Criminology: The Case of Uncle Bob Essay

Exclusively available on IvyPanda Available only on IvyPanda

To effectively fight crime, the law enforcers need to have prompt access to the data of individuals who have violated the law. This is captured in the 1967 Commission report, which urged for rapid adoption of information technology (IT) to make the criminal justice system operate efficiently and fairly (Ridgeway, 2018).

We will write a custom essay on your topic a custom Essay on Criminology: The Case of Uncle Bob
808 writers online

Since then, significant strides have been made especially in using big data technologies. To prevent errors, Lee (2019) suggests that the information collected should be accurate and that the correct software must be used when dealing with different agencies. The objective of this paper is to exemplify the case of Uncle Bob, who has a record of crime in California, his residential state, and was caught speeding during his vacation in Miami.

First, it is necessary to understand the facts about the case to appreciate data sharing and access across legal entities. The field police in Florida had basic information that could identify Uncle Bob even though he had no history of crime in that state. The officer arrested him after a conversation, implying that he gave out information that matched the details in their records. Therefore, in addition to Uncle Bob’s over-speeding, it was established that he was a fugitive or had stolen property since such is the information stored by the National Crime Information Centre (NCIC) (Kilfeather, 2016). The Florida police knew about Uncle Bob’s past offenses by accessing the shared database to verify the information that he had provided during the conversation (apprehension).

Notably, the data was available to the Miami Police department because there was National Information Exchange Model (NIEM). Specifically, the federal government acts as the center for sharing information with different local agencies. For instance, the National Data Exchange (N-DEx) System hosts data in the cloud and contains a search engine to allow police officers in the field to find data easily as long as they have an internet connection.

The two states have provided the analytical capacity to authorized persons to access the data they need to prevent or control crime. Kilfeather (2016) states that information is also accessed through the in-case index, which locates small details and matches a specific numbered report. Thus, the officer can easily connect information that appears unrelated because the technology has proprietary algorithms features. Moreover, the officers have access to guides that can help relate data and make trustworthy conclusions about an individual suspected of an offense.

Accordingly, the information available to the Miami Police Department includes biographic data and criminal history, all of which flow from the local agencies to the federal center and back. Officers can easily access the details such as name, height, weight, and birth date from the NCIC (Chan et al., 2020). Worthy to note, the NCIC contains criminal justice data on stolen properties, fugitives, or missing persons. The flow followed case indexing, which is a strategy used by the law enforcement officers to enter records of individual offenses they encounter while on duty. Upon entry, the data is routinely combined in the department master index through particular equipment such as call detail record (CDR).

There are many ways in which information is shared between federal and local agencies. First, there is the Regional Information Sharing System (RISS) which provides a secure environment for officers to submit, retrieve, and share data on crimes. The RISSIntel can be accessed through RISSNET communication and offers real-time federated search for different states without demanding an officer to log into the system. Second, information is shared through the records management systems (RMSs) which provide specific case histories such as the offenses that Uncle Bob did in the past. Third, the computer-aided dispatch (CAD) infrastructure stores records of calls made on suspected violations; hence it is also effective in retrieving basic details.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

In addition, the Federal Bureau of Investigation (FBI) also has a Law Enforcement Online (LEO), which allows the public to share information that can then be accessed by the law enforcers when needed. If the previous crimes committed included firearms, then the data can come from the National Integrated Ballistic Information Network (NIBIN).

Several issues about the case make it suspicious, indicating that Uncle Bob was probably escaping past crimes. For instance, he was over-speeding, which is not typical for people on vacation. The Geographic Information Systems (GIS) and other technologies such as global positioning system (GPS) and Digital Aerial Photography (DAP) are useful in racking offenders on the run. Uncle Bob was probably running away after breaking the law and will possibly be charged with crimes such as stolen vehicles, securities, or foreign fugitives. Interestingly, the police apprehended Uncle Bob and then searched their database for related crimes, which verified that it was not his first time breaking the law.

The ability of the Florida police agency to obtain the information depends on the level of technological advancement, level of inter-state cooperation, and training of the officers. Implementing federal and state information-sharing systems needs significant investments in modern IT, which is expensive. The other challenge is the lack of trust and knowledge on how to transfer and store data (Kilfeather, 2016). Personal competencies of the officers in using strategies such as case indexing to link information and establish a narrative. In this case, Miami officers are bound to receive all the information that they need.

Conclusively, there has been significant improvement in information access and sharing between states and the national government. Many technologies are now available for reporting data and indexing for central storage by federal agencies such as the NCIC. Officers in the field can then access the information if they have an internet connection. Uncle Bob was over-speeding, but his details probably matched those of a fugitive, lost person, or stolen item, hence, leading to his arrest. Law enforcers must continually strive to invest in sound technologies, training, and trustful collaboration to prevent crimes and ensure justice.

References

Chan, J., Logan, S., & Bennett Moses, L. (2020). y. Criminology & Criminal Justice. Web.

Kilfeather, R. F. (2016). Managing and coordinating major criminal investigations (2nd ed.). CRC Press.

Lee, J. (2019). . Police1. Web.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Ridgeway, G. (2018). . Annual Review of Criminology, 1(1), 401-419. Web.

Print
Need an custom research paper on Criminology: The Case of Uncle Bob written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, October 3). Criminology: The Case of Uncle Bob. https://ivypanda.com/essays/criminology-the-case-of-uncle-bob/

Work Cited

"Criminology: The Case of Uncle Bob." IvyPanda, 3 Oct. 2022, ivypanda.com/essays/criminology-the-case-of-uncle-bob/.

References

IvyPanda. (2022) 'Criminology: The Case of Uncle Bob'. 3 October.

References

IvyPanda. 2022. "Criminology: The Case of Uncle Bob." October 3, 2022. https://ivypanda.com/essays/criminology-the-case-of-uncle-bob/.

1. IvyPanda. "Criminology: The Case of Uncle Bob." October 3, 2022. https://ivypanda.com/essays/criminology-the-case-of-uncle-bob/.


Bibliography


IvyPanda. "Criminology: The Case of Uncle Bob." October 3, 2022. https://ivypanda.com/essays/criminology-the-case-of-uncle-bob/.

Powered by CiteTotal, citation generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1