Unit Nine New Technology Joe Minella. Unit 9 assignments Unit 9 quiz Unit 9 seminar Unit 9 discussion question Unit 9 project paper CLASS WILL END Feb.

Slides:



Advertisements
Similar presentations
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Seven Police Technology Communications Dispatch.
Advertisements

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Missing and Abducted Persons Chapter 12:
BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Presented By The Plano Police Department Crime Prevention Unit.
Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.
By: Monika Achury and Shuchita Singh
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Twenty-One Police Technology Emergingand.
Amber Vision – June 25, 2010 Presentation to: West Virginia Board of Education Superintendent’s Leadership Institute.
Governor’s Office of Crime Control & Prevention ✪ Law Enforcement Instructional Guide Domestic Violence – Protective Orders – Notification of Service June.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
The Social Effect of Information System
LOCAL AGENCY MUST STILL RUN A FILE CHECK (QHW) TO DETERMINE WARRANTS/HOLDS II. If name is not on CCH, prints are compared to all fingerprints in AFIS for.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Unit Nine New Technology Prof. Ruth Ronan. Reminder Hello Class, I want to remind you that I am here to assist you with any questions you have about the.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Ideal Jobs FBI. Field Criminal Justice Criminal Justice is study of the law and is mostly of thinking of the Criminal mind. Jobs: Local law Enforcement:
DNA DNA contains information of genetic make up and is often used to solve cases. The information of DNA made public may lead to genetic discrimination.
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Welcome to the Seminar Professor Fred Bittner.  Review Key Terms  Introduce Yourself to your classmates  Read Chapters 1 and 2 in Criminal Investigation.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Jess Thornton Unit 9. Unit 9 Chores DiscussionQuiz Unit 9 Project (Look under unit 9 for direction) Seminar.
Biometrics Authentication Technology
Biometrics.
Myths of Crime Scene Forensics There are many popular Television programs that are based on Crime Scene Forensics. Don’t be fooled however, solving crimes.
Unit Nine New Technology Joe Minella. Unit 9 assignments Unit 9 quiz Unit 9 seminar Unit 9 discussion question Unit 9 project paper CLASS WILL END JAN.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Biometric Technologies
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
Computer crimes.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
CJ211: U NIT 9 T ECHNOLOGY AND THE F UTURE Seminar: The Future of Policing.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Aladdin Security We supply what others can only assure.
Technology Needs in the Patrol Car.  Receive, View, Add to, Search Computer Aided Dispatch calls  Write incident reports  Issue Criminal citations.
Face Recognition Technology By Catherine jenni christy.M.sc.
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
Unit Nine New Technology Joe Minella. Unit 9 assignments Unit 9 quiz Unit 9 seminar Unit 9 discussion question Unit 9 project paper CLASS WILL END June.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Crime Prevention Basics Morganton Department of Public Safety Criminal Investigations Division In conjunction with the Special Operations Division.
Safe and Clean Campaign Hampton City Council March 12, 2014.
Kelsey Bretz. FBI history Authorization Apple UDIDs Acceptable use of information? Conclusion References.
What is the purpose of the Guardian Academy?
A Seminar Report On Face Recognition Technology
Biometrics.
Criminal Justice Careers
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Chapter 5 - Input.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
AFIS and CODIS Duyen & Ladaysha.
Biometric technology.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Role of US Security and Intelligence Agencies
BY: Michael Etse and Maverick Fermill
15-5 Automated Fingerprint Identification System
Presentation transcript:

Unit Nine New Technology Joe Minella

Unit 9 assignments Unit 9 quiz Unit 9 seminar Unit 9 discussion question Unit 9 project paper CLASS WILL END Feb 20th 11 DAYS FROM TODAY- TIME IS CRUCIAL

Grade Report It is your responsibility to check your own grade report Zero grade indicates a missing assignment Late work is accepted - all late work is accepted All quizzes are open all discussion boards are open Late papers accepted

Final Project Write a 3-5 page paper 600 WORDS Identify the most useful and beneficial NEW or currently applied technology that will aid law enforcement Discuss in detail at least four (4) technologies and explain their applied value to police agencies Include how the technology is used or applied in the field and the benefit Fully explain the usefulness in their application and benefit to law enforcement Cite all sources of information in detail

Video Time Open a new Explorer window Copy the following web address: WA5Gy32aqdo Paste the web address into the new explorer window and watch the video Return to class when finished

License Plate Scanner License Plate Scanner License plate scanner Can read and record up to 3,500 plates per hour while on patrol Can log plates at crime scenes Used for stolen cars, amber alerts, terrorism, wanted persons Placed at high traffic areas-airports Employers use the same technology

Voice Translation Device Language barriers are a big issue for police today on the street Devices use true speech recognition software that perform phonetic matching similar to Dragon Speech translates English to several common languages Improve officer safety and trust during citizen encounters

Wireless Mesh Networking Laptops, cell phones, blackberries, street and patrol car cameras Connected and working together to form a mesh of information similar to a spider web Police and emergency centers in every city has access at a central location Similar to a Fusion center Police can monitor areas in their beat in a patrol car using cameras Information sharing throughout the system with police, fire and homeland security

Registered Sex Offenders More than 500,000 in US 100,000 just vanish Most states have their own web sites to track offenders Can check zip codes Locate number of registered offenders in your community

Video Time Open a new Explorer window Copy the following web address: ?v=ilbegpL4Q8ohttp:// ?v=ilbegpL4Q8o Paste the web address into the new explorer window and watch the video Return to class when finished

GIS Tracking and SCRAM These ankle devices are very effective and are very popular across the U.S. If removed a alarm is activated Must stay within 100 feet of home phone line Removal leads to mandatory incarceration. Detects alcohol

Ankle Bracelets and DV Contain GPS and methods to detect alcohol in sweat of a person Tied in wirelessly to a central location as part of the mesh system Used for domestic violence offenders if they come within 2500 feet of a DV victim Hard to remove and provides immediate notification to Sheriff Numerous possibilities

Voice Stress Analysis Software cost $10,000 Loaded to Labtop Subject talks into the computer No studies have been conducted with this new technology Good Science or just “bunk”

Biometrics Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, biometrics is used as a form of identity access management and access control. Scan large groups in crowds or casinos Facial recognition software

Biometrics Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely replaced retina, and odor/scent.

Video Time Watch the following video ?v=uS1ZOkbqzhghttp:// ?v=uS1ZOkbqzhg Paste the web address into the new explorer window and watch the video Return to class when finished

Automated Fingerprint System The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data. The AFIS was originally used by the U.S. Federal Bureau of Investigation (FBI) in criminal cases. Lately, it has gained favor for general identification and fraud prevention.biometric

Immigration Money Transfer Average cost $1,000 per person They prefer Western Union Transfer All transfer now of $750 or more will set off the alrams Money found to be associated with trafficking is seized and then used to pay for more investigations.

Breathalyzer A preliminary non- evidentiary screening device can be approved by some as an approved screening device, and an evidentiary breath instrument can be similarly designated as an approved instrument. Establish Probable Cause

Cybercrime Refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. computernetworkcrime Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child groominghackingcopyright infringementchild pornographychild grooming

Gang Intelligence Systems Gangs pose a serious threat to public safety throughout the United States. Gang membership and gang-related criminal activity has increased over the past 10 years, and gang violence is making increased demands on law enforcement resources in many communities Experts predict that these trends will continue as gang-operated criminal networks expand.

The End Ladies & Gentlemen it’s been a great journey I hope you enjoyed the trip It’s been an honor to be your instructor I will enter grades until they close my grade book Stay focused & Stay Safe Class ends Feb 20 th