1 / 11

The Role of Computers in Modern Law Enforcement: Benefits and Challenges

This comprehensive overview by Sterlin Sanders explores the critical role of computers in law enforcement. From databases like the FBI's NCIC and GBI's GCIC to mobile data terminals (MDTs) enhancing officer efficiency, the use of technology presents both opportunities and challenges. It also examines internet crime tools, computer forensics, and electronic surveillance, highlighting privacy concerns. While computers enhance capabilities and speed in policing, issues such as false identification and the risk of privacy violations complicate their adoption.

Télécharger la présentation

The Role of Computers in Modern Law Enforcement: Benefits and Challenges

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computers in Law Enforcement By Sterlin Sanders

  2. Introduction • How computers are used in law enforcement? • Controversy? • Increase or Decrease? • Helpful or Problematic?

  3. Computers used as Databases • Abilities of the Criminal Databases • FBI and the NCIC • GBI and the GCIC • Hazlehurst Police Dept. and the “Megatron” • Interviewee: Lt. Larry Allen

  4. Computers used as Mobile Devices • What is a Mobile Data Terminal (MDT)? • Advantages (DBPD “Virtual Partner”) • Verbal response • Quick Ticket • Quick Crash • Quick Map • Increase in citations == Decrease in stop time

  5. Computers used as Mobile Devices • Disadvantages of MDT • Expensive • Small coverage area • MDT software • Alternative • The CAD system • Interviewee: Stacey Bridges

  6. Computers used as Internet Crime Tools • What is Hacking? • Solutions • Computer Forensics • Electronic Surveillance

  7. Computer Forensics • What is Computer Forensics? • Issues • Steve Martin Report • Melissa Virus • Paypal Inc.

  8. Electronic Surveillance • What is Electronic Surveillance • Issues • Carnivore • Magic Lantern • Government believe: • Stop Terrorism • People believe: • Government wants power • Government will spy on the innocent • Violating Privacy Rights

  9. Computers used as Identification Tools • What is Biometrics • Type of Biometrics • Authentication • Identification

  10. Biometrics • Authentication • Identification • Risks • False-positve identification • High watch list == low accuracy • Copied or stolen biometric data • Issues

  11. Conclusion • Computers are helpful • Computers can cause problems • Increase in computer use

More Related