Technology and communication

Technology and communication in the criminal justice system can become very difficult from time to time. The criminal justice field is continuously improving this progress of technology used today. New and improved technology is introduced to departments all around the world to help criminal justice professionals communicate effectively in interviews and interrogations.
In interrogations and interviews, criminal justice professional goals are to gather the facts; find the truth; and obtain a confession.  Most of the time criminals will lie to the individual interrogating or interviewing him or her.  Brain imaging has been used to identify tell-tale activity linked to lying, violent behavior, and racial prejudice. Advanced systems are currently being worked on by scientist that can read complex thoughts, which will pick them up before the person is conscious of it. Brain imaging may be able to spot people who plan to commit crimes before he or she acts on them.

Facial Recognition is software that is used in order to identify an individual facial and it is stored into a data base.   Normally, facial recognition works with numeric codes that are known as face prints.   There are some benefits when it comes to facial recognition; it allows an individual image to be viewed and stored into the database.  It focuses on many features on the individual’s face, such as, nose, mouth, eyes, and cheek bones; which measures are variables of a person’s face.  The length or width of the nose, the depth of the eye sockets, and the shape of the cheek bones are used for identification of the person; these systems work by capturing data for nodal points on a digital image of an individual’s face and storing the resulting into the data base as a facial prints. The facial prints can then be used as a basis for comparison with data captured from faces in an image or video.  These systems are used for security purposes. Facial Recognition can also be used in smart phone applications, as well as, social networking. Research states that on an Apple I phone, a picture can be taken of any individual and within a split second, information such as a name and other important information can be provided. If the lighting and facing are off by any chances there can be a problem with the system. There are four main facial recognitions: neural network, automatic face processing, feature analysis, and elgenfaces.  Facial recognition can be used for surveillance purposes which makes them different from other biometric techniques. This helps with catching those individuals who are wanted for crime, children that are missing, and those who are suspected as terrorist acts.  No one will ever have any idea they are being scanned for facial recognition because it can be done so far away.  In March 2003, the (NIST) National Institute of Standards and Technology released a report showing facial recognition technology. Biometrics can have mistakes such as a male can be identified better than a female, and the older generation rather than the younger generation.  Some cases personal data and information can often be abused.

There is the AGIS which is known as, The Automated Fingerprint Identification System. This system stores fingerprints in code format in computers that allows someone to recover an individual’s fingerprint. This allows the investigating officers to use this system method to prove an individual’s involvement by providing their fingerprints which will show if they were involved or not with the crime.  Previously, fingerprinting service depended on a technician to manually inspect a set of fingerprints and compare those results with the individual information and their fingerprints for comparison.  Those results with the individual information and their fingerprints were a slower process than computerized systems were used today for comparing those prints.

The Automated Fingerprint Identification System can be used for different types of searches; whenever completing a background check the individuals fingerprint will identify them by name and any criminal record he or she may have.  Officers have to run these prints through a data base just for fingerprints.  Fingerprints include many different patterns which will match any path of the individual prints that has been recorded in the database.  It is said that no two fingerprints are the same.  The science of fingerprints is over 100 years old. This is normally how suspects are identified of any crime due to the evidence that was left behind. DNA technology helps forensic investigators to make a rapid decision at the crime scene. There are two choices that investigators must decide whether to use DNA or fingerprints at the crime scene.

With technology there can sometimes be incorrect conclusions given such as “In 2006, Itiel Dror, of Southampton University, performed a test in which he gave fingerprint evidence to experts from around the world. Each examiner was given eight cases to investigate. However, Dror did not tell them that these were the same cases they had previously rendered judgment on. The second time around, only two of the eight examiners reached the same conclusion in each of their eight cases. Among the other six experts, in six of the 32 cases, the same examiners reached a different conclusion the second time they evaluated the evidence.”(Williams).

These electronic fingerprints are used to identify any person or persons who may have information that was entered in the database for fingerprinting; either manually their finger prints or scanned electronically into its database.  Any prior information and up to date information will be provided. If there is no prior information then he or she will not be found. When criminal background checks are completed any records appear in the data base once the prints are scanned into the system. If for any reason he or she is arrested on more than one occasion, those fingerprints will be entered into the database allowing any criminal activity to be kept track of.  Prior criminal arrest or charges maybe viewed when a criminal background check is ran.

Computer technology has become a great access to the criminal justice system because it allows them to have the necessary information compiled into the data base.  Fingerprinting is keep in the database and each time a criminal act arises; once the investigator has lifted finger prints they will be able to compare the prints from the data base.  Finger prints are used for many things, such as, background checks, working with children, and etc.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

www.commonwealinstitute.org/archieve/pros-and cons-of-biometric-technologies

http://www.ehow.com/info_8698322_fingerprint-made-using-afis-system

Williams,Terry (unknown year ) Negative-effects-fingerprint-analysis

 

 

 

 

Leave a Reply