Computer Technology in Law Enforcement

45
Computer Computer Technology in Law Technology in Law Enforcement Enforcement Eileen and Tom Eileen and Tom Edwin Edwin 29 November 2006 29 November 2006

description

Computer Technology in Law Enforcement. Eileen and Tom Edwin 29 November 2006. Investigation Technology. Technology. Modern police cruisers contain the following equipment: Laptops Radar (Radio Detection And Ranging) Radio/ Scanners Video Cameras. Laptops. - PowerPoint PPT Presentation

Transcript of Computer Technology in Law Enforcement

Page 1: Computer Technology in Law Enforcement

Computer Technology Computer Technology in Law Enforcementin Law Enforcement

Eileen and TomEileen and Tom

EdwinEdwin

29 November 200629 November 2006

Page 2: Computer Technology in Law Enforcement

Investigation Investigation TechnologyTechnology

Page 3: Computer Technology in Law Enforcement

TechnologyTechnology

►Modern police cruisers contain the following Modern police cruisers contain the following equipment:equipment: LaptopsLaptops Radar (Radio Detection And Ranging)Radar (Radio Detection And Ranging) Radio/ ScannersRadio/ Scanners Video CamerasVideo Cameras

Page 4: Computer Technology in Law Enforcement

LaptopsLaptops

►Allow officers to type reports, saves time. Allow officers to type reports, saves time. ►Can save reports to flash drives and print later.Can save reports to flash drives and print later.►Transfer info from computer directly to database Transfer info from computer directly to database

with flash drives. with flash drives. ►Will eventually allow officers to receive calls Will eventually allow officers to receive calls

through wireless networks and as well access through wireless networks and as well access information like license plates and images such information like license plates and images such as mug shotsas mug shots. .

Page 5: Computer Technology in Law Enforcement

Radar Radar

►Radio Detection And RangingRadio Detection And Ranging►Remote sensor that gives off electromagnetic Remote sensor that gives off electromagnetic

waves ( radio, microwaves and light) and uses waves ( radio, microwaves and light) and uses these waves to measure presence, location and these waves to measure presence, location and motion. motion.

►Used to monitor on coming and receding traffic Used to monitor on coming and receding traffic by police officers. by police officers.

Page 6: Computer Technology in Law Enforcement

Radio/ScannersRadio/Scanners► Transmit and receive Federal Government assigned frequencies in Transmit and receive Federal Government assigned frequencies in

Vhf and Uhf frequencies above standard broadcast FM stations of Vhf and Uhf frequencies above standard broadcast FM stations of the radio spectrum and can’t be heard on standard car or home the radio spectrum and can’t be heard on standard car or home radio.radio.

► Most frequencies are used by Public Safety (Police, Ambulance and Most frequencies are used by Public Safety (Police, Ambulance and Rescue crews)Rescue crews)

► Two types of scanners portable (handheld) and table ( found in cars)Two types of scanners portable (handheld) and table ( found in cars)► Frequent usersFrequent users

Public Safety, News Media, Home & Personal Security, Public Safety, News Media, Home & Personal Security, Corporate Security, Neighborhood Watch, Radio Hobbyists, Corporate Security, Neighborhood Watch, Radio Hobbyists,

Public Buildings, Hospital and School Security.Public Buildings, Hospital and School Security.

Page 7: Computer Technology in Law Enforcement

Video CamerasVideo Cameras

►Recently installed in patrol carsRecently installed in patrol cars►Used to monitor work done by officersUsed to monitor work done by officers►Used to show how arrests are made Used to show how arrests are made

Page 8: Computer Technology in Law Enforcement

Investigation Programs Investigation Programs

►Pattern RecognitionPattern Recognition►Investigative Investigative Information Management Information Management System (I2MS)System (I2MS)

Page 9: Computer Technology in Law Enforcement

Pattern RecognitionPattern Recognition

►Finding patterns concerning the locations Finding patterns concerning the locations of the crimes.of the crimes.

►Tries to recognize and predict patterns of Tries to recognize and predict patterns of illegal behavior. illegal behavior.

Page 10: Computer Technology in Law Enforcement

I2MSI2MS►Developed by CSC for Air force Office of Developed by CSC for Air force Office of

Special Investigation ( AFOSI).Special Investigation ( AFOSI). Focuses on criminal investigations and Focuses on criminal investigations and

counterintelligence in Air Force. counterintelligence in Air Force. enables agents to view recently entered information enables agents to view recently entered information

from half way around the world.from half way around the world. has the ability to record data from arrests, track has the ability to record data from arrests, track

location of gathered evidence, and store images like location of gathered evidence, and store images like maps, fingerprints and other electronic documents. maps, fingerprints and other electronic documents.

Page 11: Computer Technology in Law Enforcement

Internet and Computer CrimeInternet and Computer Crime

Page 12: Computer Technology in Law Enforcement

Types of Computer and Internet Types of Computer and Internet CrimeCrime

Computer as Computer as InstrumentInstrument

Includes:Includes:► EmbezzlementEmbezzlement► FraudFraud► LarcenyLarceny

Computer as ObjectComputer as Object

Includes:Includes:► TheftTheft► VirusesViruses

Page 13: Computer Technology in Law Enforcement

Electronic FingerprintElectronic Fingerprint

Tracking what a person does on a Tracking what a person does on a computer via memory and history --computer via memory and history --

Is called an electronic fingerprintIs called an electronic fingerprint

Page 14: Computer Technology in Law Enforcement

MemoryMemory

► CacheCache► RAMRAM►Hard Disk DriveHard Disk Drive► Any other memoryAny other memory

Page 15: Computer Technology in Law Enforcement

HistoryHistory

Check internet history on browser –Check internet history on browser –

Can clear by holding CTRL + H keys Can clear by holding CTRL + H keys (though it should be known that (though it should be known that

nothing nothing is ever permanently deleted is ever permanently deleted from a computer)from a computer)

Page 16: Computer Technology in Law Enforcement

TerrorismTerrorism

Hugely aided by computer technologyHugely aided by computer technology

Page 17: Computer Technology in Law Enforcement

CryptologyCryptology

Definition: The branch of science that Definition: The branch of science that deals with secret communications deals with secret communications

using codes and ciphersusing codes and ciphers

Code – the use of symbols to represent Code – the use of symbols to represent numbers, letters, or wordsnumbers, letters, or words

Cipher – system of representing letters Cipher – system of representing letters with other letters to form imageswith other letters to form images

Page 18: Computer Technology in Law Enforcement

CodesCodes

►Can stand for words or lettersCan stand for words or letters►Tell location in pages and sections of Tell location in pages and sections of

book where word is foundbook where word is found

Example: Morse code Example: Morse code

*Decoding takes a long time*Decoding takes a long time

Page 19: Computer Technology in Law Enforcement

CiphersCiphers

Substitution CipherSubstitution Cipher

So “Meet you at the corner” looks like:So “Meet you at the corner” looks like:

ABCDEFGHIJKLMNOPQRSTUVWXYZ

NMZAYBXCWDVEUFTGSHRIQJPKOL

UYYI OTQ NI ICY ZTHFYH

Page 20: Computer Technology in Law Enforcement

Columnar TranspositionColumnar Transposition

Message is: “Meet you at the corner”Message is: “Meet you at the corner”

Page 21: Computer Technology in Law Enforcement

Looks like: Looks like:

MEETYMEETY

OUATTOUATT

HECORHECOR

NERXXNERXX

Page 22: Computer Technology in Law Enforcement

Code looks like: MOHN EUEE EACR TTOX Code looks like: MOHN EUEE EACR TTOX YTRXYTRX

(read from top to bottom, left to right)(read from top to bottom, left to right)

Page 23: Computer Technology in Law Enforcement

How Do Computers Fit into How Do Computers Fit into Cryptology?Cryptology?

►Easier to createEasier to create►Easier to decryptEasier to decrypt►Easier to breakEasier to break

* “So far, it is far easier for a computer * “So far, it is far easier for a computer to encrypt a message than to break it”to encrypt a message than to break it”

Page 24: Computer Technology in Law Enforcement

StenographyStenography

Definition: hiding files in plain view Definition: hiding files in plain view using encryptionusing encryption

Hiding text within text, images within Hiding text within text, images within images, and text within images or vice images, and text within images or vice

versaversa

Page 25: Computer Technology in Law Enforcement

Without embedded textWithout embedded text With embedded textWith embedded text

Page 26: Computer Technology in Law Enforcement

Capturing PedophilesCapturing Pedophiles

► Join same networks Join same networks and groupsand groups

► Create profilesCreate profiles► InteractInteract► Set up meetingSet up meeting► Finally catch themFinally catch them

Page 27: Computer Technology in Law Enforcement

Other MethodsOther Methods

►Tapping IP addressesTapping IP addresses► Installing keylogging Installing keylogging

hardware/softwarehardware/software►SkimmersSkimmers►SniffersSniffers

Page 28: Computer Technology in Law Enforcement

Forensic TechnologyForensic Technology

Page 29: Computer Technology in Law Enforcement

DefinitionDefinition

►Forensics is the method of gathering Forensics is the method of gathering and analyzing evidence and and analyzing evidence and information at a crime scene.information at a crime scene.

Page 30: Computer Technology in Law Enforcement

Forensics HistoryForensics History

►1598 – Fortunatus Fidelis is credited as 1598 – Fortunatus Fidelis is credited as being the first person to us modern being the first person to us modern forensic science.forensic science.

►Early 1800’s – forensic science becomes Early 1800’s – forensic science becomes an accepted branch of medicine.an accepted branch of medicine.

►1921 – John Larson creates the first 1921 – John Larson creates the first successful lie detector.successful lie detector.

►1923 – First police department crime 1923 – First police department crime laboratory established in the U.S.laboratory established in the U.S.

Page 31: Computer Technology in Law Enforcement

Forensics HistoryForensics History

►1924 – Larson’s lie detector becomes 1924 – Larson’s lie detector becomes widely used in police interrogations widely used in police interrogations around the country.around the country.

►1932 – FBI creates national crime 1932 – FBI creates national crime laboratory.laboratory.

►1948 – American Academy of Forensic 1948 – American Academy of Forensic Science is established.Science is established.

►1967 – FBI creates National Crime 1967 – FBI creates National Crime Information Center.Information Center.

Page 32: Computer Technology in Law Enforcement

Modern Forensic ScienceModern Forensic Science

►Every year new updates are seen that Every year new updates are seen that push the boundaries of forensic push the boundaries of forensic sciencescience

►Newer and newer technologies are Newer and newer technologies are creating better possibilities for creating better possibilities for investigators around the country.investigators around the country.

Page 33: Computer Technology in Law Enforcement

National Virtual Translation National Virtual Translation CenterCenter

►Center established in early 2000 to Center established in early 2000 to help investigators with international help investigators with international cases.cases.

► Instantly translate documents and Instantly translate documents and intelligence in over a dozen languages.intelligence in over a dozen languages.

►Helps investigators with international Helps investigators with international cases and suspects.cases and suspects.

Page 34: Computer Technology in Law Enforcement

Stable Isotope Ratio Mass Stable Isotope Ratio Mass SpectrometrySpectrometry

►New method of New method of substance testing.substance testing.

► Testing using this Testing using this method will allow method will allow investigators to see if investigators to see if two substances came two substances came from the same source.from the same source.

► Allows for much more Allows for much more accurate testing in accurate testing in criminal investigations.criminal investigations.

Page 35: Computer Technology in Law Enforcement

Mitochondrial DNA AnalysisMitochondrial DNA Analysis

►A new type of DNA A new type of DNA testing that allows testing that allows for a much more for a much more accurate suspect accurate suspect pool.pool.

►Usually limits your Usually limits your suspect pool to a suspect pool to a certain family or certain family or bloodline.bloodline.

Page 36: Computer Technology in Law Enforcement

Regional Computer Forensic Regional Computer Forensic LaboratoriesLaboratories

►These laboratories are used to detect These laboratories are used to detect evidence of computer crime.evidence of computer crime.

►Can scan any electronic device.Can scan any electronic device.►There are now several around the There are now several around the

country for easy access.country for easy access.

Page 37: Computer Technology in Law Enforcement

DatabasesDatabases►CODIS – Combined DNA Index SystemCODIS – Combined DNA Index System

Created by FBI in early 1990s, as a blending of Created by FBI in early 1990s, as a blending of forensic science and computer technology.forensic science and computer technology.

Has 3 levels (local, state, National)Has 3 levels (local, state, National) Allows laboratories participating in the Allows laboratories participating in the

program to compare and exchange information program to compare and exchange information on national level. on national level.

As of Sept. 2006 has produced 36,800 hits and As of Sept. 2006 has produced 36,800 hits and assisted in 39,200 investigations nationwide.assisted in 39,200 investigations nationwide.

Page 38: Computer Technology in Law Enforcement

CODISCODIS

►CODIS is the Combined DNA Index CODIS is the Combined DNA Index System.System.

►Any law enforcement agency can put Any law enforcement agency can put DNA into the national database.DNA into the national database.

►Other agencies can then access the Other agencies can then access the DNA sequences to see if they match any DNA sequences to see if they match any current suspects.current suspects.

►Allows for easy access to scanning Allows for easy access to scanning suspect’s DNA for a match to crimes.suspect’s DNA for a match to crimes.

Page 39: Computer Technology in Law Enforcement

SurveillanceSurveillance

Page 40: Computer Technology in Law Enforcement

CarCar

►Discreetly follow Discreetly follow suspectsuspect

►Observe actionsObserve actions

Page 41: Computer Technology in Law Enforcement

Audio and Video RecordingAudio and Video Recording

►Warrant for Warrant for installationinstallation

► If fails, equipment in If fails, equipment in moving vehiclesmoving vehicles

*Technologies have *Technologies have constantly been constantly been changing and changing and updating – less visible updating – less visible and more powerfuland more powerful

Page 42: Computer Technology in Law Enforcement

Thermal imagingThermal imaging

► Capturing infrared Capturing infrared light emitted by light emitted by objects to form imagesobjects to form images

► The cooler the object, The cooler the object, the less clear the the less clear the image will beimage will be

►Good for moonless, Good for moonless, cloudy nightscloudy nights

►Disturbances in Disturbances in groundground

► Changes to wallsChanges to walls

Page 43: Computer Technology in Law Enforcement

Image EnhancementImage Enhancement

► ““Night vision”Night vision”► Captures the little Captures the little

amount of light amount of light available and uses it available and uses it to for imagesto for images

►More commonly More commonly used than thermal used than thermal imagingimaging

Page 44: Computer Technology in Law Enforcement

Gait RecognitionGait Recognition

►Computer visionComputer vision►Traditional radar systemTraditional radar system

“ “ The ultimate goal is detect, classify, and The ultimate goal is detect, classify, and identify humans at distances up to 500 identify humans at distances up to 500 feet away under day or night, all-weather feet away under day or night, all-weather conditions”conditions”

Identify a person based on the way they Identify a person based on the way they walkwalk

Page 45: Computer Technology in Law Enforcement

*Please note that computer technology in law enforcement encompasses a vast and broad range of technology. Furthermore, some of this new technology is not released to the public due to security and effectiveness issues. The technologies described are only some of the equipment and methods used by law enforcement today. It is unquestionable that new technologies will be created to help law enforcement fight crime. Future law enforcement personnel will undoubtedly encounter technology not even mentioned in this presentation.