StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How the Police Access Data to Obtain Criminal Information - Assignment Example

Cite this document
Summary
POME Police Operations in the Modern Era Police Operations in the Modern Era Police work for me had just been a fantasy, a feat performed by handsome men and women in action-packed dramas…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
How the Police Access Data to Obtain Criminal Information
Read Text Preview

Extract of sample "How the Police Access Data to Obtain Criminal Information"

POME Police Operations in the Modern Era and Section # of Police Operations in the Modern Era Police work for me had just been a fantasy, a feat performed by handsome men and women in action-packed dramas. Little did I know that those action packed dramas are full of real life scenarios used by the actual police patrolling our neighborhoods. I didn’t stumble across this information but had to do some research after my uncle got apprehended right in front of me when he was driving me to a baseball game last summer.

He lives in California and was visiting us in Miami for a break from his work, about which we knew nothing about. It was a cool evening and we being late for the opening pitch, uncle Bobby was driving way over the speed limit when a police patrol car appeared from nowhere and told us to pull over which we did. My uncle told me to stay in the car while he went out to talk to this big cop. After a few moments the cop reached for his radio and mumbled something into it. After a few minutes to my horror he handcuffed my uncle, checked my license and told me to drive home, just after he told me that my uncle had a warrant out in California.

Research How did a cop of MPD know about outstanding warrants in California? I got intrigued and started looking for answers. I came up with a few observations about the digital media and its integration with the modern police force. Firstly, my uncle had previous criminal record in California. Therefore the police Record Management System (RMS) in California had every piece of personal information of an offender in there state properly indexed and catalogued (Raymond, 2005). So now comes the query that even if a criminal has outstanding warrants and all sorts of records in the state of California, how a trooper retrieved that information on a highway from his car through a wireless radio.

The answer to this lies in the Central Justice Information System, National Incident Base Reporting System and Uniform Crime Reporting Program. Now the way the trooper in his car used his radio to gather information about uncle Bobby can just be speculated using the information available to us on the internet. The trooper radioed dispatch and told him the name of my uncle and his social service number; in turn the dispatch operator forwarded that information to the regional data base operator who checked the person’s name and his social security number for a nation-wide search through the NCIC 2000 (Raymond, 2005).

The results that came back were a positive match for a person (uncle bobby), who had outstanding warrants in a different state on the U.S. My uncle being apprehended is a prime example on the fast processing systems, data base searching and fast paced communication devices available commercially. The charges that were brought down against my uncle were several over speeding, driving with an expired license, Conclusion The conclusion hence can be an interesting one keeping in mind the hands on experience of the apprehension of Mr.

Bob Swagger. First of all, gone are the days when criminals can commit crime in any state and then ride out into the sun on horses with their loots because there will always be your picture on the wanted posters in the next state or in the next. The local sheriff, now the local trooper, will always have a tech savvy partner on the other side of the radio telling him about the crimes committed by the person in question. Details as deep as their weight is just click away now. Even if the crime was committed ages ago or miles away the digital hand of the law is and always be just behind you backed with the rapidly enhancing technology advancements.

References Book Foster, Raymond. E. (2005). Police Technology. U.S.A: Prentice Hall. Website Criminal lawyers. Experienced Criminal Lawyers. Retrieved March 20, 2011, from www.experiencedcriminallawyers.com Federal Bureau of Investigation. FBI, Information Access Division. Retrieved March 20, 2011, from www.fbi.gov Western Identification Network. Retrieved March 20, 2011, from www.winid.org

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“How the Police Access Data to Obtain Criminal Information Assignment”, n.d.)
Retrieved from https://studentshare.org/other/1412583-how-the-police-access-data-to-obtain-criminal
(How the Police Access Data to Obtain Criminal Information Assignment)
https://studentshare.org/other/1412583-how-the-police-access-data-to-obtain-criminal.
“How the Police Access Data to Obtain Criminal Information Assignment”, n.d. https://studentshare.org/other/1412583-how-the-police-access-data-to-obtain-criminal.
  • Cited: 0 times

CHECK THESE SAMPLES OF How the Police Access Data to Obtain Criminal Information

Identity Theft and Identity Fraud

The intention of such a fraud is to obtain unauthorized funds from an account or receive goods without paying.... hellip; The author states that the term 'identity theft' focuses on the act of obtaining personal information required for perpetrating impersonation.... Credit card fraud begins with either compromise of the account information or theft of the physical card.... Nowadays many websites which contain card information such as name of the card holder, account number, expiration date and verification code etc....
9 Pages (2250 words) Essay

UK Data Natiional Security

Development of Any Case Law, With Regards To Data Security and Breaches Posed By information Leaks Etc, that is, as far as the Introduction of ID Cards and the Storage of Such Personal Data and the Ethical Implications Surrounding this 20 The effect of storing the data in such… Lost laptop case).... They require information regarding the recipients of their services.... This information is retained by governmental bodies1.... Nevertheless, this information can also be retrieved by criminals to steal identities for fraudulent purposes....
48 Pages (12000 words) Essay

Computer Forensics Challenges

The exception is if the police could justify obtaining a warrant to search the computer for records of embezzlement.... The Fourth Amendment interposes a magistrate as an impartial arbiter between the defendant and the police.... The warrant thus gives the police only a limited right to violate a citizen's privacy.... If the police exceed that limited right, or if a warrant is required, but the police have not first obtained...
26 Pages (6500 words) Essay

Role of Contemporary Digital Media in Criminal Investigations

For example, Police officers have therefore also turned to digital technologies to obtain information and evidence against criminals.... Digital evidence refers to any information or data considered to be of value in a criminal investigation.... Retrieval of information takes place when the gadgets remains seized, examined and analyzed.... The information also quickly crosses jurisdictional borders.... The evidence thus requires skilled personnel to decode the information....
11 Pages (2750 words) Research Paper

Digital Forensic

The following paper under the title "Digital Forensic" concerns the function of digital forensic data.... nbsp;… Examining forensic data using write-blocker involves a critical NCFS 5-step validation process to test the write protection device.... It has numerous ingest modules that are inbuilt to foster forensic data analysis....
20 Pages (5000 words) Coursework

Impact of Work Place Technology

It is believed that with the help of ICT inclusion in the operational activities of the UK police, the organization will be able to obtain greater flexibility in terms of its flow of information and thereby, assist the department to implement necessary actions in order to ensure the safety of the society.... The study will further attempt to identify the strategies adopted by the UK police when utilizing ICT in order to obtain necessary information.... However, in order to obtain primary sources it is necessary to conduct a face-to-face interaction with the police department officials where various types of security related issues can be identified in terms of limited accessibility to in-depth data owing to confidentiality....
6 Pages (1500 words) Research Paper

The Key Principles of Cyber Forensics

These personnel should consult the prosecuting attorney in order to obtain the appropriate jurisdiction authority so that they ensure that they have the proper legal authority of seizing digital evidence at the crime scene.... Modern technology is providing numerous opportunities for criminals whereby today the police frequently chronicle criminal's application of computerized technology to commit variety of economic crimes and crimes involving malicious destruction of other people's properties....
17 Pages (4250 words) Essay

Identity Theft in the United Kingdom

Using these elements of a person's identity, it becomes very easy to obtain other personal details from other sources.... In addition, identity theft is pretending to be someone else by assuming his/her personal information such as driving license number, social security number, account information as well as financial cards in order to fraudulently access his/her resources, credit, loans, health services, rentals and mortgages as well as employment (Biegelman 2009)....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us