IntroductionThe usage of computer equipment has been massively increased since late 1960’s. There is a huge quantity of aspects have been powered this development. At first the physical labor was used extensively for the crime relating work and the practice of using very less proportion of departmental resources to R&D in this field or scope. Interests were changed in 1960’s, when improvement in police department services was noticed, by assigning dollars to the gear and machinery. In 1968 recommendations from commission on law enforcement and the administration were changed by the president. It was suggested that computer based technology should be introduced to the police department. This may play a significant part in the police work. Resources were provided by the Law Enforcement Assistance Administration (Colton, Kent W., 1979).In today’s world many challenges are being faced in the field of crime analysis when it is about collection, visualization and analyzing of data in fighting crime. Details of criminals in terms of who they are, where they belong, what is their family background, who they communicate with, and how they are connected and linked with other groups is a very tough task to gather and analyze using traditional investigation approach and procedures. In this world of crime and terrorism, it is very significant to collect information about the links and networks of every single suspect. It is also very significant to collect information about the suspect’s network members and their relationship between them wither they are directly related or indirectly related to each other. This will make it easy for the criminal investigation, moreover it will help to generate the concepts about the suspects. However sometimes traditional procedures cannot be used to visualize and evaluate data gathered on the suspects. We, in the present time where information technology play a significant role in our daily life of every single person, it makes it easier to rely on information technology and digital systems in fighting crime.Now a days, reliable and effective systems, computer gears, applications and well equipped intelligent devices are being built to gather, investigate and understand criminal records in real time working environment. The need for such systems that can effectively and efficiently analyze the data regarding criminal activities and suspects is growing day by day in combat crime. These present systems and applications must have the proficiency of giving accurate results based on intelligence from the basic or raw data. These applications must also have the capability of creating visual graphs which will make it easier to generate new concept about the suspects from the crime records in order to understand, solve the crime functions easily.Almost all the societies in the modern world are disturbed by the day by day increase of the criminal activities in every aspect of life, whether it is cybercrime or physical crime. Sometime these activities are executed by single individual and sometime an organized group is involved in committing a crime. While crime rates are rapidly increasing and vary from one country to another or from one region to another. Solving criminal cases has always been the privilege of the law enforcement specialists and the criminal justice. With the increase in use of the computer systems and applications to track the crime, computer analysts and data examiners have already started working with the law enforcement agencies and private detectives. This has increased the rate of solving crime. The best reliable and efficient way of fighting the crime these days cannot be imaginative without the help of geographical reporting. Criminal actions all across the globe have become very complex in such a way that the instant monitoring cannot be achieved without using intelligent devices and systems that can help the law enforcing agencies in graphically representing the crime (Quist, Aphetsi, 2013)Crime investigation procedures are required to analyze the connected sequence of crime cases to determine the most feasible area of suspect’s residence. By involving both qualitative and quantitative methods, it helps in developing understanding spatial attitude of the suspect and concentrating the investigation on the smaller area of the community. Usually used in cases of murder, physical violence, rape but also in suicide bombing, street crime, robbery and other crimes. This strategy helps police officers and private detectives gather information on the large scale, complex crime investigations that usually involves hundreds or even thousands of suspects and ideas.Detectives and police officers need to analyze the patterns of the whole case, this task is very crucial in fighting crime. Computer systems need to be ready to gather and capture the information and further perform different interpretation operations on it. This interpretation intelligence is used to control the criminal activities and influence decision making.Applications now a days are playing an important role in helping the law enforcing agencies to capture the suspects with the matter of seconds and minutes which was not even a matter of months at times. An iOS application named as FbF mobileMatch perform its functionality in combination with the FbF mobileOne additional fingerprint scanning device which is distributed by LLC, Fulcrum Biometrics and other authorized retailers. The application is used as a fingerprint gathering application, this is actual fingerprint scanner application that works when a device is noticed by the application and do not take it as a normal application or a toy, this application is used for serious purposes by the agencies and police detectives. One should not download or install this application if it did not have already purchased the FbF mobileOne fingerprint device. This ios app in no case works without the FbF mobileOne device.The mobileOne FbF device is authorized for use with all Apple devices like IPhone, iPad, and iPod touch. This application contains Federal Bureau of Investigation authorized finger scanner that gathers FIPS-201 and PIV licensed fingerprint photographs to an iOS device. It provide Actual fingerprint pictures that exactly meet the criteria of the high principles of law enforcement identification. This app permits users of the mobileOne app to gather the HD images of the fingerprint, having quality up to 500 dpi, HD thumbprint pictures. Moreover users are capable of saving the pictures to the smartphone device and share it with the help of email or post it on FTP server.Another Law Enforcement Agencies app named as MABIS, plays an important role in helping the detectives and law enforcing agencies to capture the suspects. In today’s constant threat of terrorism, receiving real-time data about suspects is essential. QiSQi Identification Technologies developed the MABIS platform and app that can register and identify fingerprints, faces, and iris in a fraction of a second The app runs on a standard or rugged Android mobile phone which makes it easy and fast to deploy without special hardware investments Armed with the mobile and touch less fingerprint biometrics software solution of Diamond Fortress, fingerprints are acquired by the mobile camera and deliver high quality images. The face recognition has unique 2D/3D enhancement features, which delivers highly accurate information. With the iris recognition implemented, MABIS is the first mobile phone to have all 3 major biometric identification algorithms. MABIS’ backend is powered by a high-speed AFIS, Minex compliant, 2D/3D face recognition and iris recognition, both military and police-grade algorithms with proven track records. MABIS is secured by the BioSSL biometric access control, which manages and centralises the administration of fingerprint, face or voice verification. A must for Police Forces, Border Control, Citizen and Immigration ServicesComputers are responsible to play a big role in the Criminal justice Field. If we talk about computers they have made it accessible for witnesses to go through and look for the suspects pictures on the computer screen. Only with the help of computers DNA test has become possible which is now the main source of identification between the innocent and the criminal in many cases. Computers take short time in labs to process, and finding the real criminals from cases maybe 15 years ago can now be charged for their sins and misdeeds.There are mini computers like laptops and notebooks installed in the police vehicles, this makes police officer get the information they are looking for. They get right information instantly, instead of waiting to get back to the stations. Some new cars have wireless technologies and internet connections which makes it even more reliable and convenient. This allows them to do great things in the matter of seconds.As we have discussed before, Computers allowed the use of fingerprint scanner and get the exact required information wherever required by the police department. Agencies can now take anyone’s fingerprint from anywhere they want and process it to check whether it has any link with the crime investigation or not (Hollywood, John, 2015)Also technology can be used the cause of fire in any building, computers are used to process the information whether it was fired by petrol, gasoline, kerosene or lighter fluid if the fire accidently happened.Computers are used at signals to measure the traffic jams and take decision according to the situation. Breaking traffic rules has become impossible for the audience, technology has made so much advancements that a car can be tracked using camera and can be fined instantly. Stolen cars can easily be tracked now a days which makes it even difficult for the thieves to rob it.So, there are a number of aspects in which technology is playing its role in the criminal justification. No matter which field we discuss, information technology has made things impossible things possible.Works CitedKester, Quist-Aphetsi. “Computer Aided Investigation: Visualization and Analysis of Data from Mobile Communication Devices Using Formal Concept Analysis.” arXiv preprint arXiv:1307.7788 (2013).Colton, Kent W., and James M. Tien. “Technology transfer of computer-based applications in law enforcement.” The Journal of Technology Transfer 4.1 (1979): 63-76.Hollywood, John S., et al. Using future internet technologies to strengthen criminal justice. RAND Corporation, 2015.