Criminal Identification Procedures
The dawn of the twenty-first century has become the era of George Orwell's "1984." Technology that was found only in science fiction a few decades ago, is part of today's standards and procedures.
The world today is filled with cameras that can film an individual wherever he goes, his cell phone signal can pinpoint his location, and even one glance can reveal his true identity (Shenk 2003). Iris-recognition technology, soon to be common in places such as airports, offices, and banks, will simply scan an individual's eyes to reveal his idenity (Shenk 2003). Many feel that in this post-9/11 landscape, there is a serious need for these high-tech tools to help detect money laundering, encrypted e-mails, bio-weapons, and suitcase nukes (Shenk 2003).
Poseidon, a new electronic surveillance system, is a network of cameras that feeds a computer programmed to use a set of complex mathematical algorithms to distinguish between normal and distressed swimming (Shenk 2003). According to writer David Shenk, machines like Poseidon will redefine how we live, and the shift of this new technology will be substantial. Machines will recognize our faces, eyes and fingerprints, and will watch out for swimmers in distress, for radioactivity and germ-laden terrorists, for red-light runners and highway speeders, for diabetics and heart patients (Shenk 2003). Commonplace will be devices that monitor the breathing rhythms of infants in cribs, watch toddlers at day care, track children to and from school, keep an eye on the supply of orange juice in the refrigerator or alert when the milk has spoiled, watch calorie intake and burn-off, monitor air quality in homes and keep a look out for bugs and mice (Shenk 2003). Sensors as large as walls and as small as molecules in the bloodstream will send quiet signals to nearby computers, which will process and relay information to an individual, to his doctor, grocer, building manager, car mechanic, local fire or police department (Shenk 2003).
Several countries in Europe and Asia are introducing a citizen smart card that will serve as an official national ID and can hold personal medical history, social security information, serve as a passport, train pass, toll card, credit and debit card, long-distance phone card and library card (Shenk 2003). Moreover, the card can tap into systems that talk to each other, thus, merging the worlds of consumer convenience and citizen surveillance (Shenk 2003).
The U.S. Treasury Department's Financial Crimes Enforcement Network (FinCEN) already brings together financial, law enforcement, and commercial databases and a considerable array of government agencies in a vast attempt to ferret out money laundering and other financial crimes, and a new commercial software tool called Coplink uses artificial intelligence algorithms to search the Internet and confidential crime databases, helping law enforcement agencies to connect all the dots in a complex investigation (Shenk 2003).
Great Britain has more than four million CCTV cameras nationwide, roughly one camera for every fifteen people, and one British sociologist estimates that the average visitor to London is now captured on video 300 times in a single day (Shenk 2003). The British government is now moving ahead to the next phase which is an ambitious vehicle surveillance system designed "to reduce serious and volume crime by denying criminals the use of the roads" (Shenk 2003). Relying on a synchronization between optical character-recognition software and criminal databases, fixed and mobile cameras available in every police force in England and Wales will scan license plates and flag suspicious ones (Shenk 2003).
Fingerprint identification has been used to solve crimes since the 19th century and today most countries require that all criminals be fingerprinted (Fingerprint 2004). Methods have been devised for developing fingerprint impressions left by criminals at crime scenes, and usually consists of using a brush and powder to mark the fingerprint which is then photographed and lifted from the surface using tape (Fingerprint 2004). A federal judge ruled in 2002 that due to inconsistencies in laboratory identification of fingerprints, fingerprint identification as practiced was not accurate enough to be used with qualification,...
These may include dismissals and mistrials, as well as appeals. The chapter details some of the notional elements around double jeopardy, including the situations in which same offense can be defined as such. Essay Gilbert Law Summaries on Criminal Procedure is another excellent book from the Gilbert Law Summaries series. The first thing that needs to be mentioned is that this book comes as close as possible to being an overly
Criminal Justice Trends The trends of the past, present and future that outline the borders connecting the criminal justice system components and their links adjoining the society is, beyond doubt, an authentic relationship that the law and society have established. Criminal justice has been affected by various trends in the times gone by. This is because trends keep changing with the passage of time. Therefore, it is exceedingly important for the
Criminal Profiling as an Aid for Apprehending Serial Killers Popular media loves to emphasize the role of the criminal profiler in apprehending serial killers. It has been a central them in books, television shows, and movies for the past two decades, and the concept of the feisty criminal profiler interviewing wily and brilliant convicted serial killers in an effort to gain insight into active serial killers has become so iconic that
Criminal Eyewitness Testimony Eyewitness testimony, or the sworn oath of persons who believe they have witnesses a crime, or portion of a crime, has long been studied in both the fields of criminology and psychology. Research shows that a jury, for one, tends to convict a person when there is eyewitness testimony present by two to one odds. However, research also shows that criminal eyewitness testimony has the very real potential
The next step is evidence collection. Processing a crime scene without disturbing the evidences is a difficult task and investigators should take every precaution to gather evidence without affecting the crime scene. (GSA) Crime scene stepping pads' can be used for walking around the area without damaging potential evidences. Photographs and video must be taken before proceeding with the rough sketching around the crime scene. For this purpose 'crime scene
As a result, if an illegitimate interrogation or investigation contributes to the identification of physical evidence, the investigation and physical evidence must be excluded from trial. In this case, the interrogation or investigation is excluded on the basis of the exclusionary rule while the physical evidence is excluded on the basis that it's the fruit or product of illegal interrogation. The significance of the exclusionary and the fruit of poisonous
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now