Free Essay

Easiest Way to Catch a Criminal

In:

Submitted By bwc99
Words 1565
Pages 7
Crimes occur every day from burglary, to killings, kidnapping, stealing, and many more. The people that commit those kind of crimes need to be caught so that they can pay their consequences which should help them realize the crime they committed was wrong. Catching a criminal is not easy so what are the most effective ways to catch a criminal? The forensic community plays an important role in helping out with this situation. Forensic scientist help law enforcements get a lead and solve a case. Forensic scientists use different devices like urine testing, DNA testing, DNA markers, and many more devices to help get a lead in a case in order to come to the decision of convicting the right person. Forensics technology has improved greatly over time
DNA
In most cases the easiest way to catch a criminal is by DNA. With DNA in a criminal case it can put you at the place of crime. There are some flaws with DNA though. There is always the possibility of people having the same DNA strands. And if a piece of hair or any other kind of DNA is found at a crime scene and that is the only evidence and two people have the same DNA strand there’s a possibility of the wrong person going to jail.
Once a crime has been committed the most important item to recover is any type of evidence left at the scene. If the suspect left any DNA at the crime scene, he could then be linked to the crime and eventually charged. A suspect’s DNA can be recovered if the suspect leaves a sample of his or her DNA at the crime scene. However, this method was not always used to track down a suspect. Not a long time ago, detectives used to use bite marks, blood stain detection, blood grouping as the primary tool to identify a suspect. DNA analysis has been the most recent technique employed by the forensic science community to identify a suspect or victim since the use of fingerprinting. Also since the introduction of this new technique it has been a large number of individual’s released or convicted of crimes based on DNA left at the crime scene. The use of this technique has played a critical role in the investigation of crimes.
DNA is a double helix molecule that contains information that is used to make up a person’s body. DNA controls every aspect of a person’s body from their eye and hair color, height, and other features. DNA’s specific and unique characteristic can be crucial when solving a crime. DNA can be used to convict a suspect or exonerate an innocent person. When DNA is found it is even more important that is handle properly to ensure proper identification and accuracy of testing.
Before the 1980s, courts relied on testimony and eyewitness accounts as a main source of evidence. But that was unreliable, these techniques have gone away to the reliability of DNA forensics. In 1984, British geneticist Alec Jeffreys of the University of Leicester discovered an interesting new marker in the human genome. Most DNA information is the same in every human, but the junk code between genes is unique to every person. Junk DNA used for investigative purposes can be found in blood, saliva, sexual fluid, skin tissue, bone marrow, and hair gland. By analyzing this junk code, Jeffreys found certain sequences of 10 to 100 base pairs repeated multiple times. These tandem repeats are also the same for all people, but the number of repeats is highly repeatable. Before this discovery, a drop of blood at a crime scene could only reveal a person’s blood type, plus a few proteins unique to certain people. Now DNA forensics can show a person’s gender, hair color, blood type and race.
DNA from animals and plants can also be utilized in criminal forensics. One of the most common uses of this is the analysis of pet hair from a crime scene, which often links its owner to the crime.
With living in a racist world we almost always assume the worst of somebody due to their race or gender. There have been many cases where the wrong person has gone to jail due to race or gender. And with DNA analysis it has helped many people get free from prison for crimes that they didn’t commit.
Fingerprinting
Fingerprinting is a technique to identify a criminal by. When you touch something it leaves a fingerprint on it due to sweat from your oil glands. Just like DNA it has its flaws. A fingerprint can always be smeared. And a black powder is used to pick up the print and if too much is used the print can be ruined.
Fingerprints are unique when it comes to crime detection. No two people have been found to have the same fingerprints. They are totally unique. There’s a one in 64 billion chance that your fingerprint will match up exactly with someone else’s. Fingerprints are even more unique than DNA, the genetic material in each of our cells. Although identical twins can share the same DNA, or at least most of it they can’t have the same fingerprints. Fingerprinting is one form of biometrics, a science that uses people’s physical characteristics to identify them. Fingerprints are ideal for this purpose because they are inexpensive to collect and analyze, and they never change, even as people age. Although hands and feet have many ridged area that could be used for identification, fingerprints became a popular form of biometrics because they are easy to classify and sort. Scientists look at the arrangement, shape, size and number of lines in these fingerprint patterns to distinguish one from another. They also analyze very tiny characteristics called minutiae, which can’t be seen with the naked eye. Fingerprints are made of an arrangement of ridges, called friction ridges. Each ridge contains pores, which are attached to sweat glands under the skin. You leave fingerprints on glasses, tables and just about anything else you touch because of this sweat.
When a police officer or a forensics expert takes someone’s fingerprint they can do it two ways the second one is the easiest and most common. The first one is creating an ink fingerprint. To create an ink fingerprint, the person’s finger is first cleaned with alcohol to remove any sweat and dried thoroughly. The person rolls his or her fingertips in ink to cover the entire fingerprint area. Then, each finger is rolled onto prepared cards from one side of the fingernail to the other. These are called rolled fingerprints. All fingers of each hand are placed down on the bottom of the card at a 45 degree angle to produce a set of flat impressions. These are used to verify the accuracy of the rolled impressions. The second one is through digital scanners. Digital scanners capture an image of the fingerprint. To create a digital fingerprint, a person places his or her finger on an optical or silicon reader surface and holds it there for a few seconds. The police officer or forensics expert converts the information from the scan into digital data patterns. The computer then maps the points on the fingerprints and uses those points to search for similar patterns in the database.
Law enforcement agents can analyze fingerprints they find at the scene of a crime. There are two different types of prints. One is visible prints. Visible prints which are made on a type of surface that creates an impression, like blood, dirt or clay. The second one is latent prints. Latent prints which are made when sweat, oil and other substances on the skin reproduce the ridge structure of the fingerprints on a glass, murder weapon or any other surface the perpetrator has touched. These prints can’t be seen with naked eye, but can be made visible using black powder.
I think that DNA is a better way than fingerprints to catch a criminal. One reason why I think this is fingerprint’s can get ruined or smudged and you can’t recover the whole print. But with DNA you can easily conserve it and keep it for later testings. One more reason why I think that DNA is a better way than fingerprint’s to catch a criminal is because with fingerprint’s there is only one way to identify him or her and that is with the fingerprint. But with DNA you can find the DNA in blood, bone, saliva, hair, and many more thing. One more reason why I think that DNA is a better way than fingerprint’s to catch a criminal is because you can find DNA anywhere at a crime scene. You can find it on the floor or on the wall or even on the victim. But with fingerprints they are only found on walls or objects like a gun. You can’t find a fingerprint on the victim from the criminal. And the last reason that I think that DNA is a better way to catch a criminal than fingerprint’s is because there is no way to get rid of your DNA. But with fingerprints there is an acid that can remove your fingerprints for a short period of time which is enough time to commit a crime. In conclusion I think that DNA is a better way to catch a criminal.

Similar Documents

Free Essay

Cyber Crime

...anything for their name. Some people do this just so they can feel like they can be who ever they want to be without it coming back to their real selves. However, some people do this so they can get information on someone that otherwise would not give out information; or to gain the trust of someone so they can hurt them; plus, many other reasons. Law Enforcement can use this trick too, as can be seen on NBC’s To Catch a Predator. On this program, law enforcement pretends to be underage children in order to catch older men trying to take advantage of them. In addition to concealing identity, many people also steal others’ identity. Some may do this just to conceal their identity, but mostly it’s so they can steal credit information. Today, one of the biggest crimes, and hardest to prove, is credit card fraud. Once someone has stolen someone else’s identity, then they can obtain credit cards, driver’s license, mortgages, etc in the others name. Then, when they cannot pay for things, they simply disappear and the victim is held responsible for the money owed. The easiest way to stay on top of this is to run a credit check on one’s self every year to make sure all credit cards and loans indeed are due by them. With most banks handling charges...

Words: 1179 - Pages: 5

Premium Essay

Compare And Contrast Sting Operations Vs Entrapment

...law enforcement by deceit, I have researched and analyzed which of the two methods work best out of “Sting Operations” and “Entrapment”. After it was all said and done, I found that sting operations came out with better results than performing entrapments in order to catch criminals. Although it wasn’t the easiest conclusion to come to, it was evident that the best method of the two in law enforcements by deceit was by far the sting operations since sting operations actually had more of a deterrence than entrapment. However, before I could come to this conclusion, I had to first gain a good understanding as to what the actual meaning of each term meant and why the use of either was even necessary in some law enforcements eyes. Sting operations are opportunities or enticements to commit a crime, either created or exploited by police. Law enforcement agents find it necessary to engage in sting operations simply because some situations where a criminal is not able to be captured under normal circumstance or efforts, they are able to incorporate this deceitful method with the help of the public to capture these hard to catch...

Words: 543 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...of the attacks will target to get the credentials of the user, so that, they no need to go through all the difficulties in finding out the ip address then look at the ports and all that stuff. Of the reported incidents in 2015 as per the report, 63% of proved date breaches involved weak, default or stolen passwords. These happen mostly in the Web application attacks, and the POS Intrusions. One simple thing that we ignore is that by maintaining static credentials, a user is luring the attacker for easy way of intrusion. Compare to other methodologies of...

Words: 584 - Pages: 3

Premium Essay

Crime and Crime Prevention

...Assignment B – Crime and Crime prevention ICT has greatly contributed to better crime prevention but has also increased some forms of crime. Many Internet criminals are using a number of different methods in order to take what they want from unsuspecting members of the public. There are multiple reasons why criminals commit crime via the Internet, however the most common crimes are the theft of money, the theft of identities or information and finally the damaging of others computers via methods such as viruses. Out of all of the crimes committed over the internet the theft of money from others is the largest due to a number of reasons, however the main reason is that its probably the easiest to do as more and more people are buying and selling products over the internet with the use of credit or debit cards. Criminals are easily able to access these details if members of the public aren’t careful with their details, for example if a member of the public puts their details into an unsecure website there is a great risk of a criminal obtaining this information. Crime prevention has been massively improved with the introduction of tracking devices, CCTV (Close Circuit Television), face recognition software and hacking which can, when used correctly, be used to trace the location or activity of a criminal. Personally, CCTV has never effected or helped me, but I have known people who have had their vehicle or important items stolen from vehicles; CCTV helped them to identify...

Words: 2103 - Pages: 9

Free Essay

White Collar Crimes- Why Are They Less Prosecuted Than Blue Collar Crimes

...Byce had no criminal record and was the average person. This meant there was no reason to suspect her. She did have pressure and opportunity to commit fraud though. She had a gambling addiction at the time, which can lead to needing money and then more money. No one else probably even knew she had a gambling addiction. She also had medical issues, Crohn’s Disease, which led to surgeries and continuing surgery. Of course, these surgeries and treatments would have cost money. (Damien, 2009) Byce committed fraud with one of the easiest assets- cash. Through a lack on internal controls she was able to conceal her crimes well. She received blank pre-signed checks so there was no one verifying the checks to invoices and purchase orders. She also forged the contracts for purchases to which she wrote the checks. She was the one person in charge of it all. The she converted the checks into an account for the organization which she then wrote checks to herself from. She also kept two sets of books, which should have raised concern. (Damien, 2009) These checks Byce wrote were for forged purchase contracts. With better inventory controls the company should have noticed that the amount of cattle did not change even though there were checks written saying that inventory should have changed. This should have been a big red-flag to the companies. Also, the fact that she forged documents all the way down to receipts and vet records shows a lack of control. No one called about...

Words: 863 - Pages: 4

Premium Essay

Cyber-Crimes Paper

...include acts and commissions that are a breach of law counterbalanced by sanctions from the state. Cybercrime is the latest and most complicated problem in the cyber- world. Illegal methods of cybercrime are financial crimes, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber-defamation, and cyber- stalking (Dashora, 2008). Cyber-Crimes and the Advancement of Technology In modern day, the economy is doing poorly and unemployment rates are at its highest. Individuals are struggling to obtain a job that pays well. It is sad to know that criminals are taking advantage of other individuals but these criminals never think about how they are hurting others by what they do. Cyber-crimes have become so popular in other countries and money laundering is a type of cyber-crime that has become a huge issue over the years. Today’s technology has made it easier for criminals to commit cyber-crimes because he or she does not have to expose his or her face because of the Internet. The new trend is for scammers to solicit through e-mails about job offers to trick individuals into falling for payment transfer scams (Hoax-Slayer, 2012). The recipient does not notice that he or she has committed a money laundering scam and if discovered, the trace goes right back to the recipient. There are many instances which the scammer tells the recipient that they have a job offer for them and that the recipient needs to send them his or her personal information to...

Words: 1393 - Pages: 6

Premium Essay

Case Study: Misdemeanor Vs. Felony

...WHAT A CROCK! I'm finding out none of those so call legal documents means a DAMN THING. John L. Long has been a step ahead of me the whole time. He's known he will not face severe punishment in the court for stealing my money and he wouldn't have to return my $1, 500.00. It's the easiest $1,500.00 he's ever made thinks to the help of the court system. As I'm running around in circles back and forth to court, writing letters and copying documents mailing them to the court representatives wasting my time accomplishing nothing. CRIME DOESN'T PAY is the biggest lie and I'm just finding that out. A misdemeanor for stealing $1,500.00 from a 70 year old person who was just trying to make his home wheelchair accessible. I thought our legal system in a civilized society was design to make it unnecessary for gun fights in the streets, like in the westerns, to settle...

Words: 1147 - Pages: 5

Premium Essay

Internal Controls Xacc 280 Week 8

...Internal Controls XACC/280 m m Internal controls are an integral part of a business operation because of the extreme importance of assets. Assets are basically an economically valued item owned by an individual or corporation, which most often has a direct conversion rate to cash. Examples are cash, securities, accounts receivable, in-stock product, business equipment, real-estate, cars, and other valuable property. Assets are business resources which could lead to being able to generate future services and benefits. Operational goals of profitability are achieved through a company’s assets. These are the resources and possessions which allow businesses and corporations to provide goods and services to generate profits. Assets can be current assets like cash, accounts receivable, inventory, and prepaid expenses that generate profits or gains within the current accounting period. They also can be long-term items such as property and business equipment.    Since these assets are a businesses’ or corporations’ most valuable resources, they must be protected from theft and unauthorized use by creating, and implementing, a company “internal controls system.” Internal controls are procedures and protocols by which a company conducts internal monitoring. Through taking it upon itself to audit its own business dealings, a company increases the chance of success. Also, these controls systems ensure the liable parties invested in companies that their business are running...

Words: 1232 - Pages: 5

Premium Essay

Frensic Psychology

...the individuals offender’s behavior. Forensic Science has other sciences that coordinates its goal such as Legal Psychology which will decide whether an offender is on conditions to go or not to court and correctional psychology that will follow the behavior and rehab on an offender Introduction In the show Criminal Minds on A&E, they show a dramatize version of what very few talented people do daily. Although, it is not what really happens it gives people a light overview on something that is more realistic and detailed. Solving a case, analyzing an offender takes time and a lot of research on the individual. However, their job does not finish when they catch the bad guy because that is just the beginning of a long work on rehabilitation to prevent by analyzing the motive of every offender and been able to prevent more crimes of occurring. Legal and Correctional Psychology follows the behavior of the offender during their time inside and outside the correctional with the only purpose to understand what lead them to offense in order to prevent more murders, suicide , child abuse and so on. In America, Forensic Psychology plays an important role in the Criminal Justice System, with special focus in Legal and Correctional Psychology. In the last 30 years Forensic Psychology has developed as a field and in 2001 was recognized by the psychological American Association (APA)( Heilbrun, K., & Brooks, S). It is well known worldwide and for helping Juries and supplying...

Words: 1648 - Pages: 7

Premium Essay

Cheating in School

...education. Everyone who desires an education should realize the important fact although the tools are out there and it has become easier to cheat, it has also become much easier to get caught. The internet has played an advanced role in the aid of assisting students in cheating; however, it has also played a useful roll in catching them as well. Online websites such as schoolsucks.com, flashpapers.com, and hundreds of others have made buying a term paper as easy as the click of a mouse. On the flipside of this many websites also exist to combat plagiarism by offering tools to help students ensure that they have not plagiarized their paper. Websites such as turnitin.com, eazypaper.com, and plagiarism.org offer students and instructors a way of checking their paper to ensure that it has been cited correctly. The excuses fly when it comes to...

Words: 1769 - Pages: 8

Premium Essay

Fair Tax Act

...The FairTax Act Many debates have been waged over the decades on what will be taxed, on who shall be taxed and how taxes are collected. Since the 16th Amendment was ratified in 1913, the debate has intensified, centering on how high to make the income tax rate. Most Americans were not concerned since the Amendment was sold to them as something that would only affect corporations and the rich. With ever increasing fervor these corporations created lobbyists to convince Congress to exempt them from some or all of the income tax. The big breakthrough in this was taxing the worker directly with payroll taxes during World War II. This method of collecting income tax was sold to Americans as temporary, but Congress has extended it indefinitely and the public has become used to it. The next few decades saw the debate revolve around creating tax breaks for individuals in an attempt to modify behavior or spending. This has resulted in over 67,000 pages of tax code and an entire industry devoted to tax compliance and evasion, with the unintended behavioral change of corporations and the rich parking their money outside of the United States in small island nations to avoid taxation. These offshore accounts are estimated to hold $10 trillion dollars, a number approximate to the national debt. The FairTax Act should be enacted because it eliminates all federal income taxes for individuals and corporations, eliminates all federal payroll withholding taxes, abolishes estate and...

Words: 1878 - Pages: 8

Free Essay

Something for Nothing

...SOMETHING for NOTHING The Causes and Cures of All Our Problems and What You Can Do to Save the American Dream BRIAN TRACY Eagle House Publishing Corporation 2004 Eagle House Publishing Corporation 1117 Desert Lane, Suite 1228 Las Vegas, NV 89102 USA www.eaglehouse.biz eaglehousepc@hotmail.com Copyright © 2004 Brian Tracy. All rights reserved. First Eagle House Publishing Corporation electronic edition 2004 ISBN 0-976123-92-4 To my wonderful wife Barbara, who has encouraged me to write this book for twenty-five years. Without her continued inspiration, these ideas may never have been available to mankind. Contents Introduction. A Society in Crisis ..................................................1 Chapter One. Why We Do the Things We Do .............................7 Chapter Two. What We All Want ...............................................29 Chapter Three. Simple as ABC ...................................................45 Chapter Four. Character Reigns .................................................63 Chapter Five. The Current Dilemma ..........................................79 Chapter Six. Government, Politics and Power ............................93 Chapter Seven. The Foundationsof the American Dream .........116 Chapter Eight. Working For a Living .......................................126 Chapter Nine. Law, Order and Crime ......................................138 Chapter Ten. Welfare,Entitlements and Society ........................148 Chapter...

Words: 63862 - Pages: 256

Free Essay

Avoiding Identity Theft

...Avoiding Identity Theft Gary Lee Kaplan University CM 220 Kelley Gordon Avoiding Identity Theft Ben Franklin once said “An ounce of prevention is worth a pound of cure” Well this has never been truer than in today’s hi-tech society where our personal information flows freely over the internet. Identity theft has become a wide-spread crime committed by thieves who use stolen personal information to commit various types of fraud. Simply put, identity theft is a crime that takes your personal information and uses it to open unauthorized accounts, make purchases and acquire loans without the victim’s knowledge. So in order to protect against identity theft citizens should understand how identity thieves work, guard their personal information, and learn what measures to take if this does happen to them. No one is safe from identity theft but the elderly are especially vulnerable. Americans over the age of 60 are the fastest growing segment of computer and Internet users today. And according to the FBI, they are also the targets of identity theft more often than anyone else (FBI, 2011). Identity thieves target senior citizens because they don't regularly check credit-card statements, review credit reports or monitor their bank statements. Identity theft can be broken down into two separate categories (Identity Theft & Identity Fraud) since it is actually a two part crime. Identity theft is the actual act of obtaining personal information...

Words: 1963 - Pages: 8

Free Essay

Article About Internal Fraud

...THE CROOKS in your company have never been so tempted. The spread of technology that makes office work easier can make white-collar crimes almost laughably simple. Laser printers can forge documents with breathtaking fidelity, and color copiers can reproduce them. Imagine a dishonest executive boarding a plane and carrying a laptop computer with a modem. Using the on- board telephone, he hooks up to the mainframe at headquarters and transfers $50 million to his Swiss bank account -- as he jets toward Rio. Such new opportunities, plus the spirit of an age that encourages rather than represses the natural lust for wealth, are greatly intensifying the allure of ripping off one's employer. The amounts being stolen from companies appear to be growing dramatically. In the past several weeks a former General Electric Capital manager, allegedly in cahoots with a bank vice president, was charged with taking $30,000 in kickbacks as part of a scheme that resulted in $4.5 million of fraudulent loans. A Continental Illinois vice president went on trial charged with approving $1 billion of bad loans in exchange for $585,000 in kickbacks, loans that allegedly cost the Chicago bank $800 million and helped trigger its 1984 collapse. FDIC investigators say internal fraud was the major cause of one-third of all bank failures over the past two years. To some extent the victims have themselves to blame. A company with shoddy financial controls or badly trained internal auditors practically begs employees...

Words: 2951 - Pages: 12

Free Essay

Security Attack

...Information Systems Security By: Jessica Burnheimer, Kathleen Cline, Brian Weiss Outline for Group paper I. Introduction II. Issues concerning Information Systems Security A. Define IS security B. Why IS security is necessary? C. History and Back round of IS security D. Current issues concerning IS security 1.) Spamming 2.) Hacking 3.) Jamming 4.) Malicious software 5.) Sniffing 6.) Spoofing 7.) Identity Theft III. Solutions to contemporary IS security issues A. Solutions for “Spamming” B. Solutions for “Hacking” C. Solutions for “Jamming” D. Solutions for “Malicious Software” E. Solutions for “Sniffing” F. Solutions for “Spoofing” G. Solutions for “Identity Theft” IV. The Future of Information Systems Security A. New technologies and techniques effecting the future of Information Systems Security B. Tips and information regarding maintaining a Secure Information System C. How security issues will continue to shape Information Systems Management V. Conclusion Abstract The purpose of this paper is to discuss the pressing issues pertaining to Information Systems security. We will be covering the history of Information Systems Security, the current security issues, and why it is important to be knowledgeable in Information Systems security. Also, we will cover some solutions to the issues that...

Words: 4780 - Pages: 20