Systems Integration in Law Enforcement

Legal Justice Information Systems Integration in Law Enforcement

This report aims to present insights into the decision making process for justice information systems integration. Technological advances continue to become available which create opportunities for each locality and state to develop a governance process that will serve as a viable solution for its own jurisdiction while at the same time meshing with immediate and distant neighbors.

Don't use plagiarized sources. Get Your Custom Essay on
Systems Integration in Law Enforcement
Just from $9/Page
Order Essay



Justice Information Systems Integration

In today’s highly technologically advanced digital era, legal and governmental integration has become a reality. “During the Investigation process, at the Incident event, if law enforcement determines that a crime was committed, and if law enforcement collects latent fingerprints, the Law Enforcement sends the Latent Fingerprint Card to the State Repository for the Biometric Identification event in the Investigation process.” (Holmes, Webster, & Sullivan, 2004) Just like fingerprinting has been regularly shared by all law enforcement agencies in the United States and in many cases the entire world, system integration offers unique opportunities to make the entire system more efficient. For example, many law enforcement agencies today, including the FBI, CIA and NSA, all house individual DNA samples of both guilty and innocent people in their internal integrated electronic relational databases.

In the not so distant future, it will be possible for these individual entities to combine their DNA Fingerprinting resources to streamline the overall process. “Combining the results of several genetic systems as is done in DNA fingerprinting by the direct use of the product rule is based on an assumption of random mating, because it assumes that any profile of alleles at more than one locus occurs at random, that alleles at different loci even if initially found together in a subpopulation, will randomize over time.” (Schacter 155)

The norm in future criminal investigations will entail that if and when a crime is perpetrated and DNA evidence can be recovered, the police and other law enforcement agencies will have at their disposal a completely integrated DNA Fingerprinting database system where literally all previously obtained DNA fingerprints will be already in the database. Consider the implications of a thorough justice information systems integration process — there will be fewer inadvertent matches that lead to false convictions. Justice Information Systems Integration has an excellent future because of these implications.


This report is about Information Systems Integration in regard to the legal and justice systems of the nation. In our digital era, information has become a thread that provides an opportunity to tie the many aspects of our criminal justice process into a more efficient and effective system. “This project, funded by the Bureau of Justice Assistance, U.S. Department of Justice, is designed to facilitate the development of integrated justice information systems planning and implementation throughout the nation. Integration of justice information systems refers to the justice community’s ability to access and share critical information at key decision points throughout the justice process. It is through identification of these key decision points and development of information exchange models that SEARCH will further nationwide integration efforts.” (the Justice Information Exchange Model, 2005)

This system would combine the advances in technology with an overall reevaluation of the existing day-to-day manual processes so as to create an integrated criminal justice information system where there can be a seamless sharing of information at a plethora of critical decision points. These advances would occur at all levels of the progression from the highest court in the land to the local sheriff’s department. “The information shared includes all criminal justice related data, including photographs, fingerprints, DNA identification records, case records, court calendars, electronic messages and documents. Integration allows a single agency — such as a prosecutor’s office or a police department — to share information within itself and allows multiple agencies to share information with each other.” (Morton, 2005)


Before we had our complex information technology, computers were always single or ‘dumb’ terminals that could only accept information from a mainframe. But today, even small businesses sport basic networks with many individual nodes more powerful than the mainframes of only a few decades ago.

Networks have become a combination of integrated machines with very complicated software. and, as a result of their implementation, networks entail seamless communications. “Today’s network incorporates all sorts of wonderful but unsettling services. Voice data travels over the enterprise network. Files are shared. Corporate networks now include travelers and customers, often in the name of e-business and e-commerce.” (Avolio, 2000)

In the past, just like our antiquated justice system, machines could not speak with one another. Through standardization, the computing industry discovered a solution and from there networking and the likes of the internet became a reality. In less than sixty years, the computer industry literally transformed itself from the likes of the gargantuan UNIVAC housed over several rooms to PC’s that dwarf the UNIVAC’s capabilities. Through these innovations, the justice system has the means to rebuild itself as well.


How will the modern day justice system become more efficient and possibly more successful in the twenty-first century and beyond? The answer is simple, the entire system will need to take advantage of the technological advances and focus its time, efforts and resources in a direction that will meet the objectives of the entire community. “Criminal justice integration is a prime example of using it to solve problems and improve service to citizens. A survey of the Governors of all 50 states was conducted in the spring of 1999 to determine Governors top priorities for it applications, and nearly every responding governor listed criminal justice integration as a major near-term priority.” (Meyers, 2004)

This system would alter the makeup of any single agency such as a prosecutor’s office or a police department. These historically isolated entities would have the same information at their fingertips as any large governmentally supported agency once integration nears completion. “Project staff has developed a web-based modeling tool and a methodology to capture detailed information regarding the processes, events, agencies, information and exchange conditions associated with justice information integration, which was initially tested in five states: Colorado, Kansas, Minnesota, New Mexico and Pennsylvania, and has been introduced into over 20 jurisdictions.” (the Justice Information Exchange Model, 2005)

Justice information systems integration entails a very broad spectrum of interagency, interdisciplinary, and intergovernmental justice information sharing improvements. These initiatives would incorporate many changes that would differ between the variety of department to department communications, state to state interactions and the individual state to many different federal entities links. Integration implies a complete and efficient system where data can be routinely shared throughout the many levels and the many participants of the criminal justice system including the public at large and the media.

As the world continues to get smaller through advances in technology, social and environmental reevaluations will be required of the existing justice process. Non-technical changes will be as important as an installation of a new server because the business process of the justice system is just as antiquated as the communications and information aspects. These manual changes entail things like having trial lawyers no longer using hand written logs for court date scheduling and instead utilizing a court-based email and scheduling process that would greatly simplify the trial and court scheduling process.

Many individual organizations within the justice system already have distinct competitive advantages over their competition. The issue of course is that external entities are seen as competition. For example, the FBI has been upgrading its hardware and database technology for many years while local law enforcement agencies have barely enough money to man the streets. Where the difficulty will arise for an organization like the FBI therefore, will be in breaking down the wall that they have historically used to isolate themselves form information sharing. If a system wide integration of the justice system is to work, organizations such as the FBI will have to see themselves as a part of a system as opposed to an isolated industry leader – like a young child, they will literally have to learn how to share.


The various aspects of the justice system have historically been isolated processes that rarely worked well with one another. Sentencing, for example, was just one such aspect of the justice system that varied from state to state and locality to locality. One example of the disparity of sentencing can be demonstrated by the most extreme sentence, the death penalty. “Even though popular support for the death penalty is currently substantial, its use remains controversial, with support varying by region. Twelve states do not authorize the use of capital punishment, either because of a statutory or a judicial prohibition. Other states have announced moratoria on its use or are considering legislation to abolish it. Jurisdictions without the death penalty are Alaska, Hawaii, Iowa, Maine, Massachusetts, Michigan, Minnesota, North Dakota, Rhode Island, Vermont, West Virginia, Wisconsin, and the District of Columbia.” (Capital Punishment in U.S. Hit 30-Year Low in 2003)

Sentencing guidelines have historically been based on a type of criminal offender scorecard which was based on the levels or categories of crime. For instance, in the eyes of the courts, an offense’s level could be equated to the guideline for the seriousness of a crime. The next aspect of the scorecard was the offender’s personal or associative criminal history. Prior offenses dictated a level of conviction frequencies and social offenses. Therefore the personal criminal history of an individual ends up playing a major role in the sentencing guidelines. A person’s propensity to repeat offences entails longer sentences. The person that had a history of repeat offenses offered a greater threat and therefore was often thought to be more dangerous to society. but, how does the justice system maintain a culprit’s history without an ability to utilize integrated processes?

This is a prime example of where justice information systems integration could have far reaching implications. In regard to sentencing, first time offenders in one community may not have been labeled as serial offenders because of the lack of integration and communication between disparate communities. Far too often individuals were not severely punished when they committed crimes in one local that did not communicate with a local where the same offender had committed the same or a similar crime. Other examples can be seen when one agency searches for a potential criminal culprit even though that individual was already in custody in another jurisdiction unbeknownst to the first. Through an integrated jurisprudence system, these types of offenders are less likely to get away from multiple jurisdiction crimes. Thus, inter-community communication and systems integration will lead to more accurate sentencing and arrest patterns and therefore may reduce crime.


One area where the justice system integration will need to be epically careful is the area of security. Network security in networked environments has three main objectives. “Three basic security concepts important to information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.” (Dekker, 2004) an illegal entry into the justice system entails much more than a network for a different user. When illegal network accesses stalled the computer systems at Yahoo one summer could have far less reaching implications than a terrorist wiping out the all fingerprint files in as single swoop. Whatever the case, network security for an integrated justice system will have many entry points for criminal as well as legal elements. Consider that any high school kid with an F. average could have the basic knowledge to make an unauthorized access into a secure network environment. A integrated communication link in the justice system could therefore allow for access to the many people who know exactly what they are doing because they have grown up with this technology. Couple that with the fact that terrorists can represent whole nations and they have many tools at their disposal to bring our judicial system down. “Incidents can be broadly classified into several kinds: the probe, scan, account compromise, root compromise, packet sniffer, denial of service, exploitation of trust, malicious code, and Internet infrastructure attacks.” (Dekker, 2004)

The key is that if the integrated judicial systems are open-ended for ease of use, they may be insecure at best. No one who uses an ‘open ended network’ or that has access to an outside domain can be considered immune to security breeches. “Security and usability are often inversely proportional. There is no such thing as “complete security” in a usable system. Consequently, it’s important to concentrate on reducing risk, but not waste resources trying to eliminate it completely.” (Avolio, 2000) This integrated system will have a daunting task of protecting itself and the entire population. “Those affected include banks and financial companies, insurance companies, brokerage houses, consultants, government contractors, government agencies, hospitals and medical laboratories, network service providers, utility companies, the textile business, universities, and wholesale and retail trades.” (Dekker, 2004)


This report was about Information Systems Integration in regard to the legal and justice systems of the nation. We are currently a part of the twenty first century digital era where information has become a major part of the criminal justice process. In order to make the justice process more accurate, efficient and effective, integration will be required though the many diverse departments, localities, states and national systems. This system will need to combine the advances in technology with an overall reevaluation of the existing day-to-day manual processes. Integration of the justice information system will imply future seamless sharing of information at all points of the justice decision making process and advances will raise the level of expertise and efficiency from the highest court in the land to the local sheriff’s departments of the nation. “In recognition of this need to share information, many state and local jurisdictions, including the State of Iowa, are actively developing and implementing plans for comprehensive integrated justice information systems. Integrated systems improve the quality of information and thereby: improves public safety, eliminates data entry errors and redundant data entry, provides complete, current and timely data, improves the ability to evaluate policy decisions and changes, maximizes available resources, improves data retrieval response time, provides for better, more informed decision making, and improves the operational effectiveness of existing systems.” (Meyers, 2004)


Avolio, Frederick M. (2000, March 20). Best Practices in Network Security — as the Networking Landscape Changes, So Must the Policies That Govern Its Use. Don’t Be Afraid of Imperfection When it Comes to Developing Those for Your Group. Network Computing.

Capital Punishment in U.S. Hit 30-Year Low in 2003. Ed. All American Patriots. (March 1, 2005). Retrieved on April 21, 2005, from All American Patriots at

Dekker, Marcel. (n.d.). Security of the Internet. Retrieved on April 21, 2005, at

Holmes, Amir., Webster, Lawrence P., & Sullivan, Teri (2004). JIEM Reference Model. SEARCH, the National Consortium for Justice Information and Statistics. Retrieved on April 21, 2005, at

Meyers, D. (2004). Justice Information Systems Integration Summary. State of Iowa Implementation.

Morton, Heather. (n.d.). Integrated Criminal Justice Information Systems. Retrieved on April 21, 2005, from National Conference of State Legislatures Web Site:

The Justice Information Exchange Model. (2004). SEARCH Model. Retrieved on April 21, 2005, at

Schacter, Bernice. Issues and Dilemmas of Biotechnology: A Reference Guide. Westwood: Greenwood P, 1999.

Appendix a Information Technology

Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently

Online Academic Help With Different Subjects


Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.


Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!


While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.


Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.


In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.


Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.


We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!


We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.


Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment Help Service Works

1. Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2. Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3. Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4. Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essay GET A PERFECT SCORE!!! smile and order essay Buy Custom Essay

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: Content is protected !!
Open chat
Need assignment help? You can contact our live agent via WhatsApp using +1 718 717 2861

Feel free to ask questions, clarifications, or discounts available when placing an order.
  +1 718 717 2861           + 44 161 818 7126           [email protected]
  +1 718 717 2861         [email protected]