In order to understand how the data is collected for an individual when he/she goes through the system, it is imperative to understand how the system works and what are the sequence of events in the Criminal Justice System(CJS). Below is the diagrammatic representation of the sequence of events that follow in the CJS.
As the scope of our project has been restricted to the Arrest and Pretrial process the focus of our research was these two phases and the decision points that fall in these phases. To start off it was essential to understand what is Arrest and Pretrial process and what these processes entails.
Figure 1: Sequence of Events in Criminal …show more content…
Here’s the procedure used with some variations in many states in which a prosecutor files charges without a grand jury. Pre-trial procedures in criminal cases follow the general pattern of civil cases, but with important variations. For one thing, the process is apt to be very different depending on the severity of the crime. In general, the more important the offense, the more elaborate the process. The most serious crimes are felonies , crimes such as robbery, assault with a deadly weapon, and sexual assault, for which the punishment on conviction is imprisonment at least a year, usually in a state or federal penitentiary. Misdemeanors are less serious crimes, such as simple assault, driving while intoxicated, and trespassing, for which punishment on conviction could be a term of incarceration of less than a year, usually in a local jail. Traffic infractions and petty misdemeanors include minor moving violations, parking violations and littering. They’re usually just punished by …show more content…
If there are no prior convictions, then the booking information is recorded during which the arrest number is generated that is unique to each conviction. After this the photograph is clicked and and the fingerprints are taken during which the NISC number is generated which is a unique identifier for each suspect who enters into the system. This number stays with the suspect and all the arrests for that suspect gets tied to this NISC number. Once the fingerprinting is done the FBI database gets queried. If takes three and a half hours for the FBI database to return a response. If the FBI database returns a hit, the police await further instructions from the FBI. If not,depending on the severity of the crime the documents are sent to the DA’s office. These documents are either emailed or