21
Copyright 2005 - 2009: Hi Tec h Criminal Justice, Raymond E . Foster Police Technology Police Technology Chapter Nine Chapter Nine External Systems External Systems

External Systems

Embed Size (px)

DESCRIPTION

The companion PowerPoint for Chapter Nine (External Systems) for the book Police Technology. Currently used in over 100 colleges and universities; and, by police agencies around the globe

Citation preview

Page 1: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Police TechnologyPolice TechnologyChapter NineChapter Nine

External SystemsExternal Systems

Page 2: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Learning ObjectivesLearning Objectives

The history of and developments at the The history of and developments at the National Crime Information Center (NCIC)National Crime Information Center (NCIC)

Uniform Crime ReportingUniform Crime Reporting and and National National Crime Victimization SurveyCrime Victimization Survey

National Incident-Based Reporting SystemNational Incident-Based Reporting System Potential Sources of government Potential Sources of government

informationinformation Government vs. Commercial databaseGovernment vs. Commercial database Regional information sharing schemesRegional information sharing schemes

Page 3: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Sources of InformationSources of Information

Two broad classifications of records a Two broad classifications of records a police officer might access: police officer might access:

Public RecordsPublic Records – Available to the – Available to the public and about something that public and about something that has happenedhas happened

Investigative RecordsInvestigative Records – About things – About things that are going on. More restrictive that are going on. More restrictive so a case in not compromised.so a case in not compromised.

Page 4: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

External sources of information are oftenExternal sources of information are often

more extensive than local sources:more extensive than local sources: Offenders move around leaving an Offenders move around leaving an

information trailinformation trail Small agencies do not have the resources Small agencies do not have the resources

to maintain large or extensive databasesto maintain large or extensive databases Many crimes are complex and cross-Many crimes are complex and cross-

jurisdictionaljurisdictional

Sources of InformationSources of Information

Page 5: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

National Crime Information CenterNational Crime Information Center

First database with nationwide accessFirst database with nationwide access Each participating agency is responsible Each participating agency is responsible

to enter, update and delete their own to enter, update and delete their own recordsrecords

Local agencies can query NCIC through a Local agencies can query NCIC through a state state control terminal agency (CTA)control terminal agency (CTA)

The The Interstate Identification Index (III)Interstate Identification Index (III) receives offender information from CTAsreceives offender information from CTAs

Page 6: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

NCIC 2000NCIC 2000

Has reduced fingerprint and Has reduced fingerprint and photographic information of wanted photographic information of wanted persons to digital informationpersons to digital information

Allows agencies to submit same Allows agencies to submit same information in a digital formatinformation in a digital format

Ultimately will allow police officers to Ultimately will allow police officers to access fingerprint and photograph access fingerprint and photograph data from their patrol vehiclesdata from their patrol vehicles

Page 7: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

NCIC 2000 provides the software NCIC 2000 provides the software application free of chargeapplication free of charge

System is designed to run with System is designed to run with standard computer and standard computer and communications equipmentcommunications equipment

Local agencies must acquire the Local agencies must acquire the hardware necessary to run the hardware necessary to run the softwaresoftware

NCIC 2000NCIC 2000

Page 8: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Legal questionsLegal questions

A police officer can check A police officer can check

for warrantsfor warrants

during a brief detention. during a brief detention. Can the officer take the Can the officer take the

person’s fingerprints? person’s fingerprints? Is the officer escalating Is the officer escalating

the detention by taking the detention by taking the prints? the prints?

Is taking a fingerprint Is taking a fingerprint during a detention a during a detention a seizure (4seizure (4thth amendment)?amendment)?

Photograph provided by Cross Match Technologies, Inc

Page 9: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Safety IssuesSafety Issues

During a traffic stop, the violator has moreDuring a traffic stop, the violator has more

prefect information than the officer. prefect information than the officer. The violator knows if he was only The violator knows if he was only

speeding or fleeing from a crime scene. speeding or fleeing from a crime scene. With this lack of information, approaching With this lack of information, approaching

the violator for a print is dangerous. the violator for a print is dangerous. The violator could take this opportunity to The violator could take this opportunity to

flee or attack the officerflee or attack the officer

Page 10: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Uniformed Crime ReportsUniformed Crime Reports

The U.S. Department of Justice The U.S. Department of Justice has two programs that gather has two programs that gather statistics on crime: statistics on crime:

Uniformed Crime Reports (UCR)Uniformed Crime Reports (UCR) National Crime Victimization National Crime Victimization

SurveySurvey

Page 11: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

UCRUCR

Agencies voluntarily report crimes to Agencies voluntarily report crimes to the FBI monthlythe FBI monthly

Consists of crimes categorized as Consists of crimes categorized as Part I or Part IIPart I or Part II

Eight Part I crimes: Homicide, Eight Part I crimes: Homicide, Forcible Rape, Robbery, Aggravated Forcible Rape, Robbery, Aggravated Assault, Burglary, Larceny/Theft, Assault, Burglary, Larceny/Theft, Motor Vehicle Theft, and ArsonMotor Vehicle Theft, and Arson

Page 12: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

National Crime Victimization National Crime Victimization SurveySurvey

NCVS statistics come from the NCVS statistics come from the victims themselves. victims themselves.

Complements the UCR informationComplements the UCR information Many victims do not report crimes Many victims do not report crimes UCR and NCVS together provide a UCR and NCVS together provide a

more comprehensive picture on more comprehensive picture on crimecrime

Page 13: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

DifferencesDifferences

UCRUCR Rape: only reports Rape: only reports

female victimsfemale victims Legal definitions of Legal definitions of

crimes important crimes important because of specific because of specific intentintent

NCVSNCVS Rape: reports both Rape: reports both

male and female male and female victimsvictims

Does not report Does not report homicide, arson, homicide, arson, commercial crimes commercial crimes and crimes against and crimes against children under 12children under 12

Page 14: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

SimilaritiesSimilarities

Both UCR and NCVS give law Both UCR and NCVS give law enforcement personnel enforcement personnel information that can be used information that can be used strategicallystrategically

Data have little or no tactical Data have little or no tactical valuevalue

Information provided is a flat fileInformation provided is a flat file

Page 15: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

National Incident-Based Reporting National Incident-Based Reporting SystemSystem

NIBRS NIBRS reports all the crimesreports all the crimes that occurred that occurred during a single occurred or incident (e.g., during a single occurred or incident (e.g., Burglary, Assault, Murder, Arson)Burglary, Assault, Murder, Arson)

UCR follows the UCR follows the hierarchyhierarchy rule rule NIBRS looks at a crime and all of its NIBRS looks at a crime and all of its

components as an incident (the elements)components as an incident (the elements)

Page 16: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Likely to replace UCR in the futureLikely to replace UCR in the future Significantly more detailed, so there will Significantly more detailed, so there will

be more common information available be more common information available to analyze cross-jurisdictional crimesto analyze cross-jurisdictional crimes

Will require police officers to spend Will require police officers to spend more time completing reports and more time completing reports and reduce available timereduce available time

Eventually, agencies will more effectiveEventually, agencies will more effective

Byproducts of NIBRSByproducts of NIBRS

Page 17: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Government DatabasesGovernment Databases The Regional Information Sharing Systems The Regional Information Sharing Systems

(RISS) (RISS) www.iir.com/RISSwww.iir.com/RISS National Drug Pointer Index (NFPIX) National Drug Pointer Index (NFPIX)

www.usdoj.gov/dea/programs/ndpix.htm www.usdoj.gov/dea/programs/ndpix.htm National Tracing CenterNational Tracing Center

www.atf.govwww.atf.gov National White Collar Crime Center National White Collar Crime Center

www.nw3c.orgwww.nw3c.org Financial Crime Enforcement Network Financial Crime Enforcement Network

(FinCEN)(FinCEN)www.fincen.gov www.fincen.gov

Page 18: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Driver’s License and Driver’s License and Motor Vehicle Registration InformationMotor Vehicle Registration Information

State or local police officers access State or local police officers access driver’s license information through driver’s license information through the agency RMS to the state the agency RMS to the state authorityauthority

Accessing license information from Accessing license information from another state is done through another state is done through NLETS (National Law Enforcement NLETS (National Law Enforcement Telecommunications System)Telecommunications System)

Page 19: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Commercial Sources of InformationCommercial Sources of Information

Began with catalog salesBegan with catalog sales Evolved into direct marketing and Evolved into direct marketing and

market surveysmarket surveys Direct marketers began sharing Direct marketers began sharing

information with marketers of non-information with marketers of non-competitive goodscompetitive goods

Companies forms that collect, Companies forms that collect, organize, and sell information. organize, and sell information.

Page 20: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Personal information firms also Personal information firms also collect information from public collect information from public records (marriages, deaths, births, records (marriages, deaths, births, civil actions, arrests, etc)civil actions, arrests, etc)

Commercial Sources of InformationCommercial Sources of Information

Page 21: External Systems

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Police TechnologyPolice Technology

Explore Forensic Science atExplore Forensic Science at

www.forensicprofiles.com www.forensicprofiles.com