Computers in Our World Chapter 2 Computers in Government, Law Enforcement, and the Military.

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Zhongxing Telecom Pakistan (Pvt.) Ltd
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 1 Embedded Computing.
Task Group Chairman and Technical Contact Responsibilities ASTM International Officers Training Workshop September 2012 Scott Orthey and Steve Mawn 1.
Document #07-2I RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) (mod 7/25 & clean-up 8/20) Customer Supplier.
State of New Jersey Department of Health and Senior Services Patient Safety Reporting System Module 2 – New Event Entry.
LEADS Law Enforcement Agencies Data System
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
Create an Application Title 1A - Adult Chapter 3.
1 NatQuery 3/05 An End-User Perspective On Using NatQuery To Extract Data From ADABAS Presented by Treehouse Software, Inc.
Construction Automation A Six Year Plan in Development Ron Singh Chief of Surveys Geometronics Manager Design to Dozer August, 2010.
Site Safety Plans PFN ME 35B.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Introduction Lesson 1 Microsoft Office 2010 and the Internet
The internet. Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated.
1. 2 Objectives Become familiar with the purpose and features of Epsilen Learn to navigate the Epsilen environment Develop a professional ePortfolio on.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Seven Police Technology Communications Dispatch.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Communications Systems
Computer Literacy BASICS
INFORMATION TECHNOLOGY, THE INTERNET, AND YOU
Our Digital World Second Edition
The Office Procedures and Technology
Information Systems Today: Managing in the Digital World
Chiu Choi, Ph.D., P.E. Technical Consultant OIML workshop on the metrology of vehicle speed measurement devices NIST Headquarters, Gaithersburg, MD July.
On board device basics Prepared by: Jim Angel PeopleNet
Discovering Computers Fundamentals, 2012 Edition
1 CIFTclinic 1.1 Software for Clinics. 2 CIFTclinic Software for Medical Clinics, which addresses the requirements of practicing doctors to automate Medical.
Introductory Presentation on the SAHER Program
Slide #1 of 39 / {ESC} Return to Main Menu / F1 Help PCS - Parish Computer System The NEXT Generation of Parish Software Archdiocese of Los Angeles PCS.
Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
1 How Do I Order From.decimal? Rev 05/04/09 This instructional training document may be updated at anytime. Please visit and check the.
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Analyzing Genes and Genomes
Travel 1: Travel Authorization. Welcome to Training! Why PeopleSoft? – PeopleSoft will help UTEP to grow. What’s Your Part? – We need your skills and.
12 Financial Management 12-1 Financial Planning
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Intracellular Compartments and Transport
PSSA Preparation.
11-1 MFIRS 11 Arson Module ObjectivesObjectives The participants will be able to: –describe when the Arson Module (NFIRS 11) is to be used. –demonstrate.
Essential Cell Biology
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 13 Slide 1 Application architectures.
Chapter 14 The Human Resources (HR) Management and Payroll Processes
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Student Interface for Online Testing Training Module Copyright © 2014 American Institutes for Research. All rights reserved.

McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
UNIT 3 Computer Applications
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fifteen Police Technology Tracking and Surveillance.
The Role of Global Positional Systems in Policing and Crime Prevention William J. Artis Jr. FRS 142: Where’s Waldo April 19, 2004.
Dictionary By Thomas Slack. Automatic number plate recognition Automatic Number Plate Recognition (ANPR) is a surveillance method that uses optical character.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Twenty-One Police Technology Emergingand.
Amber Vision – June 25, 2010 Presentation to: West Virginia Board of Education Superintendent’s Leadership Institute.
Chapter 5 Application Software.
Traffic Enforcement And Management System Malam-Team is Israel's largest systems integration organization, One of the most exciting solutions offered by.
© Paradigm Publishing, Inc. 5-1 Chapter 5 Application Software Chapter 5 Application Software.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Intelligent Transportation System (ITS) ISYM 540 Current Topics in Information System Management Anas Hardan.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
© Paradigm Publishing Inc. 5-1 Chapter 5 Application Software.
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM
Presentation transcript:

Computers in Our World Chapter 2 Computers in Government, Law Enforcement, and the Military

2 Introduction Computers and the Government –Electoral process, postal services, census, and taxes Computers in Law Enforcement –Evidence and criminal record databases, traffic violations, stolen vehicles, missing children, wireless 911 Computers and Homeland Security –Tracking visitors, surveillance, crisis management Computers in the Military –Devices that observe and explore dangerous areas, tracking troop movement, computer simulations

3 Computers and the Government Streamline office functions Make information publicly available Handle processing of applications and forms Analyze and store data and statistics Manage budgets and payrolls

4 Governmental Uses of Computers

5 The Election Process Campaign polling –Often done electronically –Results are analyzed using software applications –Demographic groups are specifically targeted Voters and candidates can research online –Candidate’s Web site –Voting records –Campaign finance databases –News sources

6 Computerized voting systems

7 Direct Recording Electronic machines

8 United States Postal Service Uses an optical character recognition (OCR) system –Translates characters into digital images –Looks up addresses in a database –Applies a POSTNET bar code Routes mail using a bar code sorter Provides customer service and products on its Web site –Calculate shipping costs, buy stamps, hold and forward mail, change address

9 Census Bureau Optical mark recognition system scans data Computers tabulate data It is predicted that computers will be used for the next census –To store contact information for people who have not filled out census forms –To have the ability to input data electronically Census statistics are available to the public online

10 Internal Revenue Service Tax preparation software desktop or on the web is available to guide taxpayers through the process of filing taxes –Asks questions and fills out the forms automatically based on the answers Forms may be mailed or submitted electronically through the IRS e-File system Refunds may be given via direct deposit IRS Web site provides comprehensive information –Recent tax news for specific demographic groups –Forms for downloading –Tracking of refunds

11 Tax Preparation Software

12 Computers In Law Enforcement Officers today usually have a laptop available in their vehicles with wireless Internet to –Write tickets –Fill out accident reports –Complete routine police work –Download criminal and driving records from databases –Check license plate registrations –Retrieve information from headquarters while on the road

13 Tracking Evidence Police may enter documentation about evidence into a handheld computer –Wirelessly transmits the information to an evidence database –Prints out a bar code sticker that is placed on the physical evidence DNA evidence is stored in the CODIS (Combined DNA Index System) database –Forensic and offender indexes Fingerprint evidence is stored in the AFIS (Integrated Automated Fingerprint Identification System) database –Fingerprint images are scanned electronically

14 Storing Criminal Records NCIC (National Crime Information Center) –FBI database of criminal justice information –Officers check subject’s previous record after arrest NICS (National Instant Criminal Background Check System) –FBI system to help gun dealers perform background checks on potential buyers –Dealer calls the Bureau of Identification to run a query on several databases

15 Online Criminal Database

16 Enforcing Traffic Laws Red-light systems use computer technology to catch drivers who run red lights –Cameras are positioned at intersection corners –A sensor loop triggers if a car moves over a certain speed –The software activates the cameras to take photos –The software then creates a record with the time, location, and the photos, and –a citation is sent to the offender Traffic violation fines may often be accessed and paid online

17 Online Payment of Traffic Violations

18 Tracking Stolen Vehicles LoJack is a stolen vehicle recovery system –A wireless radio-frequency transmitter is placed in the car –The vehicle identification number of a stolen vehicle is checked against the NCIC (National Crime Information Center) –A signal can be sent to the device, which much like a GPS reports its exact location / a map can be created Key pass theft system –Uses a motion sensor and uniquely coded key pass to detect unauthorized motion of a vehicle

19 Finding Missing Children Amber Alert system –Immediately notifies public for help in recovering missing children –Uses EAS (Emergency Alert System) technology –EAS broadcasts alert on radio and television –Alerts can be displayed on dynamic message signs on highways –NCMEC (National Center for Missing and Exploited Children) provides alerts via , mobile phone, pager, or AOL Instant Messenger

20

21 Providing Wireless 911 Enhanced 911 (E-911) displays phone number and address information on operator’s computer –The ANI (automatic number identifier) and ALI (automatic location identifier) databases provide the information ANI and ALI does not work with cell phones FCC (Federal Communications Commission) requires that all cell phone providers equip phones with GPS (global positioning system) receivers –GPS receiver receives signals from GPS satellite –Computer links this information to the ALI database

22 VeriChip Implantable microchip that stores personal information Useful for tracking people with illnesses or in danger Raises privacy and legal issues

23 Computers and Homeland Security The U.S. VISIT system is being implemented to identify fake documents –U.S. VISIT (Visitor and Immigrant Status Indication) is a database of biometric identifiers Foreign students must provide personal information to the SEVIS system –SEVIS (Student and Exchange Visa Information Service) is an Internet-based database to verify enrollment –Some criticism exists due to lack of privacy

24 Homeland Security, cont. Surveillance using computer vision systems –U.S.-Canadian border uses digital camera at ports of entry to detect unusual movements –Artificial intelligence algorithms implemented in software are used to analyze data from cameras –Alerts are sent electronically Managing crises through collaboration –Web-based collaboration systems help track and manage events during a crisis –Information can be shared and viewed in real-time

25 Real-time Computerized Incidence Maps

26 Computers in the Military The military is constantly working to improve technologies for equipment and systems Wars and conflicts have historically brought new products into commercial use by citizens Recent trends use advanced computer technology –GPS (global positioning system) technology for navigation and weapons –Rugged laptops with wireless technologies for troop communication –Computer simulations for training

27 Deploying Unmanned Aerial Vehicles (UAVs) Used to gather intelligence in crowded areas Day or nighttime surveillance Lightweight, remote-controlled drones –GPS for determining location –Chemical-agent detector –Color or night vision miniature camera Relays live images to video recorder or ground receiver May be used by police, oil companies, or news organizations in the future

28 Unmanned aerial vehicle (UAV)

29 Using Remote-Controlled Robots Used in small or hazardous locations React to their environment through detectors –Cameras –Microphones –Sonar and infrared sensors –Laser scanners –Radio antenna and wireless network router New robots are being developed to steer vehicles without human help –Used to deliver humanitarian aid or retrieve troops

30 PackBot

31 Utilizing Precision-Guided Bombs Smart bombs are guided to their targets using satellite-guidance capability –Intended to maximize damage to the target and minimize civilian casualties and collateral damage –Uses GPS to determine location –Still human intelligence is used to double check Mapping of location and to entering coordinates

32 Smart bomb

33 Tracking Troop Movement GPS is used to track troop movement –Helps troops accurately determine their location and the enemy’s position –Coordinates actions of different units on the ground, in the air, or at sea –Provides better rescue and response –Used to drop cargo packages from the air Also, GPS jamming systems are being developed to reduce effectiveness of enemy GPS guidance systems

34 Using Computer Simulation for Training Live training with military equipment is expensive and dangerous –Computer simulations used instead for training without the associated risks and costs Software simulates battle scenarios –Military vehicles –Battle fields –Could be repeated for practice, feedback, or analysis –The software is built using expert assumptions and existing algorithms

35 Conclusion Uses of computers and technology in –Government Electoral process, USPS, Census Bureau, IRS –Law Enforcement Evidence and criminal record databases Traffic laws, missing children, wireless911 calls –Homeland Security Crisis management, surveillance of borders –Military Unmanned Aerial Vehicles, remote-controlled robots, smart bombs, computer simulations