Criminology: The Case of Uncle Bob Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

To effectively fight crime, the law enforcers need to have prompt access to the data of individuals who have violated the law. This is captured in the 1967 Commission report, which urged for rapid adoption of information technology (IT) to make the criminal justice system operate efficiently and fairly (Ridgeway, 2018).

Since then, significant strides have been made especially in using big data technologies. To prevent errors, Lee (2019) suggests that the information collected should be accurate and that the correct software must be used when dealing with different agencies. The objective of this paper is to exemplify the case of Uncle Bob, who has a record of crime in California, his residential state, and was caught speeding during his vacation in Miami.

First, it is necessary to understand the facts about the case to appreciate data sharing and access across legal entities. The field police in Florida had basic information that could identify Uncle Bob even though he had no history of crime in that state. The officer arrested him after a conversation, implying that he gave out information that matched the details in their records. Therefore, in addition to Uncle Bob’s over-speeding, it was established that he was a fugitive or had stolen property since such is the information stored by the National Crime Information Centre (NCIC) (Kilfeather, 2016). The Florida police knew about Uncle Bob’s past offenses by accessing the shared database to verify the information that he had provided during the conversation (apprehension).

Notably, the data was available to the Miami Police department because there was National Information Exchange Model (NIEM). Specifically, the federal government acts as the center for sharing information with different local agencies. For instance, the National Data Exchange (N-DEx) System hosts data in the cloud and contains a search engine to allow police officers in the field to find data easily as long as they have an internet connection.

The two states have provided the analytical capacity to authorized persons to access the data they need to prevent or control crime. Kilfeather (2016) states that information is also accessed through the in-case index, which locates small details and matches a specific numbered report. Thus, the officer can easily connect information that appears unrelated because the technology has proprietary algorithms features. Moreover, the officers have access to guides that can help relate data and make trustworthy conclusions about an individual suspected of an offense.

Accordingly, the information available to the Miami Police Department includes biographic data and criminal history, all of which flow from the local agencies to the federal center and back. Officers can easily access the details such as name, height, weight, and birth date from the NCIC (Chan et al., 2020). Worthy to note, the NCIC contains criminal justice data on stolen properties, fugitives, or missing persons. The flow followed case indexing, which is a strategy used by the law enforcement officers to enter records of individual offenses they encounter while on duty. Upon entry, the data is routinely combined in the department master index through particular equipment such as call detail record (CDR).

There are many ways in which information is shared between federal and local agencies. First, there is the Regional Information Sharing System (RISS) which provides a secure environment for officers to submit, retrieve, and share data on crimes. The RISSIntel can be accessed through RISSNET communication and offers real-time federated search for different states without demanding an officer to log into the system. Second, information is shared through the records management systems (RMSs) which provide specific case histories such as the offenses that Uncle Bob did in the past. Third, the computer-aided dispatch (CAD) infrastructure stores records of calls made on suspected violations; hence it is also effective in retrieving basic details.

In addition, the Federal Bureau of Investigation (FBI) also has a Law Enforcement Online (LEO), which allows the public to share information that can then be accessed by the law enforcers when needed. If the previous crimes committed included firearms, then the data can come from the National Integrated Ballistic Information Network (NIBIN).

Several issues about the case make it suspicious, indicating that Uncle Bob was probably escaping past crimes. For instance, he was over-speeding, which is not typical for people on vacation. The Geographic Information Systems (GIS) and other technologies such as global positioning system (GPS) and Digital Aerial Photography (DAP) are useful in racking offenders on the run. Uncle Bob was probably running away after breaking the law and will possibly be charged with crimes such as stolen vehicles, securities, or foreign fugitives. Interestingly, the police apprehended Uncle Bob and then searched their database for related crimes, which verified that it was not his first time breaking the law.

The ability of the Florida police agency to obtain the information depends on the level of technological advancement, level of inter-state cooperation, and training of the officers. Implementing federal and state information-sharing systems needs significant investments in modern IT, which is expensive. The other challenge is the lack of trust and knowledge on how to transfer and store data (Kilfeather, 2016). Personal competencies of the officers in using strategies such as case indexing to link information and establish a narrative. In this case, Miami officers are bound to receive all the information that they need.

Conclusively, there has been significant improvement in information access and sharing between states and the national government. Many technologies are now available for reporting data and indexing for central storage by federal agencies such as the NCIC. Officers in the field can then access the information if they have an internet connection. Uncle Bob was over-speeding, but his details probably matched those of a fugitive, lost person, or stolen item, hence, leading to his arrest. Law enforcers must continually strive to invest in sound technologies, training, and trustful collaboration to prevent crimes and ensure justice.

References

Chan, J., Logan, S., & Bennett Moses, L. (2020). y. Criminology & Criminal Justice. Web.

Kilfeather, R. F. (2016). Managing and coordinating major criminal investigations (2nd ed.). CRC Press.

Lee, J. (2019). . Police1. Web.

Ridgeway, G. (2018). . Annual Review of Criminology, 1(1), 401-419. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, October 3). Criminology: The Case of Uncle Bob. https://ivypanda.com/essays/criminology-the-case-of-uncle-bob/

Work Cited

"Criminology: The Case of Uncle Bob." IvyPanda, 3 Oct. 2022, ivypanda.com/essays/criminology-the-case-of-uncle-bob/.

References

IvyPanda. (2022) 'Criminology: The Case of Uncle Bob'. 3 October.

References

IvyPanda. 2022. "Criminology: The Case of Uncle Bob." October 3, 2022. https://ivypanda.com/essays/criminology-the-case-of-uncle-bob/.

1. IvyPanda. "Criminology: The Case of Uncle Bob." October 3, 2022. https://ivypanda.com/essays/criminology-the-case-of-uncle-bob/.


Bibliography


IvyPanda. "Criminology: The Case of Uncle Bob." October 3, 2022. https://ivypanda.com/essays/criminology-the-case-of-uncle-bob/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1