Download presentation
Presentation is loading. Please wait.
Published byAlisha Daniel Modified over 9 years ago
1
Unit Nine New Technology Prof. Ruth Ronan
2
Reminder Hello Class, I want to remind you that I am here to assist you with any questions you have about the class. Feel free to contact me via email rronan@kaplan.edu, or via aim Ronankaplan during office hours Tuesday 4:00 – 5:00 PM EST or Thursday 5:15-6:15 PM EST by using my virtual office. If necessary, we can arrange for a phone conference.
3
Welcome Please do not forget to review your grade sheet and submit any missing assignments. Please email me when you do and I will grade them. Missing seminar papers are to be submitted in doc sharing.
4
Unit 9 Read Chapter 14 & 15 Key Terms Seminar Discussion Board Quiz Final Essay Exam Visit Take a Break
5
Questions…. Are there any questions about what we have covered so far in class? Anything anyone would like to ask me? About Law Enforcement? Or something else..?
6
New Technologies for Law Enforcement What are some of the new technologies out there?
7
Portable Breathalyzer Device (PBT) A preliminary non- evidentiary screening device can be approved by some as an approved screening device, and an evidentiary breath instrument can be similarly designated as an approved instrument. approved screening deviceapproved instrument Establish Probable Cause
8
Registered Sex Offenders More than 500,000 in US 100,000 just vanish Most states have their own web sites to track offenders Can check zip codes Locate number of registered offenders in your community
9
GIS Tracking These ankle devices are very effective and are very popular across the U.S. If removed a alarm is activated Must stay within 100 feet of home phone line Removal leads to mandatory incarceration.
10
Biometrics Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.intrinsictraits computer scienceidentity access managementaccess controlsurveillance
11
Biometrics Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely replaced retina, and odor/scent.fingerprintface recognitionDNAPalm printiris recognitionretina
12
Less Lethal Weapons The quest continues for complete noncontroversial and effective alternatives to deadly or lethal force. Some day there may be a weapon that can completely replace the firearm. Time will tell
13
The Taser The taser emits a large electric charge that will stop most offenders. However it has also killed individuals and in some cases also led to excessive use of force. It is computer equipped.
14
Bean Bag Shotgun Another very effective and usually a non- deadly weapon. Used in 12 gauge shortguns It can break bones
15
Mace or CR Gas A chemical compound that irritates the eyes to cause tears, pain, and even temporary blindness) that is used in riot control, crowd control, and personal self-defense,riot controlcrowd control self-defense
16
Crime Mapping Is used by analysts in law enforcement agencies to map, visualize, and analyze crime incident patterns. It is a key component of crime analysis and the CompStat policing strategy. Mapping crime, using Geographic Information Systems (GIS), allows crime analysts to identify crime hot spots, along with other trends and patterns.law enforcement agenciescrime analysisCompStatGeographic Information Systems
17
Geographic Profiling Is a criminal investigative methodology that analyzes the locations of a connected series of crimes to determine the most probable area of offender residence. Typically used in cases of serial murder or rape (but also arson, bombing, robbery, and other crimes), the technique helps police detectives prioritize information in large-scale major crime investigations that often involve hundreds or thousands of suspects and tips.serial murder
18
DNA Is a technique employed by forensic scientists to assist in the identification of individuals on the basis of their respective DNA profiles.forensic scientistsDNA Although 99.9% of human DNA sequences are the same in every person, enough of the DNA is different to distinguish one individual from another
19
Automated Fingerprint System The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data. The AFIS was originally used by the U.S. Federal Bureau of Investigation (FBI) in criminal cases. Lately, it has gained favor for general identification and fraud prevention.biometric
20
FATS System Firearms Training Systems provides digital technology and laser-emitting weapons to provide realistic weapons training to law enforcement, military, and security personnel in the US and overseas. The training systems integrate video and digitized imagery with laser-emitting firearms that have the look and feel of the real thing -- they even recoil and require loading.
21
Gang Intelligence Systems Gangs pose a serious threat to public safety throughout the United States. Gang membership and gang-related criminal activity has increased over the past 10 years, and gang violence is making increased demands on law enforcement resources in many communities. Experts predict that these trends will continue as gang-operated criminal networks expand. As of September 2008, there were an estimated 1 million gang members – an increase of 200,000 since 2005 – belonging to over 20,000 gangs that were criminally active within the United States.
22
Cybercrime Refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.computer network crime Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child groominghacking copyright infringementchild pornographychild grooming
23
Identity Theft Is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if he or she is held accountable for the perpetrator's actions. Organizations and individuals who are duped or defrauded by the identity thief can also suffer adverse consequences and losses, and to that extent are also victims.fraud
24
Employment You must understand that many departments test quarterly, and some test twice a year regardless if there’s an opening or not. If you pass you’ll simply be placed on an eligibility list for future hire. Other large departments like NYPD, and LAPD test frequently.
25
The Future Most police organizations remain paramilitary, bureaucratic, and reactive. Yet major change has been occurring in many of these organizations, where the chief executive has motivated (and possibly even manipulated) departmental personnel into accepting desired innovations, but some officers will continue to cling to the old ideals and must be brought along with the new methods of thinking and operation.
26
The Future No one knows for certain what the future holds, but one thing is certain: Our society is changing. Police administrators must anticipate and plan for the future; they certainly cannot drive into the twenty-first century with their eyes fixed firmly on the rearview mirror. This is a very exciting and challenging time in the history of police service.
27
Final Project Write a 3-5 page paper (excluding the cover and references page) that responds to the following: New technology represents an important "force multiplier" for police agencies. Recent advances in the arena of high tech gadgetry, software, and hardware may allow police departments to gain critical advances in the areas of response times, productivity, and safety. Police administrators realize that criminals are becoming more sophisticated and, as a result, police agencies must also increase their knowledge and use of technology.
28
Remember Hello Class, I want to remind you that I am here to assist you with any questions you have about the class. Feel free to contact me via email Rronan@kaplan.edu, or via aim Ronankaplan during office hours Tuesday 4- 5pm & Thursday 5:15 – 6:15 PM EST or by using my virtual office. If necessary, we can arrange for a phone conference.
29
Remember Hello Class, I want to remind you that I am here to assist you with any questions you have about the class. Feel free to contact me via email csmith4@kaplan.edu, or via aim SirCharles4718 during office hours Thursday 9:00 – 10:00 PM EST or by using my virtual office. If necessary, we can arrange for a phone conference. My Aim is never shut off.
30
We are at the end Ladies & Gentlemen it’s been a pleasure I hope you enjoyed the class It’s been an honor to be your instructor Email me if you submit late assignments All coursework is due by Feb 22! Stay focused & Safe Keep in touch!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.