Download presentation
Presentation is loading. Please wait.
1
Criminal Justice Today
Chapter 18 The Future of Criminal Justice Crime & Justice, Waxer 5/9/2017
2
CHAPTER OBJECTIVES 18.1 Describe the historical relationship between technological advances and criminal activity. 18.2 Describe the current and likely future roles of technology in both crime and in the fight against crime. 18.3 Describe the field of criminalistics, including the contribution of evolving technology.
3
Learning Objectives After this lecture, you should be able to complete the following Learning Outcomes 18.1 Describe the historical relationship between technological advances and criminal activity.
4
18.1 Biocrime Cybercrime Lecture Notes
Technocrime - a criminal offense that employs advanced or emerging technology in its commission. Biocrime - A criminal offense perpetrated through the use of biologically active substances, including chemicals and toxins, disease-causing organisms, altered genetic material, and organic tissues and organs. Biocrimes unlawfully affect the metabolic, biochemical, genetic, physiological, or anatomical status of living organisms. this emerging type of crime can involve an attack on agricultural plants and animals and on human beings. an example of this type of attack against people could be a deadly strain of flu genetically created. a chemical, biological or nuclear weapon that has the potential to cause mass casualties is called a weapon of mass destruction (WMD). Cybercrime – focuses on information stored on electronic media. A hacker is defined as a computer hobbyist or professional, generally with advanced programming skills. Today, the term hacker has taken on a sinister connotation, referring to hobbyists who are bent on illegally accessing the computers of others or who attempt to demonstrate their technological prowess through computerized acts of vandalism. Many hackers are able to obtain information through social engineering - a nontechnical kind of cyberintrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Although many hackers have malicious intent or purposes, some groups attempt to infiltrate business or government security systems in order to show their vulnerabilities and to get companies to increase safeguards and security protocols. A computer virus is a computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store. Viruses are destructive software programs that may effectively vandalize computers of all types and sizes. Malware is defined as malicious computer programs like viruses, worms, and Trojan horses. Phishing is the use of “official” types of s to solicit personal information from victims. Many are designed to fool the person to give the intruder a person’s information (including social security number, bank accounts, passwords and user names). This information is used to steal a person’s money and create new credit accounts and identities resulting in financial loss to the victim as well as banks and credit card companies. Many of these type of scams involve the use of social engineering. Software piracy is the unauthorized duplication of software or the illegal transfer of data from one storage medium to another. Spam is unsolicited commercial bulk whose primary purpose is the advertisement or promotion of a commercial product or service.
5
Do Now Topic: Breathalyzer
Is using a Breathalyzer test for possible intoxicated driving considered an invasion of privacy? Why / Why not?
6
Chapter 18 – The Future of Criminal Justice – Part I
I. Technology and Crime A. Bio Crime B. Cyber Crime Types Transnational Cyber Crime Lecture Notes Technocrime - a criminal offense that employs advanced or emerging technology in its commission. Biocrime - A criminal offense perpetrated through the use of biologically active substances, including chemicals and toxins, disease-causing organisms, altered genetic material, and organic tissues and organs. Biocrimes unlawfully affect the metabolic, biochemical, genetic, physiological, or anatomical status of living organisms. this emerging type of crime can involve an attack on agricultural plants and animals and on human beings. an example of this type of attack against people could be a deadly strain of flu genetically created. a chemical, biological or nuclear weapon that has the potential to cause mass casualties is called a weapon of mass destruction (WMD). Cybercrime – focuses on information stored on electronic media. A hacker is defined as a computer hobbyist or professional, generally with advanced programming skills. Today, the term hacker has taken on a sinister connotation, referring to hobbyists who are bent on illegally accessing the computers of others or who attempt to demonstrate their technological prowess through computerized acts of vandalism. Many hackers are able to obtain information through social engineering - a nontechnical kind of cyberintrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Although many hackers have malicious intent or purposes, some groups attempt to infiltrate business or government security systems in order to show their vulnerabilities and to get companies to increase safeguards and security protocols. A computer virus is a computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store. Viruses are destructive software programs that may effectively vandalize computers of all types and sizes. Malware is defined as malicious computer programs like viruses, worms, and Trojan horses. Phishing is the use of “official” types of s to solicit personal information from victims. Many are designed to fool the person to give the intruder a person’s information (including social security number, bank accounts, passwords and user names). This information is used to steal a person’s money and create new credit accounts and identities resulting in financial loss to the victim as well as banks and credit card companies. Many of these type of scams involve the use of social engineering. Software piracy is the unauthorized duplication of software or the illegal transfer of data from one storage medium to another. Spam is unsolicited commercial bulk whose primary purpose is the advertisement or promotion of a commercial product or service.
9
Chapter 18 – The Future of Criminal Justice – Part I
II. Technology and Crime Control Leading Technical Organizations and Criminal Justice
11
Acquire Upfront Magazine Read page 13 Gather in groups of
Textalyzer Acquire Upfront Magazine Read page 13 Gather in groups of
12
Closure Topic: Textalyzer
Why might having a Textalyzer be allowed and used? What information supports the initiative? Think about the Breathalyzer and what is described in the text about having a driver’s license and what rights are waived.
13
Criminal Justice Today
Policing the Police Crime & Justice, Waxer 5/11/2017
14
CHAPTER OBJECTIVES 18.1 Describe the historical relationship between technological advances and criminal activity. 18.2 Describe the current and likely future roles of technology in both crime and in the fight against crime. 18.3 Describe the field of criminalistics, including the contribution of evolving technology.
15
Learning Objectives After this lecture, you should be able to complete the following Learning Outcomes 18.1 Describe the historical relationship between technological advances and criminal activity.
16
How do we police the police?
Do Now Topic: Policing How do we police the police?
17
Chapter 18 – The Future of Criminal Justice – Part I
I. Technology and Crime A. Bio Crime B. Cyber Crime Types Transnational Cyber Crime Lecture Notes Technocrime - a criminal offense that employs advanced or emerging technology in its commission. Biocrime - A criminal offense perpetrated through the use of biologically active substances, including chemicals and toxins, disease-causing organisms, altered genetic material, and organic tissues and organs. Biocrimes unlawfully affect the metabolic, biochemical, genetic, physiological, or anatomical status of living organisms. this emerging type of crime can involve an attack on agricultural plants and animals and on human beings. an example of this type of attack against people could be a deadly strain of flu genetically created. a chemical, biological or nuclear weapon that has the potential to cause mass casualties is called a weapon of mass destruction (WMD). Cybercrime – focuses on information stored on electronic media. A hacker is defined as a computer hobbyist or professional, generally with advanced programming skills. Today, the term hacker has taken on a sinister connotation, referring to hobbyists who are bent on illegally accessing the computers of others or who attempt to demonstrate their technological prowess through computerized acts of vandalism. Many hackers are able to obtain information through social engineering - a nontechnical kind of cyberintrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Although many hackers have malicious intent or purposes, some groups attempt to infiltrate business or government security systems in order to show their vulnerabilities and to get companies to increase safeguards and security protocols. A computer virus is a computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store. Viruses are destructive software programs that may effectively vandalize computers of all types and sizes. Malware is defined as malicious computer programs like viruses, worms, and Trojan horses. Phishing is the use of “official” types of s to solicit personal information from victims. Many are designed to fool the person to give the intruder a person’s information (including social security number, bank accounts, passwords and user names). This information is used to steal a person’s money and create new credit accounts and identities resulting in financial loss to the victim as well as banks and credit card companies. Many of these type of scams involve the use of social engineering. Software piracy is the unauthorized duplication of software or the illegal transfer of data from one storage medium to another. Spam is unsolicited commercial bulk whose primary purpose is the advertisement or promotion of a commercial product or service.
18
Acquire Upfront Magazine Read page 13 Gather in groups of
Textalyzer Acquire Upfront Magazine Read page 13 Gather in groups of
19
Closure Topic: Policing 2
What was the overall problem with the police department? What solutions should there be for the police department?
20
Criminal Justice Today
Chapter 18 Criminalistics Crime & Justice, Waxer 5/15/2017
21
Learning Objectives After this lecture, you should be able to complete the following Learning Outcomes 18.3 Describe the field of criminalistics, including the contribution of evolving technology.
22
Do Now Topic: Criminal Rights
What kinds of rights, if any, should convicted criminals lose?
23
18.3 Criminalistics DNA profiling Serological/ Tissue identification
Lecture Notes DNA profiling - The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects. It requires only a few human cells to make a comparison. One drop of blood, a few hairs, a small amount of skin or a trace of semen usually provides sufficient genetic material. This method is nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification. The Daubert v. Merrell Dow Pharmaceutical Inc. case resulted in the Daubert standard - the test of scientific acceptability applicable to the gathering of evidence in criminal cases. This standard opened the door to using DNA in criminal and civil trials. Online databases - Computerized information systems and the personnel who operate them are an integral part of most police departments today. The automated fingerprint technology discussed earlier is but one example of information-based systems designed to help in identifying offenders and solving crimes. Today there are many online databases through which law enforcement agencies share information to help solve crimes and identify suspects. Increasingly, law enforcement agencies are making criminal database information available to the public via the Internet to educate the public and notify them of crimes and dangers. Computer-Aided Investigations - Some police agencies use large computer databases that can cross-reference specific information about crimes to determine patterns and to identify suspects. The developing field of artificial intelligence uses computers to make inferences based on available information and to draw conclusions or to make recommendations to the system’s operator is known as an expert system. This system relies on three key components: A user interface or terminal Knowledge base containing information on what is already known in the area of investigation. A computer program known as an interference engine that compares user input and stored information according to established decision making rules. Serological/Tissue Identification – blood and tissue analysis which can trace a sample back to an offender. Computer-Based Training (CBT) - They allow users to work at their own pace, and they can be made available around the clock to provide off -site instruction to personnel whose job requirements make other kinds of training difficult to implement. Some of the more widely used computer-training programs include shoot/no-shoot decision-based software and police pursuit driving simulators. Computer- Based Training Online databases Computer- Aided Investigations
24
Chapter 18 – The Future of Criminal Justice – Part II
IV. New Technologies A. Past B. Present C. Future Lecture Notes DNA profiling - The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects. It requires only a few human cells to make a comparison. One drop of blood, a few hairs, a small amount of skin or a trace of semen usually provides sufficient genetic material. This method is nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification. The Daubert v. Merrell Dow Pharmaceutical Inc. case resulted in the Daubert standard - the test of scientific acceptability applicable to the gathering of evidence in criminal cases. This standard opened the door to using DNA in criminal and civil trials. Online databases - Computerized information systems and the personnel who operate them are an integral part of most police departments today. The automated fingerprint technology discussed earlier is but one example of information-based systems designed to help in identifying offenders and solving crimes. Today there are many online databases through which law enforcement agencies share information to help solve crimes and identify suspects. Increasingly, law enforcement agencies are making criminal database information available to the public via the Internet to educate the public and notify them of crimes and dangers. Computer-Aided Investigations - Some police agencies use large computer databases that can cross-reference specific information about crimes to determine patterns and to identify suspects. The developing field of artificial intelligence uses computers to make inferences based on available information and to draw conclusions or to make recommendations to the system’s operator is known as an expert system. This system relies on three key components: A user interface or terminal Knowledge base containing information on what is already known in the area of investigation. A computer program known as an interference engine that compares user input and stored information according to established decision making rules. Serological/Tissue Identification – blood and tissue analysis which can trace a sample back to an offender. Computer-Based Training (CBT) - They allow users to work at their own pace, and they can be made available around the clock to provide off -site instruction to personnel whose job requirements make other kinds of training difficult to implement. Some of the more widely used computer-training programs include shoot/no-shoot decision-based software and police pursuit driving simulators.
25
Chapter 18 – The Future of Criminal Justice – Part II
IV. New Technologies in Criminalistics DNA Profiling Online Databases Computer-Aided Investigations Computer-Based Training Lecture Notes DNA profiling - The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects. It requires only a few human cells to make a comparison. One drop of blood, a few hairs, a small amount of skin or a trace of semen usually provides sufficient genetic material. This method is nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification. The Daubert v. Merrell Dow Pharmaceutical Inc. case resulted in the Daubert standard - the test of scientific acceptability applicable to the gathering of evidence in criminal cases. This standard opened the door to using DNA in criminal and civil trials. Online databases - Computerized information systems and the personnel who operate them are an integral part of most police departments today. The automated fingerprint technology discussed earlier is but one example of information-based systems designed to help in identifying offenders and solving crimes. Today there are many online databases through which law enforcement agencies share information to help solve crimes and identify suspects. Increasingly, law enforcement agencies are making criminal database information available to the public via the Internet to educate the public and notify them of crimes and dangers. Computer-Aided Investigations - Some police agencies use large computer databases that can cross-reference specific information about crimes to determine patterns and to identify suspects. The developing field of artificial intelligence uses computers to make inferences based on available information and to draw conclusions or to make recommendations to the system’s operator is known as an expert system. This system relies on three key components: A user interface or terminal Knowledge base containing information on what is already known in the area of investigation. A computer program known as an interference engine that compares user input and stored information according to established decision making rules. Serological/Tissue Identification – blood and tissue analysis which can trace a sample back to an offender. Computer-Based Training (CBT) - They allow users to work at their own pace, and they can be made available around the clock to provide off -site instruction to personnel whose job requirements make other kinds of training difficult to implement. Some of the more widely used computer-training programs include shoot/no-shoot decision-based software and police pursuit driving simulators.
26
Chapter 18 – The Future of Criminal Justice – Part II
IV. New Technologies A. Past B. Present C. Future Lecture Notes DNA profiling - The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects. It requires only a few human cells to make a comparison. One drop of blood, a few hairs, a small amount of skin or a trace of semen usually provides sufficient genetic material. This method is nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification. The Daubert v. Merrell Dow Pharmaceutical Inc. case resulted in the Daubert standard - the test of scientific acceptability applicable to the gathering of evidence in criminal cases. This standard opened the door to using DNA in criminal and civil trials. Online databases - Computerized information systems and the personnel who operate them are an integral part of most police departments today. The automated fingerprint technology discussed earlier is but one example of information-based systems designed to help in identifying offenders and solving crimes. Today there are many online databases through which law enforcement agencies share information to help solve crimes and identify suspects. Increasingly, law enforcement agencies are making criminal database information available to the public via the Internet to educate the public and notify them of crimes and dangers. Computer-Aided Investigations - Some police agencies use large computer databases that can cross-reference specific information about crimes to determine patterns and to identify suspects. The developing field of artificial intelligence uses computers to make inferences based on available information and to draw conclusions or to make recommendations to the system’s operator is known as an expert system. This system relies on three key components: A user interface or terminal Knowledge base containing information on what is already known in the area of investigation. A computer program known as an interference engine that compares user input and stored information according to established decision making rules. Serological/Tissue Identification – blood and tissue analysis which can trace a sample back to an offender. Computer-Based Training (CBT) - They allow users to work at their own pace, and they can be made available around the clock to provide off -site instruction to personnel whose job requirements make other kinds of training difficult to implement. Some of the more widely used computer-training programs include shoot/no-shoot decision-based software and police pursuit driving simulators.
27
Chapter 18 – The Future of Criminal Justice – Part II
IV. New Technologies in Criminalistics DNA Profiling Online Databases Computer-Aided Investigations Computer-Based Training Lecture Notes DNA profiling - The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects. It requires only a few human cells to make a comparison. One drop of blood, a few hairs, a small amount of skin or a trace of semen usually provides sufficient genetic material. This method is nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification. The Daubert v. Merrell Dow Pharmaceutical Inc. case resulted in the Daubert standard - the test of scientific acceptability applicable to the gathering of evidence in criminal cases. This standard opened the door to using DNA in criminal and civil trials. Online databases - Computerized information systems and the personnel who operate them are an integral part of most police departments today. The automated fingerprint technology discussed earlier is but one example of information-based systems designed to help in identifying offenders and solving crimes. Today there are many online databases through which law enforcement agencies share information to help solve crimes and identify suspects. Increasingly, law enforcement agencies are making criminal database information available to the public via the Internet to educate the public and notify them of crimes and dangers. Computer-Aided Investigations - Some police agencies use large computer databases that can cross-reference specific information about crimes to determine patterns and to identify suspects. The developing field of artificial intelligence uses computers to make inferences based on available information and to draw conclusions or to make recommendations to the system’s operator is known as an expert system. This system relies on three key components: A user interface or terminal Knowledge base containing information on what is already known in the area of investigation. A computer program known as an interference engine that compares user input and stored information according to established decision making rules. Serological/Tissue Identification – blood and tissue analysis which can trace a sample back to an offender. Computer-Based Training (CBT) - They allow users to work at their own pace, and they can be made available around the clock to provide off -site instruction to personnel whose job requirements make other kinds of training difficult to implement. Some of the more widely used computer-training programs include shoot/no-shoot decision-based software and police pursuit driving simulators.
28
Freedom or Safety? You Decide
Page 731 “Religion and Public Safety” Read passage and write an opinion on the article Do the demands of public safety justify the kind of restriction on religious practice described here? Should photo IDs, such as driver’s licenses, be replaced with other forms of identification [DNA profile] in order to accommodate the beliefs of individuals like the Freemans?
29
Closure Topic: Online Database
Should photographs and personal information of criminals in a nearby area be released to the public? Why / Why not. Explain your reasoning.
30
Criminal Justice Today
Chapter 18 Technologies on the Horizon Crime & Justice, Waxer 5/17/2017
31
Learning Objectives After this lecture, you should be able to complete the following Learning Outcomes 18.2 Describe the current and likely future roles of technology in both crime and in the fight against crime.
32
Do Now Topic: Criminal Rights
What kinds of rights, if any, should convicted criminals lose?
33
Electronic Monitoring Camera and Satellite Surveillance
18.2 Technology today Electronic Monitoring Camera and Satellite Surveillance Radiation Detection Lecture Notes Advances in technology will result in continued and increased reliance on punishment and control from a distance: Electronic monitoring – the use of technology to monitor areas where police or probation and parole can monitor from a distance. Camera systems in high crime areas can help police identify crimes as they happen and identify suspects immediately. Monitoring inmates by releasing them on electronic bracelets reduces the cost of incarcerating a person. Gains in efficiency may result in more offenders placed under stricter control due to cost savings and efficiency. Camera and Satellite surveillance – systems such as the Remote Video Inspection System (RVIS) are used at border crossings. The system transmits images of a driver, vehicle, documents and passengers to an inspector miles away at a main port of entry that is monitored 24 hours a day. Radiation detection – the use of high technology equipment to search for radioactive material, explosives, toxins, chemicals and dangerous biological materials. They include X-ray machines, radiation detection units, and detection devices.
34
Future Technology and Crime
18.2 Future Technology and Crime Augmented Reality Nanotechnology RFID tags Lecture Notes Future advances in technology will result in better surveillance and crime fighting: Augmented Reality (AR) The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces. This is designed to provide visual, audio, and tactile overlays that can give the user critical information about the people he or she is facing and the situation they are involved in. Nanotechnology – engineering and creating useful products on a molecular level to help fight crime. The creation of tiny cameras to transmit video and audio data as well as location, infared and recording technology Radio Frequency Identification Tags (RFID) – tags built with nanotechnology which are undetected by touch or feel but can send radio signals. They can be used in the future by placing them in currency and can record details of transactions.
35
On the Horizon Terrorism Trace-Detection Technology
Radiation-Detection Remote Video Inspection System [RVIS] Augmented Reality Lecture Notes Advances in technology will result in continued and increased reliance on punishment and control from a distance: Electronic monitoring – the use of technology to monitor areas where police or probation and parole can monitor from a distance. Camera systems in high crime areas can help police identify crimes as they happen and identify suspects immediately. Monitoring inmates by releasing them on electronic bracelets reduces the cost of incarcerating a person. Gains in efficiency may result in more offenders placed under stricter control due to cost savings and efficiency. Camera and Satellite surveillance – systems such as the Remote Video Inspection System (RVIS) are used at border crossings. The system transmits images of a driver, vehicle, documents and passengers to an inspector miles away at a main port of entry that is monitored 24 hours a day. Radiation detection – the use of high technology equipment to search for radioactive material, explosives, toxins, chemicals and dangerous biological materials. They include X-ray machines, radiation detection units, and detection devices. Future advances in technology will result in better surveillance and crime fighting: Augmented Reality (AR) The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces. This is designed to provide visual, audio, and tactile overlays that can give the user critical information about the people he or she is facing and the situation they are involved in. Nanotechnology – engineering and creating useful products on a molecular level to help fight crime. The creation of tiny cameras to transmit video and audio data as well as location, infared and recording technology Radio Frequency Identification Tags (RFID) – tags built with nanotechnology which are undetected by touch or feel but can send radio signals. They can be used in the future by placing them in currency and can record details of transactions.
36
Problems in Implementing New Technologies
Speed to adapt “Supersleuth” Capabilities
37
Prosecution of Computer and High-Technology Crime
Protected Computer Specific State Procedures to Prosecute
38
2. What “tells” does Dr. Lightman use to determine the terrorist?
Lie to Me S1E13 1. What event occurred? 2. What “tells” does Dr. Lightman use to determine the terrorist? 3. What one thing made the difference? 4. How did you develop a better understanding of this technique?
39
Closure Topic: Online Database
Should photographs and personal information of criminals in a nearby area be released to the public? Why / Why not. Explain your reasoning.
40
Criminal Justice Today
Chapter 18 Technology & Individual Rights Crime & Justice, Waxer 5/19/2017
41
Learning Objectives After this lecture, you should be able to complete the following Learning Outcomes 18.2 Describe the current and likely future roles of technology in both crime and in the fight against crime.
42
Do Now Topic: Criminal Rights
What kinds of rights, if any, should convicted criminals lose?
43
Electronic Monitoring Camera and Satellite Surveillance
18.2 Technology today Electronic Monitoring Camera and Satellite Surveillance Radiation Detection Lecture Notes Advances in technology will result in continued and increased reliance on punishment and control from a distance: Electronic monitoring – the use of technology to monitor areas where police or probation and parole can monitor from a distance. Camera systems in high crime areas can help police identify crimes as they happen and identify suspects immediately. Monitoring inmates by releasing them on electronic bracelets reduces the cost of incarcerating a person. Gains in efficiency may result in more offenders placed under stricter control due to cost savings and efficiency. Camera and Satellite surveillance – systems such as the Remote Video Inspection System (RVIS) are used at border crossings. The system transmits images of a driver, vehicle, documents and passengers to an inspector miles away at a main port of entry that is monitored 24 hours a day. Radiation detection – the use of high technology equipment to search for radioactive material, explosives, toxins, chemicals and dangerous biological materials. They include X-ray machines, radiation detection units, and detection devices.
44
Future Technology and Crime
18.2 Future Technology and Crime Augmented Reality Nanotechnology RFID tags Lecture Notes Future advances in technology will result in better surveillance and crime fighting: Augmented Reality (AR) The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces. This is designed to provide visual, audio, and tactile overlays that can give the user critical information about the people he or she is facing and the situation they are involved in. Nanotechnology – engineering and creating useful products on a molecular level to help fight crime. The creation of tiny cameras to transmit video and audio data as well as location, infared and recording technology Radio Frequency Identification Tags (RFID) – tags built with nanotechnology which are undetected by touch or feel but can send radio signals. They can be used in the future by placing them in currency and can record details of transactions.
45
Security Identity Management
Identity Theft Identity Management Smart Cards Lecture Notes Advances in technology will result in continued and increased reliance on punishment and control from a distance: Electronic monitoring – the use of technology to monitor areas where police or probation and parole can monitor from a distance. Camera systems in high crime areas can help police identify crimes as they happen and identify suspects immediately. Monitoring inmates by releasing them on electronic bracelets reduces the cost of incarcerating a person. Gains in efficiency may result in more offenders placed under stricter control due to cost savings and efficiency. Camera and Satellite surveillance – systems such as the Remote Video Inspection System (RVIS) are used at border crossings. The system transmits images of a driver, vehicle, documents and passengers to an inspector miles away at a main port of entry that is monitored 24 hours a day. Radiation detection – the use of high technology equipment to search for radioactive material, explosives, toxins, chemicals and dangerous biological materials. They include X-ray machines, radiation detection units, and detection devices. Future advances in technology will result in better surveillance and crime fighting: Augmented Reality (AR) The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces. This is designed to provide visual, audio, and tactile overlays that can give the user critical information about the people he or she is facing and the situation they are involved in. Nanotechnology – engineering and creating useful products on a molecular level to help fight crime. The creation of tiny cameras to transmit video and audio data as well as location, infared and recording technology Radio Frequency Identification Tags (RFID) – tags built with nanotechnology which are undetected by touch or feel but can send radio signals. They can be used in the future by placing them in currency and can record details of transactions.
46
Technology and Individual Rights
Brief History Connection to the 2nd Amendment Connection to the 4th Amendment
47
2. What “tells” does Dr. Lightman use to determine the terrorist?
Lie to Me S1E13 1. What event occurred? 2. What “tells” does Dr. Lightman use to determine the terrorist? 3. What one thing made the difference? 4. How did you develop a better understanding of this technique?
48
Closure Topic: Online Database
Should photographs and personal information of criminals in a nearby area be released to the public? Why / Why not. Explain your reasoning.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.