Upload
harva
View
38
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Computer Technology in Law Enforcement. Eileen and Tom Edwin 29 November 2006. Investigation Technology. Technology. Modern police cruisers contain the following equipment: Laptops Radar (Radio Detection And Ranging) Radio/ Scanners Video Cameras. Laptops. - PowerPoint PPT Presentation
Citation preview
Computer Technology Computer Technology in Law Enforcementin Law Enforcement
Eileen and TomEileen and Tom
EdwinEdwin
29 November 200629 November 2006
Investigation Investigation TechnologyTechnology
TechnologyTechnology
►Modern police cruisers contain the following Modern police cruisers contain the following equipment:equipment: LaptopsLaptops Radar (Radio Detection And Ranging)Radar (Radio Detection And Ranging) Radio/ ScannersRadio/ Scanners Video CamerasVideo Cameras
LaptopsLaptops
►Allow officers to type reports, saves time. Allow officers to type reports, saves time. ►Can save reports to flash drives and print later.Can save reports to flash drives and print later.►Transfer info from computer directly to database Transfer info from computer directly to database
with flash drives. with flash drives. ►Will eventually allow officers to receive calls Will eventually allow officers to receive calls
through wireless networks and as well access through wireless networks and as well access information like license plates and images such information like license plates and images such as mug shotsas mug shots. .
Radar Radar
►Radio Detection And RangingRadio Detection And Ranging►Remote sensor that gives off electromagnetic Remote sensor that gives off electromagnetic
waves ( radio, microwaves and light) and uses waves ( radio, microwaves and light) and uses these waves to measure presence, location and these waves to measure presence, location and motion. motion.
►Used to monitor on coming and receding traffic Used to monitor on coming and receding traffic by police officers. by police officers.
Radio/ScannersRadio/Scanners► Transmit and receive Federal Government assigned frequencies in Transmit and receive Federal Government assigned frequencies in
Vhf and Uhf frequencies above standard broadcast FM stations of Vhf and Uhf frequencies above standard broadcast FM stations of the radio spectrum and can’t be heard on standard car or home the radio spectrum and can’t be heard on standard car or home radio.radio.
► Most frequencies are used by Public Safety (Police, Ambulance and Most frequencies are used by Public Safety (Police, Ambulance and Rescue crews)Rescue crews)
► Two types of scanners portable (handheld) and table ( found in cars)Two types of scanners portable (handheld) and table ( found in cars)► Frequent usersFrequent users
Public Safety, News Media, Home & Personal Security, Public Safety, News Media, Home & Personal Security, Corporate Security, Neighborhood Watch, Radio Hobbyists, Corporate Security, Neighborhood Watch, Radio Hobbyists,
Public Buildings, Hospital and School Security.Public Buildings, Hospital and School Security.
Video CamerasVideo Cameras
►Recently installed in patrol carsRecently installed in patrol cars►Used to monitor work done by officersUsed to monitor work done by officers►Used to show how arrests are made Used to show how arrests are made
Investigation Programs Investigation Programs
►Pattern RecognitionPattern Recognition►Investigative Investigative Information Management Information Management System (I2MS)System (I2MS)
Pattern RecognitionPattern Recognition
►Finding patterns concerning the locations Finding patterns concerning the locations of the crimes.of the crimes.
►Tries to recognize and predict patterns of Tries to recognize and predict patterns of illegal behavior. illegal behavior.
I2MSI2MS►Developed by CSC for Air force Office of Developed by CSC for Air force Office of
Special Investigation ( AFOSI).Special Investigation ( AFOSI). Focuses on criminal investigations and Focuses on criminal investigations and
counterintelligence in Air Force. counterintelligence in Air Force. enables agents to view recently entered information enables agents to view recently entered information
from half way around the world.from half way around the world. has the ability to record data from arrests, track has the ability to record data from arrests, track
location of gathered evidence, and store images like location of gathered evidence, and store images like maps, fingerprints and other electronic documents. maps, fingerprints and other electronic documents.
Internet and Computer CrimeInternet and Computer Crime
Types of Computer and Internet Types of Computer and Internet CrimeCrime
Computer as Computer as InstrumentInstrument
Includes:Includes:► EmbezzlementEmbezzlement► FraudFraud► LarcenyLarceny
Computer as ObjectComputer as Object
Includes:Includes:► TheftTheft► VirusesViruses
Electronic FingerprintElectronic Fingerprint
Tracking what a person does on a Tracking what a person does on a computer via memory and history --computer via memory and history --
Is called an electronic fingerprintIs called an electronic fingerprint
MemoryMemory
► CacheCache► RAMRAM►Hard Disk DriveHard Disk Drive► Any other memoryAny other memory
HistoryHistory
Check internet history on browser –Check internet history on browser –
Can clear by holding CTRL + H keys Can clear by holding CTRL + H keys (though it should be known that (though it should be known that
nothing nothing is ever permanently deleted is ever permanently deleted from a computer)from a computer)
TerrorismTerrorism
Hugely aided by computer technologyHugely aided by computer technology
CryptologyCryptology
Definition: The branch of science that Definition: The branch of science that deals with secret communications deals with secret communications
using codes and ciphersusing codes and ciphers
Code – the use of symbols to represent Code – the use of symbols to represent numbers, letters, or wordsnumbers, letters, or words
Cipher – system of representing letters Cipher – system of representing letters with other letters to form imageswith other letters to form images
CodesCodes
►Can stand for words or lettersCan stand for words or letters►Tell location in pages and sections of Tell location in pages and sections of
book where word is foundbook where word is found
Example: Morse code Example: Morse code
*Decoding takes a long time*Decoding takes a long time
CiphersCiphers
Substitution CipherSubstitution Cipher
So “Meet you at the corner” looks like:So “Meet you at the corner” looks like:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
NMZAYBXCWDVEUFTGSHRIQJPKOL
UYYI OTQ NI ICY ZTHFYH
Columnar TranspositionColumnar Transposition
Message is: “Meet you at the corner”Message is: “Meet you at the corner”
Looks like: Looks like:
MEETYMEETY
OUATTOUATT
HECORHECOR
NERXXNERXX
Code looks like: MOHN EUEE EACR TTOX Code looks like: MOHN EUEE EACR TTOX YTRXYTRX
(read from top to bottom, left to right)(read from top to bottom, left to right)
How Do Computers Fit into How Do Computers Fit into Cryptology?Cryptology?
►Easier to createEasier to create►Easier to decryptEasier to decrypt►Easier to breakEasier to break
* “So far, it is far easier for a computer * “So far, it is far easier for a computer to encrypt a message than to break it”to encrypt a message than to break it”
StenographyStenography
Definition: hiding files in plain view Definition: hiding files in plain view using encryptionusing encryption
Hiding text within text, images within Hiding text within text, images within images, and text within images or vice images, and text within images or vice
versaversa
Without embedded textWithout embedded text With embedded textWith embedded text
Capturing PedophilesCapturing Pedophiles
► Join same networks Join same networks and groupsand groups
► Create profilesCreate profiles► InteractInteract► Set up meetingSet up meeting► Finally catch themFinally catch them
Other MethodsOther Methods
►Tapping IP addressesTapping IP addresses► Installing keylogging Installing keylogging
hardware/softwarehardware/software►SkimmersSkimmers►SniffersSniffers
Forensic TechnologyForensic Technology
DefinitionDefinition
►Forensics is the method of gathering Forensics is the method of gathering and analyzing evidence and and analyzing evidence and information at a crime scene.information at a crime scene.
Forensics HistoryForensics History
►1598 – Fortunatus Fidelis is credited as 1598 – Fortunatus Fidelis is credited as being the first person to us modern being the first person to us modern forensic science.forensic science.
►Early 1800’s – forensic science becomes Early 1800’s – forensic science becomes an accepted branch of medicine.an accepted branch of medicine.
►1921 – John Larson creates the first 1921 – John Larson creates the first successful lie detector.successful lie detector.
►1923 – First police department crime 1923 – First police department crime laboratory established in the U.S.laboratory established in the U.S.
Forensics HistoryForensics History
►1924 – Larson’s lie detector becomes 1924 – Larson’s lie detector becomes widely used in police interrogations widely used in police interrogations around the country.around the country.
►1932 – FBI creates national crime 1932 – FBI creates national crime laboratory.laboratory.
►1948 – American Academy of Forensic 1948 – American Academy of Forensic Science is established.Science is established.
►1967 – FBI creates National Crime 1967 – FBI creates National Crime Information Center.Information Center.
Modern Forensic ScienceModern Forensic Science
►Every year new updates are seen that Every year new updates are seen that push the boundaries of forensic push the boundaries of forensic sciencescience
►Newer and newer technologies are Newer and newer technologies are creating better possibilities for creating better possibilities for investigators around the country.investigators around the country.
National Virtual Translation National Virtual Translation CenterCenter
►Center established in early 2000 to Center established in early 2000 to help investigators with international help investigators with international cases.cases.
► Instantly translate documents and Instantly translate documents and intelligence in over a dozen languages.intelligence in over a dozen languages.
►Helps investigators with international Helps investigators with international cases and suspects.cases and suspects.
Stable Isotope Ratio Mass Stable Isotope Ratio Mass SpectrometrySpectrometry
►New method of New method of substance testing.substance testing.
► Testing using this Testing using this method will allow method will allow investigators to see if investigators to see if two substances came two substances came from the same source.from the same source.
► Allows for much more Allows for much more accurate testing in accurate testing in criminal investigations.criminal investigations.
Mitochondrial DNA AnalysisMitochondrial DNA Analysis
►A new type of DNA A new type of DNA testing that allows testing that allows for a much more for a much more accurate suspect accurate suspect pool.pool.
►Usually limits your Usually limits your suspect pool to a suspect pool to a certain family or certain family or bloodline.bloodline.
Regional Computer Forensic Regional Computer Forensic LaboratoriesLaboratories
►These laboratories are used to detect These laboratories are used to detect evidence of computer crime.evidence of computer crime.
►Can scan any electronic device.Can scan any electronic device.►There are now several around the There are now several around the
country for easy access.country for easy access.
DatabasesDatabases►CODIS – Combined DNA Index SystemCODIS – Combined DNA Index System
Created by FBI in early 1990s, as a blending of Created by FBI in early 1990s, as a blending of forensic science and computer technology.forensic science and computer technology.
Has 3 levels (local, state, National)Has 3 levels (local, state, National) Allows laboratories participating in the Allows laboratories participating in the
program to compare and exchange information program to compare and exchange information on national level. on national level.
As of Sept. 2006 has produced 36,800 hits and As of Sept. 2006 has produced 36,800 hits and assisted in 39,200 investigations nationwide.assisted in 39,200 investigations nationwide.
CODISCODIS
►CODIS is the Combined DNA Index CODIS is the Combined DNA Index System.System.
►Any law enforcement agency can put Any law enforcement agency can put DNA into the national database.DNA into the national database.
►Other agencies can then access the Other agencies can then access the DNA sequences to see if they match any DNA sequences to see if they match any current suspects.current suspects.
►Allows for easy access to scanning Allows for easy access to scanning suspect’s DNA for a match to crimes.suspect’s DNA for a match to crimes.
SurveillanceSurveillance
CarCar
►Discreetly follow Discreetly follow suspectsuspect
►Observe actionsObserve actions
Audio and Video RecordingAudio and Video Recording
►Warrant for Warrant for installationinstallation
► If fails, equipment in If fails, equipment in moving vehiclesmoving vehicles
*Technologies have *Technologies have constantly been constantly been changing and changing and updating – less visible updating – less visible and more powerfuland more powerful
Thermal imagingThermal imaging
► Capturing infrared Capturing infrared light emitted by light emitted by objects to form imagesobjects to form images
► The cooler the object, The cooler the object, the less clear the the less clear the image will beimage will be
►Good for moonless, Good for moonless, cloudy nightscloudy nights
►Disturbances in Disturbances in groundground
► Changes to wallsChanges to walls
Image EnhancementImage Enhancement
► ““Night vision”Night vision”► Captures the little Captures the little
amount of light amount of light available and uses it available and uses it to for imagesto for images
►More commonly More commonly used than thermal used than thermal imagingimaging
Gait RecognitionGait Recognition
►Computer visionComputer vision►Traditional radar systemTraditional radar system
“ “ The ultimate goal is detect, classify, and The ultimate goal is detect, classify, and identify humans at distances up to 500 identify humans at distances up to 500 feet away under day or night, all-weather feet away under day or night, all-weather conditions”conditions”
Identify a person based on the way they Identify a person based on the way they walkwalk
*Please note that computer technology in law enforcement encompasses a vast and broad range of technology. Furthermore, some of this new technology is not released to the public due to security and effectiveness issues. The technologies described are only some of the equipment and methods used by law enforcement today. It is unquestionable that new technologies will be created to help law enforcement fight crime. Future law enforcement personnel will undoubtedly encounter technology not even mentioned in this presentation.