Download presentation
Presentation is loading. Please wait.
Published byWarren Underwood Modified over 9 years ago
1
Unit Nine New Technology Joe Minella
2
Unit 9 assignments Unit 9 quiz Unit 9 seminar Unit 9 discussion question Unit 9 project paper CLASS WILL END JAN 24 TH 7 DAYS FROM TODAY- TIME IS CRUCIAL
3
Final Project Write a 3-5 page paper Identify the most useful and beneficial emergent or currently applied technology that will aid law enforcement Discuss in detail at least three(3) technologies and explain their applied value to police agencies Include how the technology is used or applied in the field and the benefit Fully explain the usefulness in their application and benefit to law enforcement Cite all sources of information in detail
4
Video Time Open a new Explorer window Copy the following web address: http://www.youtube.com/watch?v= WA5Gy32aqdo Paste the web address into the new explorer window and watch the video Return to class when finished
5
License Plate Scanner License Plate Scanner License plate scanner Can read and record up to 3,500 plates per hour while on patrol Can log plates at crime scenes Used for stolen cars, amber alerts, terrorism, wanted persons Placed at high traffic areas-airports Employers use the same technology
6
Voice Translation Device Language barriers are a big issue for police today on the street Devices use true speech recognition software that perform phonetic matching similar to Dragon Speech translates English to several common languages Improve officer safety and trust during citizen encounters
7
Wireless Mesh Networking Wireless mesh networks often consist of mesh clients, mesh routers and gateways [1]. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to and from the gateways which may but need not connect to the Internet. The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy.[1]
8
Breathalyzer A preliminary non- evidentiary screening device can be approved by some as an approved screening device, and an evidentiary breath instrument can be similarly designated as an approved instrument. Establish Probable Cause
9
Registered Sex Offenders More than 500,000 in US 100,000 just vanish Most states have their own web sites to track offenders Can check zip codes Locate number of registered offenders in your community
10
GIS Tracking D/V These ankle devices are very effective and are very popular across the U.S. If removed a alarm is activated Must stay within 100 feet of home phone line Removal leads to mandatory incarceration.
11
Voice Stress Analysis Software cost $10,000 Loaded to Labtop Subject talks into the computer No studies have been conducted with this new technology Good Science or just “bunk”
12
Immigration Money Transfer Average cost $1,000 per person They prefer Western Union Transfer All transfer now of $750 or more will set off the alrams Money found to be associated with trafficking is seized and then used to pay for more investigations.
13
Biometrics Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, biometrics is used as a form of identity access management and access control. Scan large groups in crowds or casinos Facial recognition software
14
Biometrics Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely replaced retina, and odor/scent.
15
Automated Fingerprint System The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data. The AFIS was originally used by the U.S. Federal Bureau of Investigation (FBI) in criminal cases. Lately, it has gained favor for general identification and fraud prevention.biometric
16
Gang Intelligence Systems Gangs pose a serious threat to public safety throughout the United States. Gang membership and gang-related criminal activity has increased over the past 10 years, and gang violence is making increased demands on law enforcement resources in many communities. Experts predict that these trends will continue as gang-operated criminal networks expand. As of September 2008, there were an estimated 1 million gang members – an increase of 200,000 since 2005 – belonging to over 20,000 gangs that were criminally active within the United States.
17
Cybercrime Refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. computernetworkcrime Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child groominghackingcopyright infringementchild pornographychild grooming
18
Remember Hello Class, I want to remind you that I am here to assist you with any questions you have about the class. Feel free to contact me via email csmith4@kaplan.edu, or via aim SirCharles4718 during office hours Thursday 9:00 – 10:00 PM EST or by using my virtual office. If necessary, we can arrange for a phone conference. My Aim is never shut off.
19
The End Ladies & Gentlemen it’s been a great journey I hope you enjoyed the trip It’s been an honor to be your instructor I will enter grades until they close my grade book Stay focused & Stay Safe
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.