►1932 – FBI creates national crime 1932 – FBI creates national crime laboratory.laboratory.
►1948 – American Academy of Forensic 1948 – American Academy of Forensic Science is established.Science is established.
►1967 – FBI creates National Crime 1967 – FBI creates National Crime Information Center.Information Center.
![Page 32: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/32.jpg)
Modern Forensic ScienceModern Forensic Science
►Every year new updates are seen that Every year new updates are seen that push the boundaries of forensic push the boundaries of forensic sciencescience
►Newer and newer technologies are Newer and newer technologies are creating better possibilities for creating better possibilities for investigators around the country.investigators around the country.
![Page 33: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/33.jpg)
National Virtual Translation National Virtual Translation CenterCenter
►Center established in early 2000 to Center established in early 2000 to help investigators with international help investigators with international cases.cases.
► Instantly translate documents and Instantly translate documents and intelligence in over a dozen languages.intelligence in over a dozen languages.
►Helps investigators with international Helps investigators with international cases and suspects.cases and suspects.
![Page 34: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/34.jpg)
Stable Isotope Ratio Mass Stable Isotope Ratio Mass SpectrometrySpectrometry
►New method of New method of substance testing.substance testing.
► Testing using this Testing using this method will allow method will allow investigators to see if investigators to see if two substances came two substances came from the same source.from the same source.
► Allows for much more Allows for much more accurate testing in accurate testing in criminal investigations.criminal investigations.
![Page 35: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/35.jpg)
Mitochondrial DNA AnalysisMitochondrial DNA Analysis
►A new type of DNA A new type of DNA testing that allows testing that allows for a much more for a much more accurate suspect accurate suspect pool.pool.
►Usually limits your Usually limits your suspect pool to a suspect pool to a certain family or certain family or bloodline.bloodline.
![Page 36: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/36.jpg)
Regional Computer Forensic Regional Computer Forensic LaboratoriesLaboratories
►These laboratories are used to detect These laboratories are used to detect evidence of computer crime.evidence of computer crime.
►Can scan any electronic device.Can scan any electronic device.►There are now several around the There are now several around the
country for easy access.country for easy access.
![Page 37: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/37.jpg)
DatabasesDatabases►CODIS – Combined DNA Index SystemCODIS – Combined DNA Index System
Created by FBI in early 1990s, as a blending of Created by FBI in early 1990s, as a blending of forensic science and computer technology.forensic science and computer technology.
Has 3 levels (local, state, National)Has 3 levels (local, state, National) Allows laboratories participating in the Allows laboratories participating in the
program to compare and exchange information program to compare and exchange information on national level. on national level.
As of Sept. 2006 has produced 36,800 hits and As of Sept. 2006 has produced 36,800 hits and assisted in 39,200 investigations nationwide.assisted in 39,200 investigations nationwide.
![Page 38: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/38.jpg)
CODISCODIS
►CODIS is the Combined DNA Index CODIS is the Combined DNA Index System.System.
►Any law enforcement agency can put Any law enforcement agency can put DNA into the national database.DNA into the national database.
►Other agencies can then access the Other agencies can then access the DNA sequences to see if they match any DNA sequences to see if they match any current suspects.current suspects.
►Allows for easy access to scanning Allows for easy access to scanning suspect’s DNA for a match to crimes.suspect’s DNA for a match to crimes.
![Page 39: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/39.jpg)
SurveillanceSurveillance
![Page 40: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/40.jpg)
CarCar
►Discreetly follow Discreetly follow suspectsuspect
►Observe actionsObserve actions
![Page 41: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/41.jpg)
Audio and Video RecordingAudio and Video Recording
►Warrant for Warrant for installationinstallation
► If fails, equipment in If fails, equipment in moving vehiclesmoving vehicles
*Technologies have *Technologies have constantly been constantly been changing and changing and updating – less visible updating – less visible and more powerfuland more powerful
![Page 42: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/42.jpg)
Thermal imagingThermal imaging
► Capturing infrared Capturing infrared light emitted by light emitted by objects to form imagesobjects to form images
► The cooler the object, The cooler the object, the less clear the the less clear the image will beimage will be
►Good for moonless, Good for moonless, cloudy nightscloudy nights
►Disturbances in Disturbances in groundground
► Changes to wallsChanges to walls
![Page 43: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/43.jpg)
Image EnhancementImage Enhancement
► ““Night vision”Night vision”► Captures the little Captures the little
amount of light amount of light available and uses it available and uses it to for imagesto for images
►More commonly More commonly used than thermal used than thermal imagingimaging
![Page 44: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/44.jpg)
Gait RecognitionGait Recognition
►Computer visionComputer vision►Traditional radar systemTraditional radar system
“ “ The ultimate goal is detect, classify, and The ultimate goal is detect, classify, and identify humans at distances up to 500 identify humans at distances up to 500 feet away under day or night, all-weather feet away under day or night, all-weather conditions”conditions”
Identify a person based on the way they Identify a person based on the way they walkwalk
![Page 45: Computer Technology in Law Enforcement](https://reader034.fdocuments.us/reader034/viewer/2022042508/56814da4550346895dbaff63/html5/thumbnails/45.jpg)
*Please note that computer technology in law enforcement encompasses a vast and broad range of technology. Furthermore, some of this new technology is not released to the public due to security and effectiveness issues. The technologies described are only some of the equipment and methods used by law enforcement today. It is unquestionable that new technologies will be created to help law enforcement fight crime. Future law enforcement personnel will undoubtedly encounter technology not even mentioned in this presentation.