blog




  • Essay / The Integrated Automated Fingerprint Identification System

    The use of computer technology has revolutionized many aspects of today's society. Everywhere we look, we see the use of computers. In most cases, computers are extremely beneficial to many people in various professions and even in their personal lives. In one way or another, the use of computer technology can be linked to almost every profession in the world. Using computers can be helpful in many ways: they can make difficult tasks easier, store and share data efficiently, and make data management easier. communicate with colleagues and managers. The use of computers has dramatically changed law enforcement in the past. In subsequent years, law enforcement agencies had to manually enter all data from police reports, witness statements, criminal information, and crime scene investigations and had to store all of these files in locations secure. “Thousands of times every day across the United States, police officers arrest a suspect, arrest a suspicious character near a crime, or stop a speeder and take his heir's fingerprints. (Scigliano 63.) With all these fingerprints, the fingerprint information, it all adds up within a department and there can be an overflow of all the information depending on the size of the department. The IAFIS system allows for a faster and more efficient response time when sending information. Fingerprints are not the only information stored in the IAFIS system. “Not just fingerprints, but also the corresponding criminal history; criminal identification photos; photos of scars and tattoos; physical characteristics such as height, weight, hair and eye color, and aliases. » (IAFIS 1) Imagine this; you are a police officer who has worked for years in a department. You've always had to enter a suspect's fingerprint information in the middle of paper fields. With computers, there is a risk that there will be hackers. These same hackers try to steal someone's personal information on the Internet. This can be troublesome for the police, as it can be difficult to identify the exact person who tried to hack the computer system. If a computer system's servers crash or shut down, the people connected to the server don't know what to do. Works Cited Miller, Mark R. Police Patrol Operations. Belmont, CA: Wadsworth, 2000. Cengage Learning 2nd ed. PrintIntegrated Automatic Fingerprint Information System-fbi.gov (2013, 11-10-2013), Web Retrieved 15-11-2013, from www.fbi.gov/about-us/cjis/figerprints_biometric/iafisScigliano, Eric. “The tide of prints”. Technology Review 102.1 (1999): 62-67. Full Text of Applied Science and Technology (HW Wilson). Internet. November 18. 2013.