Encyclopedia of Computer Science and Technology
Encyclopedia of Computer Science and Technology
Encyclopedia of Computer Science and Technology
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
legal s<strong>of</strong>tware 273Development <strong>and</strong> TrendsThe idea <strong>of</strong> small, portable personal computers goes backto the Dynabook concept developed at Xerox PARC in the1970s (see also Kay, Alan). The first “portable” computerswere <strong>of</strong>ten more aptly described as “luggable,” having morethe form factor <strong>of</strong> a suitcase than that <strong>of</strong> today’s laptops.Nevertheless, the first commercially successful portablecomputers, the Osborne 1 (1981) <strong>and</strong> the Compaq Portable(1983), began to show the feasibility <strong>of</strong> portable computing.(At the other end <strong>of</strong> the size spectrum, the successfulRadio Shack TRS-80 Model 100 established the utility <strong>of</strong>the notebook-sized computer.) In the 1980s true laptopsfrom companies such as Zenith <strong>and</strong> Toshiba with the familiarclamshell design emerged, running PC-compatible MS-DOS <strong>and</strong>, later, Windows applications. (Apple entered themarket with the Macintosh Portable in 1989, followed bythe PowerBook series, introduced in 1991.)Most improvements in laptops in the 1990s <strong>and</strong> beyondhave been incremental (more storage, sharper displays,more efficient batteries, <strong>and</strong> so on). Wireless (see Bluetooth<strong>and</strong> wireless <strong>and</strong> mobile computing) connectivityis now st<strong>and</strong>ard. Laptop development has bifurcatedsomewhat, with higher-end machines rivaling desktops formedia, gaming, <strong>and</strong> other applications, while notebooks<strong>of</strong>ten become lighter, sometimes forgoing optical <strong>and</strong> evenhard drives in favor <strong>of</strong> network connectivity <strong>and</strong> flash memorystorage. Specially “ruggedized” laptops are used by themilitary on battlefields <strong>and</strong> in other harsh environments.Meanwhile, PDAs <strong>and</strong> smart phones capable <strong>of</strong> e-mail, Webbrowsing, <strong>and</strong> light data entry <strong>of</strong>fer an alternative to laptopsfor people who are on the road frequently.Further ReadingGookin, Dan. Laptops for Dummies. 2nd ed. Hoboken, N.J.: Wiley,2006.Laptop Magazine. Available online. URL: http://www.laptopmag.com/index.htm. Accessed September 26, 2007.Laptops [resources <strong>and</strong> reviews]. Available online. URL: http://reviews.cnet.com/laptops.html. Accessed September 26, 2007.Miller, Michael. Your First Notebook PC. Indianapolis: Que, 2008.S<strong>and</strong>ler, Corey. Upgrading & Fixing Laptops for Dummies. Indianapolis:Wiley, 2006.Wilson, James E. Vintage Laptop <strong>Computer</strong>s: First Decade, 1980–89.Denver, Colo.: Outskirts Press, 2006.law enforcement <strong>and</strong> computersBesides his superb reasoning skills, perhaps Sherlock Holmes’smost important asset was his extensive collection <strong>of</strong>notes that provided a cross-referenced index to London’scriminal underworld. Today computer applications havegiven law enforcers investigative, forensic, communication,tactical, <strong>and</strong> management tools that Holmes <strong>and</strong> his rivalsin the old Scotl<strong>and</strong> Yard could not have imagined.For the <strong>of</strong>ficer on the street, the ability to obtain autolicense, stolen vehicle, or outst<strong>and</strong>ing warrant information innear real-time provides a much better picture <strong>of</strong> the potentialrisk in making stops or arrests. Other “tactical” technologyincludes new devices for homing in on gunshots <strong>and</strong> thegrowing use <strong>of</strong> remote-controlled robots for bomb disposal<strong>and</strong> hostage negotiations (see robotics). A more controversialarea is the use <strong>of</strong> CCTV (closed-circuit TV) surveillancecameras in public places, advocated as a crime deterrent butraising concerns about privacy <strong>and</strong> intrusive social control.If a criminal case is opened, a variety <strong>of</strong> s<strong>of</strong>tware applicationscome into play. These include case managementprograms for keeping track <strong>of</strong> evidence <strong>and</strong> witness interviews.Evidence must be properly logged at all times tomaintain a legally defensible chain <strong>of</strong> custody against accusations<strong>of</strong> tampering.The investigation <strong>of</strong> a crime involves many computerizedforensic aids. Besides automated matching <strong>of</strong>fingerprints <strong>and</strong>, increasingly other physical data (see biometrics),records can also be searched to detect patternssuch as crimes with related modus oper<strong>and</strong>i (MOs). Theability to access information from other jurisdictions <strong>and</strong>to interface federal, state, <strong>and</strong> local agencies is also veryimportant, particularly for cases involving organized crime,interstate fugitives, <strong>and</strong> terrorism.Since data stored on computers is an increasingly prevalentform <strong>of</strong> evidence, law enforcement specialists must alsoemploy tools to recover data that may have been partiallyerased or encrypted by suspects (see computer forensics).<strong>Computer</strong>s can be more active instruments <strong>of</strong> crime (seecomputer crime <strong>and</strong> security). Such traditional tools aswiretapping must be adapted to new forms <strong>of</strong> communicationsuch as e-mail while addressing concerns about civilliberties <strong>and</strong> privacy (see privacy in the digital age).High-level planning for law enforcement budgets <strong>and</strong>priorities requires access to detailed crime statistics. At thenational level, the Justice Department’s Bureau <strong>of</strong> JusticeStatistics is a definitive information source. Law enforcers,like other pr<strong>of</strong>essionals, increasingly use Web sites,chat areas, <strong>and</strong> e-mail lists to discuss computer-related lawenforcement issues with colleagues.Law enforcement agencies also use the same “bread <strong>and</strong>butter” s<strong>of</strong>tware needed by any substantial organization,including word processing, spreadsheet, payroll, <strong>and</strong> otheraccounting programs.Further ReadingBoba, Rachel. Crime Analysis <strong>and</strong> Crime Mapping. Thous<strong>and</strong> Oaks,Calif.: Sage Publications, 2005.Chu, James. Law Enforcement Information <strong>Technology</strong>: A Managerial,Operational, <strong>and</strong> Practitioner Guide. Gr<strong>and</strong> Rapids, Mich.:CRC Press, 2001.Foster, Raymond E. Police <strong>Technology</strong>. Upper Saddle River, N.J.:Prentice Hall, 2004.Goold, Benjamin J. CCTV <strong>and</strong> Policing: Public Area Surveillance <strong>and</strong>Police Practices in Britain. New York: Oxford University Press,2004.Gottschalk, Petter. Knowledge Management Systems in Law Enforcement:Technologies <strong>and</strong> Techniques. Hershey, Pa.: Idea GroupPublishing, 2006.Pattvina, April, ed. Information <strong>Technology</strong> <strong>and</strong> the Criminal JusticeSystem. Thous<strong>and</strong> Oaks, Calif.: Sage Publications, 2004.legal s<strong>of</strong>twareModern law <strong>of</strong>fices rely heavily on s<strong>of</strong>tware to managecases <strong>and</strong> records, to perform legal research, <strong>and</strong> to prepare