skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 64229 Find in a Library
Title: COMPUTER EXPEDITES IDENTIFICATION OF ARRESTED PERSONS
Journal: LAW AND ORDER  Volume:27  Issue:12  Dated:(DECEMBER 1979)  Pages:40,42-44
Author(s): J J ZURAWSKI
Corporate Author: Copp Organization, Inc
United States of America
Date Published: 1979
Page Count: 4
Sponsoring Agency: Copp Organization, Inc
New York, NY 10018
Format: Article
Language: English
Country: United States of America
Annotation: THE SYSTEM CONFIGURATION, SEARCH PROCEDURE AND FORMAT, AND SECURITY ARE DESCRIBED FOR THE CHICAGO POLICE DEPARTMENT'S COMPUTERIZED IDENTIFICATION OF ARRESTEES SYSTEM.
Abstract: TO BEST MEET THE REQUIREMENTS OF ITS IDENTIFICATION SECTION, THE CHICAGO POLICE DEPARTMENT HAS A COMPUTER SYSTEM DESIGNED IN WHICH SEVEN TERMINAL SITES ARE HARDWIRED TO HAVE SIMUL-REAL-TIME ACCESS TO A FOUR-PHASE SYSTEM IV/90. THE PRIMARY SEARCH TECHNIQUE INVOLVES THE USE OF THE 'SOUNDEX' SYSTEM TO TRY FOR A 'HIT' IN THE FILE USING AN ARRESTED PERSON'S NAME. SEARCHES MAY ALSO BE MADE BY FINGERPRINT CODE (EITHER THE FULL CODE OR THE PRIMARY AND SECONDARY CLASSIFICATION), SEX, RACE, AND BIRTHDATE. WHEN A SEARCH RESULTS IN A 'HIT,' THE TERMINAL OPERATOR CAN REQUEST THE COMPUTER TO PROVIDE A MASTER-RECORD DISPLAY. FOR SECURITY PURPOSES, PHYSICAL ACCESS TO THE TERMINALS IS CONTROLLED, AND A BUILT-IN, FOUR-LEVEL SECURITY SYSTEM RESTRICTS DATA ACCESS TO AUTHORIZED PERSONNEL. A DETAILED AUDIT TRAIL IS PRODUCED WHENEVER THE FACILITY IS USED. HARD-COPY DAILY REPORTS ARE GENERATED TO INFORM SUPERVISORY PERSONNEL OF ANY RECORD MODIFICATIONS MADE THE PREVIOUS DAY. (RCB)
Index Term(s): Computer hardware systems; Computer privacy and security; Computer software; Computerized criminal histories; Illinois; Police information systems; Suspect identification
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=64229

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.