You are on page 1of 16

COMPUTERS IN

LAW
ENFORCEMENT
SEVEN WAYS IN WHICH
COMPUTERS ARE USED IN
LAW ENFORCEMENT
WITH THE STUDENTS OF  HAVE FUN THERE IS A
FORM 2G QUESTION AT THE
END!
CONTEXT
• What are computers in law enforcement? -Ambavani Ramoutar
• Security cameras [CCTV camera systems] -Ayanna Sinanan and Shreya Ramdeo

• Biometric identification systems -Bridget Jailal


• Fingerprinting
-Tareen Rampersad
• Computer-assisted facial image
-Semeera Sookram
identification systems

• Profiling [computer composites] -Amelia Kaisersingh

• Traffic control -Shivana Ramkissoon

• Electronic surveillance -Elena Ramnanan and Ambavani


Ramoutar
WHAT ARE COMPUTERS IN
LAW ENFORCEMENT?
When it comes to fighting crimes, computers are the most
helpful source that law enforcement and officers have.
They help track :
• The whereabouts of a wanted criminal
• Where they used to live
• Criminal records, past jobs
• And they keep track of all criminals
Computers are also used for:
• Camera systems
• Control traffic systems and CCTV
• Examine forensic evidence
• Provide electronic surveillance. Etc.
Ambavani Ramoutar 2G
SECURITY CAMERAS [CCTV
CAMERA SYSTEMS]
Cameras act as a visible warning to a
criminal.They can also capture video
footage of a crime in progress and the
images can be used to identify the
criminals.Most cameras these days are
linked to computer systems that can
store and process the raw data.Some of
these cameras are found on traffic
lights. 
    Shreya Ramdeo 2G
SECURITY CAMERAS [CCTV CAMERA
SYSTEMS]
• They provide documented footage as the footage can be replayed
endlessly, security camera tapes provide a detailed account of an
incident. Law enforcement officials can watch the footage looking
for different clues for a case.

    Ayanna Sinanan 2G
EXAMPLES HOW CAMERAS ARE USED IN
LAW ENFORCEMENT

 ● To capture video evidence 


 ● To capture audio evidence
 ● Officers use body cameras (Body Worn Video) to capture footage
of a crime scene that can be used as evidence (Shreya Ramdeo)
DID YOU MAKE IT THIS FAR ???

You can say YES if you


did
BIOMETRIC IDENTIFICATION SYSTEMS

Biometrics are physical or biological characteristics that identify a


specific human being, for example, face shapes, hand geometry,
retinal scans, fingerprints and voice. A biometric device is a security
identification and authentication device. Such devices use
automated methods of verifying or recognising the identity of a
living person based on a physiological or behavioral characteristic.
Examples of biometric devices are Fingerprint reader, retina
scanners and voice recognition are all biometric devices, comparing
physical characteristics of the user to stored data authenticate the
user.    Bridget Jailal2G
FINGERPRINTING
• Fingerprints can be used in many ways example collecting DNA
of a person, it can be used as a major part to get that wanted
individual. It can help farther with unlocking apps, websites, even
gathering together that persons information that can and will be
useful to track their behaviors, therefore,  fingerprints are very
important not only for crime but many other reasons like enabling
websites. The most interesting part about fingerprints Is that each
person have their own fingerprint and it is unique to find and use
it resourcefully

    Tareen Rampersad2G
COMPUTER-ASSISTED FACIAL IMAGE
IDENTIFICATION SYSTEMS
• Identifying a person from an image captured through a
surveillance camera or photograph and doing a three-dimensional
facial reconstruction from the skull of a person, to show what the
person might look like if they were alive. When planning a video
surveillance system, two of the most important tasks related to
visitor identification are ascertaining( determining the distinctive
traits of an unknown person) and recognition( establishing a
known person's identity using his/her distinctive traits).
Semeera sookram
PROFILING [COMPUTER COMPOSITES]

• Officers can use appropriate software to compose a picture of


alleged criminal based on the description of a witness. Computers
can then compare this picture to those stored in the national
database
• This can further solve , and help track where a suspect could be,
where their previous dwelling lied, past jobs or even if they have a
criminal record. Computers are able to keep record of information
for example : fingerprints, pictures and information about the
certain suspect.                 
    Amelia Kaisersingh2G
TRAFFIC CONTROL
Computerized traffic light systems are able to adjust the traffic lights
throughout the day depending on the flow of traffic. These systems use a
sensor in the road to date g the flow of traffic, and the traffic lights are adjusted
accordingly.
Electronic surveillance can help the police track criminals' moments and
activities. Different forms of electronic surveillance include:
• •wiretapping(listening to criminals' telephone, cell phone and internet
conversations)
• •obtaining copies of email and online communication.
• •determining location information(finding out where you are from calls
going to your call phone.
• •analyzing communication,(for example, monitoring when and where credit
Shivana Ramkissoon
ELECTRONIC SURVEILLANCE
Electronic surveillance is defined in federal law as the nonconsensual
acquisition by an electronic, mechanical, or other surveillance device of the
contents of any wire or electronic communication, under circumstances in
which a party to the communication has a reasonable expectation of privacy.
Electronics surveillance equipment is most popularly used for investigation
Electronic surveillance software can be installed on a worker's computer to
feed data back to the boss. It can record when you log in and out, every
website you visit and for how long, as well as screenshots of what you are
viewing.
Elena Ramnanan
ELECTRONIC SURVEILLANCE

Electronic surveillance is the monitoring of a home, business, or individual


using a variety of devices such as CCTV, legal wiretapping, cameras, digital
video equipment, and other electronic, digital, and audio-visual means.

Examples of electronic surveillance include: wiretapping, bugging,


videotaping; geolocation tracking such as, via RFID, GPS, or cell-site data;
data mining, social media mapping, and the monitoring of data and traffic
on the Internet.

Ambavani
Ramoutar
QUESTION TIME!

TRUE or
FALSE?
Hand geometry is not a part of
biometric identification
What is your answer?

ANSWER: FALSE
THANK
YOU FOR
YOUR
PATIENCE
AND TIME
HAVE A
PRODUCTI
VE DAY <3

You might also like