Title: Computers in Government, Law Enforcement, and the Military
1Chapter 2
- Computers in Government, Law Enforcement,
and the Military
2Introduction
- Computers and the Government
- Electoral process, postal services, census, and
taxes - Computers in Law Enforcement
- Evidence and criminal record databases, traffic
violations, stolen vehicles, missing children,
wireless 911 - Computers and Homeland Security
- Tracking visitors, surveillance, crisis
management - Computers in the Military
- UAVs, PackBots, smart bombs, tracking troop
movement, computer simulations
3Computers and the Government
- Streamline office functions
- Make information publicly available
- Handle processing of applications and forms
- Analyze and store data and statistics
- Manage budgets and payrolls
4Governmental Uses of Computers
5The Election Process
- Campaign polling
- Often done electronically
- Results are analyzed using software applications
- Demographic groups are specifically targeted
- Voters and candidates can research online
- Candidates Web site
- Voting records
- Campaign finance databases
- News sources
6Computerized voting systems
7Direct Recording Electronic machines
8United States Postal Service
- Uses an optical character recognition (OCR)
system - Translates characters into digital images
- Looks up addresses in a database
- Applies a POSTNET bar code
- Routes mail using a bar code sorter
- Provides customer service and products on its Web
site - Calculate shipping costs, buy stamps, hold and
forward mail, change address
9Census Bureau
- Optical mark recognition system scans data
- Computers tabulate data
- Handheld computers are envisioned for the next
census - Will store contact information for people who
have not filled out census forms - Will have the ability to input data
electronically - Census statistics are available to the public
online
10Internal Revenue Service
- Tax preparation software or a tax preparation Web
site can guide taxpayers through the process of
filing taxes - Analyzes the form for errors and missed
deductions - Forms may be mailed or submitted electronically
through the IRS e-File system - Refunds may be given via direct deposit
- IRS Web site provides comprehensive information
- Recent tax news for specific demographic groups
- Forms for downloading
- Tracking of refunds
11Tax Preparation Software
12Computers In Law Enforcement
- Officers today usually carry a PDA to
- Write tickets
- Fill out accident reports
- Complete routine police work
- Scan driver license bar codes
- Download criminal and driving records from
databases with the driver license bar code - Many squad cars come equipped with a laptop
- Allows information retrieval from headquarters
while on the road
13Tracking Evidence
- Police enter documentation about evidence into a
handheld computer - Wirelessly transmits the information to an
evidence database - Prints out a bar code sticker that is placed on
the physical evidence - DNA evidence is stored in the CODIS (Combined DNA
Index System) database - Forensic and offender indexes
- Fingerprint evidence is stored in the AFIS
(Integrated Automated Fingerprint Identification
System) database - Fingerprint images are scanned electronically
14Storing Criminal Records
- NCIC (National Crime Information Center)
- FBI database of criminal justice information
- Officers check subjects previous record after
arrest - NICS (National Instant Criminal Background Check
System) - FBI system to help gun dealers perform background
checks on potential buyers - Dealer calls the Bureau of Identification to run
a query on several databases - Databases of violent sexual offenders
- Relevant information often made public online
15Online Criminal Database
16Enforcing Traffic Laws
- Red-light systems use computer technology to
catch drivers who run red lights - Cameras are positioned at intersection corners
- A sensor loop triggers the computer if a car
moves over a certain speed - The computer instructs digital cameras to take
photos - The computer adds the time, location, etc. to
photos - A citation is sent to the offender
- Traffic violation fines may often be accessed and
paid online
17Online Payment of Traffic Violations
18Tracking Stolen Vehicles
- LoJack is a stolen vehicle recovery system
- A wireless radio-frequency transmitter is placed
in the car - The vehicle identification number of a stolen
vehicle is checked against the NCIC - A signal is sent to the device
- The device sends a homing signal back to a
tracking computer with a map - Key pass theft system
- Uses a motion sensor and uniquely coded key pass
to detect unauthorized motion of a vehicle
19Finding Missing Children
- Amber Alert system
- Immediately notifies public for help in
recovering missing children - Uses EAS (Emergency Alert System) technology
- EAS broadcasts alert on radio and television
- Alerts can be displayed on dynamic message signs
on highways - NCMEC (National Center for Missing and Exploited
Children) provides alerts via e-mail, mobile
phone, pager, or AOL Instant Messenger
20(No Transcript)
21Providing Wireless 911
- Enhanced 911 (E-911) displays phone number and
address information on operators computer - The ANI (automatic number identifier) and ALI
(automatic location identifier) databases provide
the information - ANI and ALI does not work with cell phones
- FCC requires that all cell phone providers equip
phones with GPS (global positioning system)
receivers - GPS receiver receives signals from GPS satellite
- Computer links this information to the ALI
database
22VeriChip
- Implantable microchip that stores personal
information - Useful for tracking people with illnesses or in
danger - Raises privacy and legal issues
23Computers and Homeland Security
- The U.S. VISIT system is being implemented to
identify fake documents - U.S. VISIT (Visitor and Immigrant Status
Indication) is a database of biometric
identifiers - Foreign students must provide personal
information to the SEVIS system - SEVIS (Student and Exchange Visa Information
Service) is an Internet-based database to verify
enrollment - Some criticism due to lack of privacy and
technological errors
24Homeland Security, cont.
- Surveillance using computer vision systems
- U.S.-Canadian border uses digital camera at ports
of entry to detect unusual movements - Software uses artificial intelligence to analyze
data from cameras - Alerts are sent electronically
- Managing crises through collaboration
- Web-based collaboration systems help track and
manage events during a crisis - Information can be shared and viewed in real-time
by authorized users
25Real-time Computerized Incidence Maps
26Computers in the Military
- The military is constantly working to improve
technologies for equipment and systems - Wars and conflicts have historically brought new
products into commercial use by citizens - Recent trends use advanced computer technology
- GPS (global positioning system) technology for
navigation and weapons - Rugged laptops with wireless technologies for
troop communication - Computer simulations for training
27Deploying Unmanned Aerial Vehicles (UAVs)
- Used to gather intelligence in crowded areas
- Day or nighttime surveillance
- Lightweight, remote-controlled drones
- GPS for determining location
- Chemical-agent detector
- Color or night vision miniature camera
- Relays live images to video recorder or ground
receiver - May be used by police, oil companies, or news
organizations in the future
28Unmanned aerial vehicle (UAV)
29Using Remote-Controlled Robots
- Used in small or hazardous locations
- React to their environment through detectors
- Cameras
- Microphones
- Sonar and infrared sensors
- Laser scanners
- Radio antenna and network hub
- New robots are being developed to steer vehicles
without human help - Used to deliver humanitarian aid or retrieve
troops
30PackBot
31Utilizing Precision-Guided Bombs
- Smart bombs are guided to their targets using
satellite-guidance capability - Intended to maximize damage to the target and
minimize civilian casualties and collateral
damage - Uses GPS to pinpoint location
- Dependent on human intelligence
- Mapping of location and entering coordinates
- Technology may be used in airplanes and cars in
the future
32Smart bomb
33Tracking Troop Movement
- GPS is used to track troop movement
- Helps troops accurately determine their location
and the enemys position - Coordinates actions of different units on the
ground, in the air, or at sea - Provides better rescue and response
- Used to drop cargo packages from the air
- GPS jamming systems are being developed to reduce
effectiveness of enemy GPS guidance systems
34Using Computer Simulation for Training
- Live training with military equipment is
expensive and dangerous - Computer simulations can provide training without
the associated risks and costs - Computer simulations use computers and software
to create battle scenarios - One computer simulates each military vehicle
- Networked computers simulate an entire battle
- Multiple repetitions can provide practice,
feedback, and analysis - Dependent on expert assumptions and algorithms
35Conclusion
- Uses of computers and technology in
- Government
- Electoral process, USPS, Census Bureau, IRS
- Law Enforcement
- Evidence and criminal record databases
- Traffic laws, missing children, wireless911 calls
- Homeland Security
- Crisis management, surveillance of borders
- Military
- UAVs, remote-controlled robots, smart bombs,
computer simulations