Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Learning Objectives The history of and developments at the National Crime Information Center (NCIC) The history of and developments at the National Crime Information Center (NCIC) Uniform Crime Reporting and National Crime Victimization Survey Uniform Crime Reporting and National Crime Victimization Survey National Incident-Based Reporting System National Incident-Based Reporting System Potential Sources of government information Potential Sources of government information Government vs. Commercial database Government vs. Commercial database Regional information sharing schemes Regional information sharing schemes
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Sources of Information Two broad classifications of records a police officer might access: Public Records – Available to the public and about something that has happened Public Records – Available to the public and about something that has happened Investigative Records – About things that are going on. More restrictive so a case in not compromised. Investigative Records – About things that are going on. More restrictive so a case in not compromised.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster External sources of information are often more extensive than local sources: Offenders move around leaving an information trail Offenders move around leaving an information trail Small agencies do not have the resources to maintain large or extensive databases Small agencies do not have the resources to maintain large or extensive databases Many crimes are complex and cross-jurisdictional Many crimes are complex and cross-jurisdictional Sources of Information
Copyright : Hi Tech Criminal Justice, Raymond E. Foster National Crime Information Center First database with nationwide access First database with nationwide access Each participating agency is responsible to enter, update and delete their own records Each participating agency is responsible to enter, update and delete their own records Local agencies can query NCIC through a state control terminal agency (CTA) Local agencies can query NCIC through a state control terminal agency (CTA) The Interstate Identification Index (III) receives offender information from CTAs The Interstate Identification Index (III) receives offender information from CTAs
Copyright : Hi Tech Criminal Justice, Raymond E. Foster NCIC 2000 Has reduced fingerprint and photographic information of wanted persons to digital information Has reduced fingerprint and photographic information of wanted persons to digital information Allows agencies to submit same information in a digital format Allows agencies to submit same information in a digital format Ultimately will allow police officers to access fingerprint and photograph data from their patrol vehicles Ultimately will allow police officers to access fingerprint and photograph data from their patrol vehiclespolice officerspolice officers
Copyright : Hi Tech Criminal Justice, Raymond E. Foster NCIC 2000 provides the software application free of charge NCIC 2000 provides the software application free of charge System is designed to run with standard computer and communications equipment System is designed to run with standard computer and communications equipment Local agencies must acquire the hardware necessary to run the software Local agencies must acquire the hardware necessary to run the software NCIC 2000
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Legal questions A police officer can check for warrants during a brief detention. Can the officer take the person’s fingerprints? Is the officer escalating the detention by taking the prints? Is taking a fingerprint during a detention a seizure (4 th amendment)? Photograph provided by Cross Match Technologies, Inc
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Safety Issues During a traffic stop, the violator has more prefect information than the officer. The violator knows if he was only speeding or fleeing from a crime scene. The violator knows if he was only speeding or fleeing from a crime scene.crime scenecrime scene With this lack of information, approaching the violator for a print is dangerous. With this lack of information, approaching the violator for a print is dangerous. The violator could take this opportunity to flee or attack the officer The violator could take this opportunity to flee or attack the officer
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Uniformed Crime Reports The U.S. Department of Justice has two programs that gather statistics on crime: Uniformed Crime Reports (UCR) Uniformed Crime Reports (UCR) National Crime Victimization Survey National Crime Victimization Survey
Copyright : Hi Tech Criminal Justice, Raymond E. Foster UCR Agencies voluntarily report crimes to the FBI monthly Agencies voluntarily report crimes to the FBI monthly Consists of crimes categorized as Part I or Part II Consists of crimes categorized as Part I or Part II Eight Part I crimes: Homicide, Forcible Rape, Robbery, Aggravated Assault, Burglary, Larceny/Theft, Motor Vehicle Theft, and Arson Eight Part I crimes: Homicide, Forcible Rape, Robbery, Aggravated Assault, Burglary, Larceny/Theft, Motor Vehicle Theft, and Arson
Copyright : Hi Tech Criminal Justice, Raymond E. Foster National Crime Victimization Survey NCVS statistics come from the victims themselves. Complements the UCR information Complements the UCR information Many victims do not report crimes Many victims do not report crimes UCR and NCVS together provide a more comprehensive picture on crime UCR and NCVS together provide a more comprehensive picture on crime
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Differences UCR Rape: only reports female victims Rape: only reports female victims Legal definitions of crimes important because of specific intent Legal definitions of crimes important because of specific intent NCVS Rape: reports both male and female victims Does not report homicide, arson, commercial crimes and crimes against children under 12
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Similarities Both UCR and NCVS give law enforcement personnel information that can be used strategically Both UCR and NCVS give law enforcement personnel information that can be used strategically Data have little or no tactical value Data have little or no tactical value Information provided is a flat file Information provided is a flat file
Copyright : Hi Tech Criminal Justice, Raymond E. Foster National Incident-Based Reporting System NIBRS reports all the crimes that occurred during a single occurred or incident (e.g., Burglary, Assault, Murder, Arson) NIBRS reports all the crimes that occurred during a single occurred or incident (e.g., Burglary, Assault, Murder, Arson) UCR follows the hierarchy rule UCR follows the hierarchy rule NIBRS looks at a crime and all of its components as an incident (the elements) NIBRS looks at a crime and all of its components as an incident (the elements)
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Likely to replace UCR in the future Likely to replace UCR in the future Significantly more detailed, so there will be more common information available to analyze cross-jurisdictional crimes Significantly more detailed, so there will be more common information available to analyze cross-jurisdictional crimes Will require police officers to spend more time completing reports and reduce available time Will require police officers to spend more time completing reports and reduce available timepolice officerspolice officers Eventually, agencies will more effective Eventually, agencies will more effective Byproducts of NIBRS
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Government Databases The Regional Information Sharing Systems (RISS) The Regional Information Sharing Systems (RISS) National Drug Pointer Index (NFPIX) National Drug Pointer Index (NFPIX) National Tracing Center National Tracing Centerwww.atf.gov National White Collar Crime Center National White Collar Crime Center Financial Crime Enforcement Network (FinCEN) Financial Crime Enforcement Network (FinCEN)
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Driver’s License and Motor Vehicle Registration Information State or local police officers access driver’s license information through the agency RMS to the state authority State or local police officers access driver’s license information through the agency RMS to the state authority Accessing license information from another state is done through NLETS (National Law Enforcement Telecommunications System) Accessing license information from another state is done through NLETS (National Law Enforcement Telecommunications System)
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Commercial Sources of Information Began with catalog sales Began with catalog sales Evolved into direct marketing and market surveys Evolved into direct marketing and market surveys Direct marketers began sharing information with marketers of non- competitive goods Direct marketers began sharing information with marketers of non- competitive goods Companies forms that collect, organize, and sell information. Companies forms that collect, organize, and sell information.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Personal information firms also collect information from public records (marriages, deaths, births, civil actions, arrests, etc) Personal information firms also collect information from public records (marriages, deaths, births, civil actions, arrests, etc) Commercial Sources of Information
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Explore Forensic Science at Forensic ScienceForensic Science