Criminal Identification Procedure in the 21st Century
University of Phoenix
The current ways in which we gain the identification of criminals and suspects has drastically changed over the course of the 21st century. In this paper, we will discuss technological advances in criminal identification mainly biometric identification. The technological advance will be described, as well as, going over the advantages and disadvantages. This paper will also look at how the due process model and the crime control model looks at biometric identification. A summarization of the findings will be made as well as any recommendations concerning the use of the biometric identification.
In the Criminal Justice System, they gain criminals identity in many ways. Some ways are by DNA analysis, Biometric Identification, Camera and wiretap surveillance, and fingerprint analysis. This paper will focus on the technology of Biometric Identification. What are some of the advantages to biometric identification and what are some of the disadvantages? With all of the current technological advances that are being done in criminal procedure you have to wonder if the constitutional rights of the accused are being upheld and from what perspective; The Due Process Model or the Crime Control Model? In order to answer those questions we must first look at what biometric identification is and how it works. Biometric Identification
Biometric identifications have been associated with very costly top secure applications. Today the cost of such applications is going down due to the evolving technologies. Biometric identification has become a now cost effective, reliable, and highly accurate way to obtain a persons identity.
What exactly is Biometric Identification? "The term "biometrics" refers strictly speaking to a science involving the statistical analysis of the biological characteristics." (Huopio, 1998) In this case, biometrics is used in a context of analyzing human characteristics for security and identification purposes. The difference can be clarified by the following definition: "A biometric is a unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" (Huopio, 1998) The part of a human that is being measured can be physical, such as an eye, face, finger image, hand and voice or behavioral, like signature and typing rhythm. Biometric system must be able to recognize or verify it quickly and automatically.
Biometric products are probably the highest form of security. There are three levels of security defined as the following:
The lowest level is something that you have in your possession, such as a badge with your photograph on it.
The second level is something that you know, such as a password used with a computer login or a PIN code used for your ATM card.
The highest level of security is something what you are and something that you do. This essentially is what biometrics is all about.
Biometrics can be used in several various ways to establish someone's identity. One of these ways is by recognition or identification. Another way is by verification. The same steps are taken to authenticate a person's identity. There are four stages. The first stage is capture. In this stage, a physical or behavioral sample is captured by the system. The second stage is extraction. In this stage, a unique data is extracted from the sample and a template is created. The third stage is comparison, in the stage the template is then compared with a new sample. The fourth and final stage is match/non-match. This is the stage where the system decides if the feature extracted from the new sample is a match.
Biometric systems can come in many different shape and sizes, but they all have the same fundamental principle of capture, extraction, comparison, and matching. Different biometrics, measure or traits of a...
References: Technovelgy.com – where science meets fiction, Biometric Identification – advantages,
Copyright 2000 Technovelgy LLC http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=14 retrieved 07/15/06
Murali, Biometrics; She Unlimited Network, vBulletin v3.0.7, Copyright 2000-2006, Jelsoft Enterprises Ltd. http://www.sheunlimited.com/forums/archive/index.php/t-1611.html retrieved 07/15/06
Huopio, Simo 1998; Biometric Identification, Network Security 1998: Biometric Identification; Helsinki University of Technology; http://www.tml.tkk.fi/Opinnot/Tik-110.501/1998/papers/12biometric retrieved 07/15/06
Please join StudyMode to read the full document