Free Essay

Criminal Identification Procedures in the 21st Century

In:

Submitted By yuskoro
Words 1407
Pages 6
Criminal Identification Procedures in the 21st Century
Within the criminal justice system many technological advances exist to assist law enforcement officials in identifying a criminal suspect. The technological advances that continue to assist the criminal justice system in these identifications are Deoxyribonucleic Acid (DNA) analysis, biometric identification, Intra-agency databases for DNA, fingerprinting and palm printing, and camera and wiretap surveillance. Each aspect serves a specific purpose in making certain that the right person is properly identified for the crimes that they commit. Each technological aspect makes certain that the criminal justice system can prove without a doubt that the person under arrest is the person responsible for committing the crime.
Criminal Identification Procedures
Deoxyribonucleic Acid (DNA) analysis is an examination method that allows any organism to be identified, by its genetic sequences. DNA analysis is highly accurate, important, and used all across the world for important reasons. The main purpose for DNA analysis is identifying individuals who are suspects in criminal cases, identifying victims or their remains when other means of identity is not possible. The advantages of DNA analysis are reliable, accurate results, and helps solving old and new cases. The disadvantage of DNA analysis is it reveals information on physical state, this information is sensitive and must be guarded.
Biometric Identification is a system based around the main physical characteristics of the human body such as finger print identification, hand geometry, palm vein authentication, retina scan, iris scan, face recognition, signature, and voice analysis. The advantage is unique the information for each individual can be identified in spite of length of time. The disadvantage is the biometric information can be stolen if it is stored on a computer. Some biometric identification systems can be beaten with a copy of a fingerprint or eye. Someone who understands the technology can fabricate a copy from the owner's biometric information and access the computer system (Wade, H. 2012).
Intra-agency databases for DNA is a technology tool that stores hair, semen, blood and other sources of DNA into the database. This technology is beneficial to victims, families, and people who have been falsely accused of committing crimes. The advantages are DNA evidence will appear in the national database such as hair, blood and semen. Now the DNA is stored in the database it will show up at any time. The disadvantages dates back to crimes committed before the technological advancements were in effect. There are many people who have been incarcerated for years and sentenced to death row, who never had the chance to be cleared of the crime.
Finger print and palm print is the most-relied upon technology to positively identifying and liking individuals to criminal history and background records. The advantages are the electronic fingerprint and palm images allow rapid search of prints in extremely large databases with existing fingerprint and palm print records. The disadvantages are the current technologies can be difficult using, often times fingerprint and palm prints can produce poor quality. Camera and wiretap surveillance are electronic devices that keep watch over people to detect and gather information on suspicious and dangerous individuals who are involved in organizations. Wiretapping intercepts oral communications; camera surveillance is visual equipment to photograph individuals. The advantages of cameras are they deter crime from occurring, and also help capture criminals that commit crimes. The disadvantages are in society many view it as an invasion of privacy and a camera is a lead in a crime until discovered by law enforcement it is dysfunctional, broken, or did not catch the actual crime on tape. The advantage of wiretapping is it provides audio evidence under circumstances in conversation no actual person should be listening. The disadvantage is audibility; the sound can be variable or sometimes inaudible.
Perspective of Due Process There are a set rules and steps that law enforcement, prosecutors, defense attorneys and judges must adhere to. The first involves law enforcement interrogating, searches and making a lawful arrest which consist of probable cause and facts. This is where many television shows mislead the public by making them believe what they see are the facts. Suspect interview that are conducted by police officers cannot take place without an individual being advised of his or her legal rights. The person that is being charged has the right to either request or decline counsel and does not have to answer any questions asked by the police. There are situations where the accused will give up and tell the police everything. This seldom happens because the normal person does not want to admit guilt. Even when a suspect does admit to a crime, there are still criminal procedures to follow. If this would happen then the prosecuting attorney will offer the suspect a plea bargain. This is a good example of how both sides can work together and still gain. The second stage involves the granting of bail and the pre-trial motions. This gives the individual the right for due process. Pre-trial motions are used to establish grounds for the alleged charges. This is put into place to protect the rights of the public and to justify the actions of the prosecution. The third stage is the formal charging by the prosecution in the court of law. At this point the individual is within his or her right to make a plea. By this stage, the defense and prosecution has already agreed upon a set punishment. This happens about ninety percent of time as it helps keep cost down.
The fourth stage would depend on whether or not the defendant has decided to go to trial and it would involve either a jury trial or a judge. A jury or judge will determine guilt or innocence. Lastly, we have the last and final stage where the defendant will be sentenced according to the law or plea. It also provides the victims an opportunity to be heard in a court of law.
Perspective of Crime Control
The effects these advancements have in the criminal justice are huge. With systems that are able to identify DNA, biometric identification, intra-agency databases for DNA, fingerprint and palm print identification, and surveillance cameras which also include wiretaps. Criminal control has become easier and also more effective in finding out the facts of crimes that have occurred. In the past, police had to rely on clues and eye witness accounts. They never had a definitive answer and could never match people to crimes through DNA or fingerprints. With the advancements of these systems, the police are able to locate DNA at the scene of murder, collect it, and then put the DNA into the intra-agency database to find a match. With this system, the police can locate a person immediately through DNA. Also, DNA samples are extremely accurate and the chances of a DNA match being wrong are 350 million to 1. The process is simple; take two samples, one from the suspect and one from the scene of a crime. These samples can be through skin tissue, hair, blood, semen or vaginal fluid. The sample is then extracted and then studied and compared. The process is simple and accurate.
Systems such as surveillance cameras and wiretaps play a huge role in taking down huge crime circles and are extremely important for law enforcement usage. Drug operations are a huge part of our world today and it is essential for law enforcement to gather as much information as possible when dealing with these types of organizations. The more intel that is gathered, the stronger a case the police have. With these advancements in technology, the police are able to make correct arrests and convictions. With video and wiretaps of suspects discussing the crimes on a recording, it provides an extremely strong case against the criminal.
These advancements in technology keep innocent people out of jail, for the most part. It also helps the police build strong cases and convict the right suspects. There are still errors within the systems and mistakes do happen but technology is at an all time high and I believe it will only continue to advance further and further as time goes on.

References:
Wade, H. (2012). Disadvantages to Biometric Identification Systems .retrieved from http://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html
Schmalleger, F.(2010). Criminal law today: An introduction with capstone cases. (4th ed.) Upper Saddle River, NJ: Prentice Hall

http://library.thinkquest.org/28599/courtroom.htm

Similar Documents

Premium Essay

Criminal Identification

...Criminal Identification Procedures in the Twenty-first Century Criminal Procedure CJA/350 Abstract In modern society we are faced with the difficulty of ensuring that we are not locking up innocent people. We as a society want to fight crime at any means necessary but at what cost are we willing to pay for this so called justice? In this paper I will discuss the ways that we use criminal identification. Some of these methods are very simple as well as those, which are quite complex. These are eyewitness identification, DNA fingerprinting, latent prints found on bodies, brain fingerprinting, and thru vision. Identification of a person means knowing positively who a given person is and it may be necessary to identify living as well as dead individuals in a variety of situations. In our day-to-day life, we do not face many problems with identification, and it might seem surprising at first glance that such a mundane thing as identification ever needed the help of science. We may meet a long forgotten friend, and may not be able to identify him in the beginning, but recollection of some events would help us recall who the person is. In fact, in daily life, many take the identity of a person for granted. (Forensic Identification) Criminal identification procedures in the 21st century is an ever-changing and remarkable endeavor that has become something that law enforcement has been leaning towards for some time now. The criminal identification process is a long, but...

Words: 978 - Pages: 4

Free Essay

Forensics History

...Forensics History Theresia L. Coates Criminal Justice 1010 Forensics History What does Forensics mean? How old is forensic science? When it was first applied to the law? How has the Forensic science changed the arrest and prosecution success of criminals? The term "forensic" comes from the Latin and means, simply, having to do with the law. How has Forensics evolved from the beginning until today? Let us delve into the history of forensics and its blossoming partnership with the law. Surprisingly, Forensic Science has been around and used in criminal investigations in some manner since before the Roman Empire making it centuries old. It has only been within the last century that law enforcement agencies and the court systems have come to rely so heavily on the use of scientific practices in crime scene investigations.1 The first application of forensic science was by the Roman physician Antistius in the year 44 B.C., whom examined the body of Julius Caesar. He determined even though the dictator was stabbed 23 times, only one wound through his chest caused his actual death. This autopsy is thought to be the first one recorded and the start of using forensic science. Here in the Greek and Roman society extensive knowledge was developed regarding the production, use and symptoms of various poisons, making it possible to identify their use in previously undetected murders. Thanks to these western civilizations advances in the medical field as well as pharmacology were...

Words: 1732 - Pages: 7

Premium Essay

Courtroom Players Response

...attorneys, public defenders, and other member who make a living serving the court. The judge is the lead player in the court room and holds all the authority. “The prosecuting attorney represents the government or the interest of the community in a criminal trial.” (University of Phoenix, 2011). The defense attorney is a trial lawyer that is either hired or appointed to represent a person accused of a crime and to make sure that the rights of the defendant are not violated by the criminal justice system. If the defendant is unable to afford a lawyer than a public defender will be appointed by the court to represent the defendant in court. The bailiff role is to maintain order in the court, call witnesses, announce the present of the judge, prevents the defendant from escaping and to supervise the jury. The courtroom reporter keeps records of all the activity that takes place during a trial. The courtroom clerk “maintains all records of criminal cases, including all pleas and motions made both before and after the actual trial. The clerk also prepares a jury pool, issues jury summonses, and subpoenas witnesses for both the prosecution and the defense. During the trial, the clerk (or an assistant) marks physical evidence for identification as instructed by the judge and maintains custody of that evidence. The clerk also swears in witnesses and performs other functions as the judge directs.” (University of Phoenix, 2011). The interaction between the players in a courtroom work group...

Words: 808 - Pages: 4

Premium Essay

Courtroom Players

...government or the interest of the community in a criminal trial.” (University of Phoenix, 2011). The defense attorney is a trial lawyer that is either hired or appointed to represent a person accused of a crime and to make sure that the rights of the defendant are not violated by the criminal justice system. If the defendant is unable to afford a lawyer than a public defender will be appointed by the court to represent the defendant in court. The bailiff role is to maintain order in the court, call witnesses, announce the present of the judge, prevents the defendant from escaping and to supervise the jury. The courtroom reporter keeps records of all the activity that takes place during a trial. The courtroom clerk “maintains all records of criminal cases, including all pleas and motions made both before and after the actual trial. The clerk also prepares a jury pool, issues jury summonses, and subpoenas witnesses for both the prosecution and the defense. During the trial, the clerk (or an assistant) marks physical evidence for identification as instructed by the judge and maintains custody of that evidence. The clerk also swears in witnesses and performs other functions as the judge directs.” (University of Phoenix, 2011). The interaction between the players in a courtroom work group “involves an implicit recognition of informal rules of civility, cooperation, and shared goals. Hence even within the adversarial framework of a criminal trial, the courtroom work group is dedicated...

Words: 794 - Pages: 4

Premium Essay

The History of Police

...History of Police Andrea Cole CJA/214 June 30.2104 Kimberly Rieson The History of Police Industrialization and the large population in urban areas in the 17th and 18th century made it hard to maintain law and order in England and some major cities in America. Policing during that time consisted of volunteers from the community, also the night watchman and constables were employed but only on a part-time basis. These men had little to no training, used excessive physical force and intimidation to gain control. Sir Robert Peel (known as the “Father of Modern Policing”) was Prime Minister twice and as Home Secretary created the Metropolitan Police Act 1829. The Metropolitan Police Act was passed by British Parliament in 1829, and the police were born. ) ” As a form of ethical and operational guidance, Peel laid down nine principals intended to guide police in terms of their mandate, interaction with citizens, use of force and their overall criminal justice system” (Zacharias, 2009,para. 4). The terms "bobbies and "peelers" come from his name. Sir Robert Peel brought professionalism and accountability to the police by using the following methods also known as the Peelian Principles. The principles traditionally ascribed to Peel state that: every police officer should be issued identification number, to assure accountability for his actions. Whether the police are capable is not measured on the number of arrests, but on the lack of crime. Above all else, a competent authority...

Words: 815 - Pages: 4

Premium Essay

Identity Theft Penalty Act

...IDENTITY THEFT PENALTY ENHANCEMENT ACT Name Course School Date Introduction The Identity Theft Penalty Enhancement Act is an amendment to Title 18 of the United States Code. The Act was brought in to define and establish penalties for aggravated identity theft. It is also an enhancement of the definitions of identity theft found in the provisions of Title 18 (Congress.gov, 2004) (Finklea, 2014). Identity theft is an issue that has affected the nation for many years. Advances in technology have made it possible for many people to have access to the tools and resources needed to forge documents which are a critical part of identity theft. The most common form of identity theft is associated with credit card fraud. Credit card fraud on the internet has substantially increased due to the opportunities present in the Internet environment. However, this represents some of the simplest forms of identity fraud. Such is the case since it is very easy to discover credit card fraud by both the credit card company and the victim as well. However, according to the Federal Trade Commission (2002), other forms of identity theft are more severe since they take a longer time to materialize (Federal Trade Commission, 2002) This view is also by Finklea (2014) in his article where he points out the issues and trends of identity theft. The Identity Theft Penalty Enhancement Act comes in the context of increased awareness of the difficulties posed by emergent technologies. So far, identity...

Words: 5460 - Pages: 22

Premium Essay

Tattos

...decorative or other reasons. Tattoos on humans are a type of decorative body modification, while tattoos on animals are most commonly used for identification or branding. (wikipedia) The oldest mummy every found - dated back to the Bronze Age of Europe - is also the oldest example of tattooing. The mummy had 59 tattoos, including stripes, lines and cruciform marks on various parts of his body, and thus began the history of tattoos. No one is sure of the meaning of the tattoos. Some may have been marking from his tribe, others may have been from rituals or even from medical procedures. Speculation abounds, but true reasons will be difficult to determine unless new evidence is found. (tattooslovetoknow) Women (and only women) were tattooed in Egypt in 1550 BC. While tattooing seems to have been around in Egypt before this time, this is when the simple dot and dash designs began to morph into recognizable forms, although most were still largely stick figures. In 316 A.D., the first known written ban on tattooing is found. Constantine, recently converted to Christianity, prohibited tattooing on the face as it was disfiguring that "which had been fashioned in the likeness of divine beauty." (tattooslovetoknow) Much of the tattooing done during this time period was often to identify tribes or families, mark criminals and spies, ward off illness or injury, worship in various religions, and show status. While it is possible that some tattooing was done for...

Words: 761 - Pages: 4

Premium Essay

A Case Analysis on Corporate Criminal Liability

...A CASE ANALYSIS ON CORPORATE CRIMINAL LIABILITY Abbreviations RNRL- Relinace natural resources IPC- Indian Penal Code UOI- Union of India All ER - All England Law Reports (United Kingdom) CriLJ – Criminal Law Journal Table of cases 1. Lord Reid in Tesco Supermarkets Ltd. v. Natrass [1971] All ER 127 2. Zee Telefilms Ltd. v. Sahara India Co. Corporation Ltd., (2001) 3 Recent Criminal Reports 292. A. K. Khosla v. S. Venkatesan (1992) Cr.L.J. 1448 3. KalpanathRai v State (Through CBI), (1997) 8 SCC 732 4. State of Maharashtra v. Mayer Hans George,A.I.R. 1965 S.C. 722 5. Nathulal v. State of M.P., A.I.R. 1966 S.C. 43 6. MV Javali v. MahajanBorewell& Co and Ors.,AIR 1997 SC 3964 7. The Assistant Commissioner, Assessment-II, Bangalore &Ors. Vs. Velliappa Textiles, (2004) 1 Comp. L.J. 8. Standard Chartered Bank and Ors. v. Directorate of Enforcement (2005) 4 SCC 530 9. Iridium India Telecom Ltd. v. Motorola Incorporated and Ors ,AIR 2011 SC 20 10. CBI v. M/s Blue-Sky Tie-up Ltd and Ors ,Crl. Appeal No(s). 950 of 2004 11. Kartick Chandra v.Harsha M. Dasi, AIR 1943 Calcutta 35 at 354; Contents Introduction 6 Corporate Criminal Liability under the Companies Act 1956 &2013 6 Doctrine of identification theory 9 Position prior to the Standard Chartered Bank Case Law 11 Standard Chartered Bank and Ors. v. Directorate of Enforcement (2005) 4 SCC 530 12 Post Standard Chartered Bank case law: 13 Conclusion...

Words: 4662 - Pages: 19

Free Essay

Computer Forensics

...Computer Forensics The world of crime has expanded right along with the explosion of the internet. The modern cyber criminal has veritable global playground in which to steal money and information from unsuspecting victims. Computer forensics is a quickly emerging science against the increasingly difficult battle to bring criminals to justice who perpetrates crimes on others. The computer forensics field is a relatively new investigative tool but enjoys continual advances in procedures, standards, and methodology which is making the identification, preservation, and analyzing of digital evidence a powerful law enforcement apparatus. The job of the cyber forensic professional is to look for clues the attacker left behind on web sites, servers, and even the e-mail message itself that will unravel their sometimes carefully woven veil of secrecy. Attackers come in all forms and from a variety of different circumstances. For instance, an attacker can begin a phishing scam with only a web server they control with very little programming experience and a way to send a lot of e-mail messages. (Jones 4) In order to combat the waves of cyber-attackers, we must utilize Open Source Community applications to combat the continual onslaught of infections, exploitations, and trickery employed everyday against our systems and networks. Today's attacker uses a variety of technologies to employ their methods and understanding those abilities is integral to preparing for an investigation...

Words: 2742 - Pages: 11

Premium Essay

Racial Profiling

...[Name of the Writer] [Name of the Institution] [Name of the Subject] [Date] Racial Profiling and Law Enforcement Introduction Over the years racial profiling has become a significant topic especially among law enforcement agencies across the United States. Many cities and states have made a conscious effort to study racial profiling and ascertain how race and ethnicity play a significant role in stopping vehicles by law enforcement in their jurisdictions. Profiling refers to the practice of police that view certain characteristics as indicators of criminal behavior. It is the establishment of law enforcement practices that solves crime and develop prevention strategioes against crime. While, racial profiling is the new term for profiling. The change is partially because of the ambiguity that racial profiling has some confusions and controversories. The term racial profiling best decribes the situation where police arrests, questions or stops the person on the basis of race (Cleary 5). In regards to the racial profiling, the concern about it is erupting in the entire nation (Harcourt 18). Racial profiling is considered as the use of the individual’s ethnicity and race through the law enforcement personnel. In many of the jurisdiction, the practice of such acts is considered as illegal and controversial. United States have decided to work on the issues related to the racial profiling, that how the ethnicity and race play a part in order to stop the injustice through...

Words: 2214 - Pages: 9

Premium Essay

Iran Economic Swot

...Geopolitics, International Environment and Business International risk management 1 Geopolitics, International Environment and Business Risks identification Are we leading towards economic war? 2 Geopolitics, International Environment and Business Several agencies seem to reinforce this idea, particularly regarding international trade 3 “Public economic warfare”  Japan JETRO, Japan External Trade Organization (www.jetro.go.jp) Created in 1958 to promote Japanese exports From the 80s it expands to developing countries. 21st century: To promote FDI into Japan To help small & medium sized companies to export. 4  USA (1992, 1993): Bill Clinton Policy  "Putting People First, A National Economic Strategy For America" Governor Bill Clinton June 21, 1992  Opening up world markets. […] we will move aggressively to open foreign markets to quality American goods and services (for instance, NAFTA)  Economic security council / Advocacy Center / CIA / FBI –Economic Counterintelligence Program The stakes in this game are high! 5 FRANCE: UBIFRANCE -Offices in France (partnership with chambers of trade) -80 offices in 60 different countries (156 in 120 countries if Economic Missions considered) -More than 1,400 collaborators MISSION: to make French exports easier, to support and to monitor French companies abroad. 6 7 “Private economic war”  International competition   Is it replacing military conflicts? Competitive...

Words: 1787 - Pages: 8

Premium Essay

Human Trafficking

...information sharing between organizations has become necessary. With enhanced human trafficking policies and implementation; accurate crime statistics can be gathered, victims can be identified, perpetrators can be prosecuted, and organized crime patterns can be seen. This paper will be broken down into several components that cover this multi-faceted, illegal industry. First, a description and definition of human trafficking will be given. The current prevention methods will follow, including rough statistics gathered around the world. Next, I will outline the difficulties that law enforcement encounter with human trafficking. The strategies for improvement will make up the bulk of the paper. Human trafficking has been deemed the 21st century slave trade. Inadequate laws against trafficking and police negligence have allowed for this human rights violation to develop into a huge industry. Dr.Lederer, VP for Policy and Planning with the anti-trafficking organization, Global Centurion, estimates that the crime has become a 32 billion dollar industry. 600,000 to 800,000 people are trafficked each year across borders. These numbers do not include those being exploited within borders.[1] While the sex slave industry gains the most media...

Words: 2485 - Pages: 10

Free Essay

Genetic Engineering: Patent Request Analysis

...Genetic Engineering: Patent Request Analysis By Genetic Engineering: Patent Request Analysis The governmental patent office has requested a think tank team of criminologists to review the research documents of new technology computer-aided microscopic rare gene molecules. The team of criminologists will consider the legal or not legal aspects of the doctor’s request for a patent, along with the viability of current transplant procedures. The scenario states the doctor has invented a computer – aided organism as key to bridge the new cells to human organs in the host receiver. This is a new concept of using microscopic rare gene molecules to make any human organ viable for everyone without the side effects of rejection, or infections. This research document is the collective, innovative thoughts and opinions of four people team. Patent Requirements The filing of medical patent begins with two important points. The first point begins as the criminologists will determine the usability of the new technology. The computer – aided microscopic rare gene molecules are the key to bridge genetically designed new cells to the human organs within the host receiver. This concept would make the genetically engineered cells for the damaged organ acceptable to the host receiver. The viable idea is to inject the microscopic rare gene molecules straight into the damaged organ along with the anti-infection drugs. The second important point is the innovative studies to confirm the computer-...

Words: 2071 - Pages: 9

Premium Essay

Computer Security

...Computer troubles led Delta Airlines to cancel 40 flights and delay many others. Microsoft quickly posted a $250,000 reward, and by mid-May, authorities apprehended Sven Jaschen, a German teenager. Jaschen confessed and was convicted after a three-day trial. Jaschen could have received up to five years in prison, but because he was tried as a minor, the court suspended his 21-month sentence, leaving him with only 30 hours of community service. Copyright © 2007 by Thomson Course Technology. All rights reserved. This publication is protected by federal copyright law. No part of this publication may be reproduced without prior permission in writing from Course Technology. Some of the product names and company names have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufactures and sellers. Authorities said that once Jaschen realized the havoc the Sasser worm was causing, he tried to...

Words: 18526 - Pages: 75

Premium Essay

Criminal Justice Integration

...Crime and law enforcement is in a unique period that has been going on for over 30 years. During the 1960s crimes presented to police skyrocketed and more criminals being apprehended. Lawmakers started enacting strict laws that expanded punishments for criminals, the amount of legal cases prosecuted by the court of law soared, the amount of individuals in jails, prisons, and undergoing probation or prison release observation escalated dramatically, and spending by branches of government surrounding criminal justice organizations increased. It was also during this time that the Federal Governments position in the Nations attempts to combat crime was additionally restructured. Agency policies There were more than 14,000 law enforcement agencies in the United States in 2008, employing more than 700,000 officers. Intrinsically, policies are different between law enforcement agencies; and are centered on the agencies history and problems they have encountered. Law Enforcement policies, budget and technology evolves as society around it evolves. In 1987, the Association of Chief of Police joined alliance with the U.S. Justice Department to establish a nationwide policy. The Chiefs of Police commission was founded to aid agencies throughout the country enforce the same set of laws. According to Matz, and Kim, (2013), the result of the partnerships between agencies resulted in created an alert system called “America’s Missing Broadcast Emergency Response (AMBER)” and Homeland...

Words: 2610 - Pages: 11