Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Six Police Technology A Brief History of.

Slides:



Advertisements
Similar presentations
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Seven Police Technology Communications Dispatch.
Advertisements

Police Organization and Management
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Seventeen Police Technology Major Incident.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Eleven Police Technology Information Exchange.
Fingerprinting Merit Badge
Crime Scene Investigation. Arriving at a Crime Scene  A crime scene is the site where the offense took place  When officers first arrive at the crime.
Technology Interactions ‹ Chapter Title Copyright © Glencoe/McGraw-Hill A Division of The McGraw-Hill Companies, Inc. Technology Interactions Modern forensics.
Copyright :Hi Tech Criminal Justice, Raymond E. Foster Law Enforcement Law Enforcement Uniformed Patrol Concepts and Tactics.
How are fingerprints used in Forensics?
Chapter 6 Fingerprints By the end of this chapter you will be able to:
1 Chapter 16 The Crime Scene, the Chain of Custody Requirement, and the Use of Fingerprints and Trace Evidence The Crime Scene, the Chain of Custody Requirement,
Chapter 4 Fingerprints “Fingerprints cannot lie, but liars can make fingerprints.” - Unknown.
1 Chapter 16 The Crime scene The Crime scene Chain of Custody Chain of Custody Fingerprints and Trace Evidence Fingerprints and Trace Evidence.
Identifying & Collecting Physical Evidence
Chapter 6 Fingerprints By the end of this chapter you will be able to:
Copyright :Hi Tech Criminal Justice, Raymond E. Foster Law Enforcement Criminal Scene Management Part One.
Fingerprints.
Fingerprinting Continued...
How Does it Work?  AFIS = Automated Fingerprint Identification System  The fingerprint is scanned into the system.  The fingerprint type is entered.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Five Police Technology Geographic Information.
Police Technology Chapter Twelve
Police Technology Chapter Eight
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 1 Introduction to Police Administration.
LOCAL AGENCY MUST STILL RUN A FILE CHECK (QHW) TO DETERMINE WARRANTS/HOLDS II. If name is not on CCH, prints are compared to all fingerprints in AFIS for.
Copyright :Hi Tech Criminal Justice, Raymond E. Foster Law Enforcement Criminal Investigations Part II.
Forensic science lab 4.4 What equipment do forensic scientists use to assess evidence?
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
Computer Forensics Principles and Practices
Investigation & Arrest – BIG PICTURE CRIME Police are notified 911 POLICE investigate ensure public safety protect & preserve crime scene collect & identify.
Crime Scene Investigation. Arriving at a Crime Scene  A crime scene is the site where the offence took place  When officers first arrive at the crime.
Copyright :Hi Tech Criminal Justice, Raymond E. Foster Law Enforcement Criminal Investigations Part One.
Preserving Forensic Evidence Lt. Scott A. Stephens Spokane Police Department Major Crimes Unit.
Unit 3: Fingerprints (part 3)
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
Chapter 6.  First known use: nearly 4000 years as signatures on clay tablets.
ACOS 2.2, 2.3 Print Classification Henry System- adopted in 1901, looked at ridge patterns on all 10 fingers, but only accommodated 100,000 sets of prints.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Six Police Technology A Brief History of.
Fingerprints. Fingerprinting System of identification based on the classification of finger ridge patterns System of identification based on the classification.
0 Primary Classification The Henry—FBI Classification Each finger is given a point value rightleft.
Brain Teaser A farmer has a bag of grain, a chicken and a dog. The farmer must travel to the other side of the river in his boat but the boat can only.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Fingerprint Analysis What is a Fingerprint? Orangutan A fingerprint is the impression left upon any surface with which the finger comes in contact under.
CJ in the USA: Copyright 2011 Curriculum Technology, LLC. All Rights Reserved.
Forensic Science: Fundamentals & Investigations, Chapter 6 1 Chapter 6 Fingerprints By the end of this chapter you will be able to: o Discuss the history.
Police Organization and Management
Crime Scene Investigation
Chapter 6 Fingerprints By the end of this chapter you will be able to:
Chapter 16 The Crime Scene, the Chain of Custody Requirement, and the Use of Fingerprints and Trace Evidence.
Fingerprints.
Chapter 6 Fingerprints By the end of this chapter you will be able to:
Chapter 14 Notes Part 3 Fingerprints.
HOW DO WE CLASSIFY FINGERPRINTS?
Ridge Characteristics
Crime Scene Investigation
Chapter 6 Fingerprints By the end of this chapter you will be able to:
Chapter 6 Fingerprints By the end of this chapter you will be able to:
Making a Match.
Fingerprints Minutiae Patterns.
Crime Scene Investigation
Crime Scene Investigation
Ch 14 Fingerprints part 2.
Uniformed Patrol Concepts and Tactics
Chapter 6 Fingerprints By the end of this chapter you will be able to:
Chapter 6 Fingerprints By the end of this chapter you will be able to:
Fingerprints.
FINGERPRINTING SCI.
15-5 Automated Fingerprint Identification System
Chapter 6 Fingerprints By the end of this chapter you will be able to:
Presentation transcript:

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Six Police Technology A Brief History of Police Technology Police TechnologyPolice Technology

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Learning Objectives Explore the development of police technology against the backgrounds of the policing models – political, professional, and community based models Explore the development of police technology against the backgrounds of the policing models – political, professional, and community based models Expand understanding of tactical and strategic information by looking at how technology changed the nature of fingerprint evidence Expand understanding of tactical and strategic information by looking at how technology changed the nature of fingerprint evidence

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Learning Objectives Understand the difference between policy and procedure and look at how technology may impact policy and procedure Understand the difference between policy and procedure and look at how technology may impact policy and procedure Further explore fragmentation and the market-place. Further explore fragmentation and the market-place.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Introduction Look at history of technology two ways: What happened and consequences of new technologies What happened and consequences of new technologies Following a specific piece of Following a specific piece of information that has been information that has been critical to solving crimes for critical to solving crimes for more than one hundred years more than one hundred years (fingerprinting) (fingerprinting)

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology in Time Most CJ scholars divide the history of American policing into three eras: Political Political Professional Professional Community Oriented Community Oriented

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Political Policing Era Most police forcespolice established in the late 19 th century consisted or men who had been appointed for limited terms by local Politicians. Patronage – an officers primary source of information came from the people who lived in the community or their beat Photograph provided by Cultural Tourism DC.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Professional Policing Government and policing evolved out of the patronage system into a civil service system. Government and policing evolved out of the patronage system into a civil service system. Prized hierarchy, centralization rules, and standards became the professional policing model. Prized hierarchy, centralization rules, and standards became the professional policing model. Control of day-to-day operations from politics to professional police managers. Control of day-to-day operations from politics to professional police managers.police

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Technology impacting the model Through the 1950s and 1960s, the idea that policepolice supervisors and managers should police control the production of service began to take hold. Supervisors and managers began to count the numbers of calls for service an officer handled Supervisors and managers began to count the numbers of calls for service an officer handled Timed how fast he arrived at the scene of a call Timed how fast he arrived at the scene of a call

Copyright : Hi Tech Criminal Justice, Raymond E. Foster You get what you count... Officer were not walking the community any longer Officer were not walking the community any longer They were evaluated on the number of calls they handled and They were evaluated on the number of calls they handled and How fast they got to the call. How fast they got to the call.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Incident Driven Policing Through the 1970s there continued to be a reliance on what was to be seen as incident-driven policing. The advent of the computer made it possible to organize and review this information on incidents and response. The development of only added to the police ability to handle incidents.police Photograph provided by Gary Allen, Dispatch Magazine

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Incident Driven Policing As officers judged on the number of calls they handled rose through the ranks, the concept of professionalism increased. As officers judged on the number of calls they handled rose through the ranks, the concept of professionalism increased. police managers did not rely on community input police managers did not rely on community input police The idea that the police were the professionals who knew best, responded quickly, and handled incidents became organizationally entrenched. The idea that the police were the professionals who knew best, responded quickly, and handled incidents became organizationally entrenched.police Photograph provided by Robert Eplett, California Governors Office of Emergency Services

Copyright : Hi Tech Criminal Justice, Raymond E. Foster The professional model and the technology changed the relationship between the police and the community The professional model and the technology changed the relationship between the police and the communitypolice This introduced a new problem of the growing distance between police officers and the communities they served. This introduced a new problem of the growing distance between police officers and the communities they served.police Incident Driven Policing

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Community Oriented Policing Founded on two social science theories: Normative Sponsorship Theory – Most people are good. People will work together if the goal is within the normal standards of the community. Normative Sponsorship Theory – Most people are good. People will work together if the goal is within the normal standards of the community. Critical Social Theory – Looks at the way the community comes together to analyze a problem that is preventing the attainment of their goals or needs. Critical Social Theory – Looks at the way the community comes together to analyze a problem that is preventing the attainment of their goals or needs.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Problem Oriented Policing Shares many of the same characteristics of community-oriented policing. Shares many of the same characteristics of community-oriented policing. Concentrates on situational crime prevention. Concentrates on situational crime prevention. Looks at the community of the problem. The Definition of community would shift as problems were solved (versus static geographic communities). Looks at the community of the problem. The Definition of community would shift as problems were solved (versus static geographic communities).

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Technologys Impact on Policing Style Political Model Professional Model Incident Driven Technology

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Changing the Value of Information The increasing ability to obtain, organize, analyze and recall information has increased its value The increasing ability to obtain, organize, analyze and recall information has increased its value

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Changing the Value of Information One of the earliest applications of science to criminal investigation is fingerprint classification. One of the earliest applications of science to criminal investigation is fingerprint classification. Visible – left by touching a substance before touching a surface (e.g., blood on a counter) Visible – left by touching a substance before touching a surface (e.g., blood on a counter) Latent – hidden fingerprints left behind by the natural oils from our hands. (Best obtained when surface is clean, dry, smooth and non- porous.) Latent – hidden fingerprints left behind by the natural oils from our hands. (Best obtained when surface is clean, dry, smooth and non- porous.)

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Changing the Value of Information At the beginning of the 20 th Century fingerprints were routinely taken from offenders and the cards stored. At the beginning of the 20 th Century fingerprints were routinely taken from offenders and the cards stored. At this time, for a match each print must be compared against millions of cards At this time, for a match each print must be compared against millions of cards

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Changing the Value of Information At first, systems of classification enable fingerprint specialist to narrow the search from millions of cards to thousands – but still a hand search and analysis At first, systems of classification enable fingerprint specialist to narrow the search from millions of cards to thousands – but still a hand search and analysis The computer enabled the automation of the process.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Automated Fingerprint Identification System The process of analyzing fingerprints is dactylography. The process of analyzing fingerprints is dactylography. Software used sophisticated and complex algorithms to recognize and compare minutiae. However; Software used sophisticated and complex algorithms to recognize and compare minutiae. However; Computer processing speeds were slow Computer processing speeds were slow Hardware and software to store the information had not yet been developed Hardware and software to store the information had not yet been developed

Copyright : Hi Tech Criminal Justice, Raymond E. Foster National Crime Information Center NCIC organized in 1967 by the FBI to handle fingerprints cards and requests for comparison. NCIC organized in 1967 by the FBI to handle fingerprints cards and requests for comparison. Began to incorporate criminal histories and correlate them to offender fingerprint cards on file. Began to incorporate criminal histories and correlate them to offender fingerprint cards on file. Medium of transmission was U.S. mail and eventually fax. Medium of transmission was U.S. mail and eventually fax.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Local agencies forged ahead developing their own applications similar to NCIC creating fragmentation Local agencies forged ahead developing their own applications similar to NCIC creating fragmentation AFIS technology began to be used routinely especially in the investigation of cold cases. AFIS technology began to be used routinely especially in the investigation of cold cases – the FBI launched IAFIS and made available nationwide the fingerprints of 33 million criminals – the FBI launched IAFIS and made available nationwide the fingerprints of 33 million criminals. Automated Fingerprint Identification System

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Automated Fingerprint Identification System Digital scanning – obtains an image on the fingerprint, examines and compares. Capacitance scanning – uses a charged coupled device (CCD) Capacitance scanning – uses a charged coupled device (CCD) Optical Scanning – light source illuminates the suspects fingertips Optical Scanning – light source illuminates the suspects fingertips Photograph provided by Cross Match Technologies, Inc.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Differences are important for two reasons: Capacitance scanner does not contain the CCD and is more readily miniaturized Capacitance scanner does not contain the CCD and is more readily miniaturized Capacitance scanner is actually taking measurements and is not easily fooled. Capacitance scanner is actually taking measurements and is not easily fooled. Automated Fingerprint Identification System

Copyright : Hi Tech Criminal Justice, Raymond E. Foster NCIC 200 NCIC 2000 promises to take fingerprint technology into the field Photograph provided by Cross Match Technologies, Inc.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Policy and Procedure Procedures are a set of instructions on how to do something. Procedures are a set of instructions on how to do something. Policy is a broad statement on how things should be done – how we want human beings to exercise judgment. Policy is a broad statement on how things should be done – how we want human beings to exercise judgment.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Fragmentation The nature of United States Law enforcement has caused policies, procedures and technology to develop different from agency to agency.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Fragmentation 17,000 state and local law enforcement agencies. 17,000 state and local law enforcement agencies. Different community expectations and standards Different community expectations and standards Difference equipment acquisitions according to size of budget Difference equipment acquisitions according to size of budget Expertise develops at different rates Expertise develops at different rates

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Fragmentation Fragmentation – policy, procedure and technology – causes problems whenever agencies must or should work together Photograph provided by Robert Eplett, California Governors Office of Emergency Services

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Explore Military Books at Military BooksMilitary Books