Preview

CJA/304: Live Scan, Automated Finger Identification System

Good Essays
Open Document
Open Document
1081 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CJA/304: Live Scan, Automated Finger Identification System
Technology Affects Communication
CJA/304

Technology affects communication capabilities of specialized databases in the criminal justice system by different systems such as Live Scan, Automated Finger Identification System that is also known as AFIS database, and Mobile data terminal. All these systems were created over the recent years and were made with many modern technological features. Live Scan system is the new and improved way to take finger prints of suspect electronically while cutting back on some of the work for officers. With the use of Live Scan Officers no longer have to use the traditional way of taking finger prints by using the black ink and paper ten print card method that was the usually used when doing finger
…show more content…
("Fbi biometric center," 2010). Being that everything now days is done by computer this method is easier and cuts down on the use of paper and time as far as locating old record and information. AFIS Automated Finger Identification System is used nationwide fingerprint and criminal history system, that is used 365 day a year 24 hours a day to help assist local, state, investigator, and federal officer to prevent, solve crimes and catch criminals and protect the nation from terrorist. . ("Fbi biometric center," 2010).
IAFIS is the largest biometric database in the world. This system houses on average more than 70 million criminal files of subject along and around 34 million if not more civil prints. This system has more than 73,000 known terrorist that are suspected terrorist crimes against the United States. ("The fbi: Federal,2008”).
Mobile Data Technology is used to assist all officers’ state, county, federal with solving problems and give them access to records in real time. This technology has the capability to locate and bring up mug shots, map, and a person’s identification and identity. (Security Info Watch,
…show more content…
Mobile Data Technology is connected to live scan these device works effectively together by how they link offenders together by fingerprints. The two device communicate by the information that they both hold these system helps the criminal justice field in many different but when officer are out in the field these systems help with solving a problem in a speedy amount of time. (Security Info Watch, 2010).
In the 1990’s Mobile Data commercial applications begin to appear with devices like pagers, personal digital assistants (PDA), cell phones with text messaging and laptops. Mobile data also started to disappear this was due to companies started offering better packages that could be used not just locally but nationwide. PDA’s Cellular phone and laptop computers are a huge part of the criminal justice system. (Magnuson, 2009).
These devices use has effectively improve communication for authorities and agencies in all field of criminal justice. The simple use of a cellular phone and laptops having the ability to retrieve information at any giving moment and time of the day proves how effective this technology has become and aided with

You May Also Find These Documents Helpful

  • Powerful Essays

    This device is more advanced than the radio frequency device. This device has been used since 1997. The device can be worn on the ankle or wrist but the offender has to carry the transmitter. This device uses the cell phone to transmit the signal to the monitoring center. The signal uses a global positioning satellite, which tracks the offender’s movement throughout the community. This technology allows probation officers to review the offender’s whereabouts as well as shows if the offenders enter a certain restricted area (OPPAGA, 2005, p.…

    • 4421 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    The universal DNA database is important to the law enforcement agencies. The database will help the law enforcement agencies to identify suspects fast. When the universal data base is not used, it is very easy for a criminal to commit a crime and escape. The DNA universal database will improve the crime investigation thereby curbing the menace of criminals. When this takes effect, criminals might be extremely careful not to leave any trace that can help in getting their DNA for identification (Krimsky & Simoncelli, 2011). Nevertheless, the fear of being identified will result into a reduction in crime with many would be criminals staying away from crime. The implementation of the database will be a strong deterrent to first time offenders.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cjs Week 8

    • 1143 Words
    • 5 Pages

    Database technology is a database that has a large amount of information in it. This information includes names, dates, crimes that people have committed, violations, high crime rate areas, and so much more. This information is gathered from many different areas and stored in a database. They have all of this information in one place to make it easier to research people or areas of interest. This information is gathered from the department’s criminal history records system, the gang unit’s intelligence system, and the state’s department of motor vehicles. The computer-aid dispatch is a method that manages calls for service from the public.…

    • 1143 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    This module will examine the importance of criminal data and its effect on the criminal justice system. For instance, is it important for a law enforcement agency to evaluate the crimes occurring in their city or jurisdiction? Is it important for citizens to know how safe is the area in which they live? If so, how is that information gathered and disseminated to the general public? How does the law enforcement component of the criminal justice system use the information to reduce crime or even predict it in the future? With the advent of applicable technology, law enforcement agencies and criminologists are now examining crime patterns, suspect information, as well as date and time of crimes in an effort to predict probable occurrences and locations of future crimes.…

    • 1518 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This paper will explain how technology affects the communication capabilities of specialized databases in the criminal justice system. It will provide the definition, history of these specialized databases and provide the comparison of three different specialized databases, which are: Automatic Fingerprint Identification System (AFIS), Facial Recognition, and Iris Scan. Included in this paper will be the Biometrics that has occurred throughout the years. Then there will the positive and negative effects of the new technologies on communication within the criminal justice system. Finally, I will discuss which new specialized techniques that I might use and why.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Predictive Policing

    • 1479 Words
    • 5 Pages

    In previous and the most recent years, police officers have increased their use of new technologies to become more effective when it comes to reducing crime. The oldest technology that has been used is COMPSTAT formerly known as Computer Statistics. COMPSTAT has been around to implement strategies in law enforcement on stopping crime before it starts. COMPSTAT builds onto the UCR (Uniform Crime Report) to analyze which crime is being mostly committed, the county (or city), which age group and ethnicity is committing those crimes. COMPSTAT relies on human recognition patterns based on past crimes (Goode, 2011).…

    • 1479 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    This type of information is important to the development of new strategies to prevent and control crime; as well as where or what areas the implementation of new changes or new programs are in greater need, and would benefit the most. There is the benefit that new technology can be used to assist with crime prevention and with crime statistical information new technology can be created to assist law enforcement officers in the collection of evidence and with the arrest and conviction of criminals.…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cameras that are smaller and recorded in higher speed are placed in the trunk of police vehicles, it allows police officers to read license plate in real time. Imaging hardware placed in front of the Automatic License Plate Recognition it will capture the image of the license plate.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ballistic Fingerprinting

    • 525 Words
    • 3 Pages

    The impact of ballistic technology has taken crime solving to a whole new level. With a single scan of a bullet into a ballistics database, the original gun fired can be identified within minutes. Once the gun is identified, however, this can give law enforcement officers the lead they will need in order to identify the suspect and further the investigation of the case.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    For over a century fingerprints have been one of the most used tools of forensic science. Fingerprints have been used to identify criminals of small crimes such as petty larceny stretching up the ladder to crimes as serious as those committed by International Terrorists. It has always been thought that no two people in the world have the same fingerprints. In 2004 however, something happened that caused many people to question the reliability of fingerprint identification.…

    • 1085 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Effects of Technology

    • 519 Words
    • 3 Pages

    The digital divide is beginning to close. The flow of digital information – through mobile phones, text messaging, and the Internet – is now reaching the world’s masses, even in the poorest countries, bringing with it a revolution in economics, politics, and society. In my opinion, the technological innovation that has had the greatest impact on our lives in this country today would be the mobile telecommunication technology. For the last ten to fifteen years, mobile phones have changed our lives in such a way that no other technological change has before. Earlier, people used to book telephone calls in advance, had to go and use near the telephone booths, or sit beside a physical telephone instrument kept in the drawing room of a house, and attend to, or make calls stuck to a place. Now, people simply carry a 200 gram device in their pockets and can travel the world, always connected to their loved ones and business partners, no matter in whatever remote part of the world they are. (However, in certain countries, mobile coverage…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Antitheft Switch Essay

    • 660 Words
    • 3 Pages

    The New York Times article, “New York Asks Cellphone Carriers to Explain Why They Rejected Antitheft Switch” addresses the growing trend of cell phone theft in the United States. The article recaps recent steps taken by government, police officials, cell phone carriers, cell phone manufactures, and trade groups in this sector. The concern presented by government and police is that the cell phone industry is not doing enough to prevent these crimes on society. The two largest issues relating to the course are possible actions resulting in tort law and actions implying collusion on behalf of cell phone carriers.…

    • 660 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cable Tv

    • 25824 Words
    • 104 Pages

    When examining the subject area of communications data retention broadly three areas need to be taken into account: a) technological matters, b) social values such as privacy and civil liberties, and c) law enforcement issues (Whitley and Hosein, 2005; Raab and Bennett, 2006). Accordingly this chapter has been divided into three parts; the first part focuses on the role of geographical location within mobile phone technology, the second part discusses the relevant privacy related literature, and the final part of this chapter examines the legal framework relevant to mobile phone location data. Grounded theory methodology has been used to guide collection and analysis of empirical data for this study (for more detail see Chapter 3 - Research Methodology). GT methodology is an inductive method, which means that typically only a very broad review of literature takes place before collecting the data. However in addition to this initial review, the literature is visited again after the data collection has been completed. This study has followed this approach with the benefit that a second review of the literature could be guided by findings from all three empirical data collections - pilot study, interviews and survey. Particularly the development of the final GT categories, which was supported by written and visual memos, has prompted the review of further literature. The literature discussed in this chapter is a result of this iterative process and some literature particularly relevant to the findings from study will be revisited in Chapter 5 and brought into relation to the empirical…

    • 25824 Words
    • 104 Pages
    Powerful Essays