Exam 1 Review: Technology and the Criminal Justice System



Final Exam Review Sheet

Section 1 Key Terms: New Technology and Crime

1. Richard Sparks’s typology: Crime as Work, Crime at Work, and Crime after Work. (examples) – Textbook, Lecture

2. The Private Sector’s role in Cybercrime Law Enforcement. – Textbook

3. CCTV: effectiveness, displacement of crime – Textbook/ Lectures

4. Gary Marx’s social engineering strategies: target removal, target devaluation, target insulation, offender weakening and incapacitation, exclusion, and offense/offender/ target identification. (definitions and examples) – Textbook/ Lecture

5. Hard and Soft Technology: definition and examples from court, corrections, community corrections and policing. – Lecture

6. Phillip Garrido – Link

7. Identity Theft: extent of the problem, techniques, offender profile – Lectures, Links

8. Internet Crime Schemes: identify and define each type – Lecture

9. Check and Credit Card Fraud: How they are acquired, extent of problem. – Lecture

10. New Technology and Youth: Cyberstalking, sexting, child pornography, and solicitation. – Lecture

11. Hard Technology and the Prevention of Crime: examples – Lecture

12. Newark Cops and CCTV: know the case, was it effective? – Lecture

13. China’s All Seeing Eye: know where in China, the case, the Golden Shield. – Lecture

14. Common Fraud Schemes as listed by the F.B.I. – Link

15. Telemarketing Fraud: who are the offenders, how much do they make? – Link

16. Anti-Depressants: do they work? – Link

17. National Institute of Justice: What is it and what is its mission? - Link

18. Street lighting effectiveness:

19. Minority Report: future of technology prevention? – In Class

20. F.B.I.: The threat of foreign vs. homegrown terrorists – Link

Know the use and definitions of the following terms provided in class, readings and links:

21. Bluesnarfing:

22. Hacking:

23. Phishing:

24. Ponzi Scheme (Bernie Madoff):

25. Password Crackers:

26. Malicious Code:

27. Key Loggers:

28. Trojan Horse:

29. Bot:

30. Encryption:

31. Steganography:

32. Spoofing:

Section 2 Key Terms: Police and Technology

1. Exceptional Case Study Project: key findings

2. The Safe School Initiative: Key findings about the prevalence of violence in U.S. schools

3. Homicide prevention research in London and Philadelphia

4. Can we accurately profile likely terrorists?

5. Is school violence a common or rare event?

6. Do known sex offenders recidivate at higher or lower rates than other known offenders?

7. What are the primary myths about sex offenders?

8. How many states currently allow lifetime monitoring of known sex offenders?

9. What is sex offender registration?

10. RRASOR risk assessment tool

11. STATIC 99 risk assessment tool

12. False positives vs. false negatives

13. actuarial vs. clinical prediction

14. Murderers and sex offenders: low risk but high stakes

15. Insider Threat Study: Illicit Cyber Activity in the Government Sector( key findings)

16. Can we accurately profile school shooters, such as Kip Kinkel?

17. Who was SEUNG HUI CHO? See Profile:From the Perspective of a Forensic Behavioral Scientist( see Appendix N of Virginia Tech Report)

18. What is the link between the size/diversity of the police force and violent crime?

19. What are police paramilitary units and why have they grown in recent years?

20. Accuracy of police when they fire their weapons?

21. Weapon of choice in police departments today?

22. What is a taser?

23. What was the key finding of the Snelgrave Commission report?

24. What is Project 54?

25. What does a review of the available evidence on the effectiveness of police technology reveal?

26. What is the Real Time Crime Center? Where is it located?

27. Is police use of force common or rare?

28. Research findings on the effectiveness of Tasers: Do they work?

29. What is metal storm weaponry?

30. What is biometric technology?

31. What is COMSTAT?

32. What is Operation Ceasefire?

33. Who was Charles Stuart and what does his case have to do with police technology in the Boston PD?

34. Who is William Bratton?

35. What was the ten point coalition?

36. What is COP and POP?

37. What is a record management system?

38. What is a mobile data terminal( MDT)?

39. What technology skills and language skills are the FBI looking for in field agent applicants?

Section 3 Key Terms: The Courts and Technology

1. JNET (Pennsylvania)

2. Courtroom 21 Project

3. NCSC’s CourTools

4. Hard Technology and Specialized Courts ( e-court project)

5. Operation Drug Test in the Federal Pretrial System: What was it?

6. Data Warehousing

7. Drug Courts: number, target population, effectiveness in areas of drug use, criminal behavior and cost

8. Restorative Justice

9. Reentry Courts

10. Addiction: extent of the problem

11. Courtroom 23 in Florida

12. Cybercourts

13. Drug testing methods

14. Access to hard technology: disparity issue

15.Weapon detection systems used in court settings

16. Training of lawyers in the use of new technology: % trained

17. Implementation level of court IT projects: % completed on time and under budget

18. Transparancy

19. Dekalb County Radio Frequency Identification Technology

20. Multnomah County’s Sentencing Support Tools

21. Court Technology as Trojan Horse

22. E-Government Act of 2002(see ppt. selling the law)

23. PACER Profits from sale of court documents (see ppt. selling the law)

24.Innocence Project and DNA

25. New Ohio DNA law

26. Projected costs of federal court information system and technology upgrades

27.Impact of new technology on court performance

28. Drugs of choice in urban, suburban, and rural drug courts

29. What happens in a drug court?

30. churning and offender reentry

Section 4 Key Terms: Corrections and Technology

1. Types of contraband detection devices used in prison/jail; types and effectiveness

2. Types of duress alarm systems for corrections officers in indoor and outdoor settings

3. Types of language translation devices for use within prisons and in community corrections

4. Remote monitoring of inmate movements in cells and throughout prison;

5. Inmate-staff ratios in US vs Ireland

6. Types of perimeter security technology; new cell extraction technology

7. Less than lethal force in prison; types of technology used

8. Super-max prison; extent of use

9. Inmate classifications systems: external and internal; % of prisoners classified as max, mod, min; use of special population housing

10. Types of monitoring technology for inmate phone calls and financial transactions

11. Within-prison crime analysis and response capabilities ; hot spots

12. Extent of Inmate health problems (prevalence of various mental and physical health problems)

13. Simulated “mock” riot

14. Electronic supervision tools (RF vs. GPS Devices); extent of use

15. The use of breathalyzers and “instant” drug testing devices to monitor compliance with conditions of release/supervision

16. The use of polygraph tests and penile plethysmograph in sex offender treatment

17. What went wrong in the supervision of the sex offender,Phillip Garrido ?

18. Kiosks to monitor offender location, using biometric devices; extent of use in NYC

19. Instruments used for drug offender classification, sex offender classification, mentally ill offender classification, and multiple-problem offender classification

20. HATS; improvement in information sharing with other C.J. agencies, mental health, public health, and community groups

21. Offender change strategies: what is motivational interviewing?

22. Maximum Impact: Key findings and recommendations from Byrne review

23. New offender reentry program models: policing model (Lowell), restorative justice model ( Burlington, VT), mentor model ( Tacoma, Washington), housing incentive model ( Baltimore, Md).

24. Two characteristics of successful reentry programs: partnership and ownership

25. What works? Research on the effectiveness of drug treatment, probation, parole, electronic monitoring, day reporting centers, and residential community corrections.

26. Prisoner radicalization

27. California vs, Johnson

28. Prison gang identification: state-level variation

29. Effectiveness of remote alcohol sensors

30. Effectiveness of ignition interlock systems

31. Effectiveness of drug tests

32. Extent of drug testing in community corrections

33. Escape/flight risk

34. LSI_R: what is it?

35. Field Search: what is it?

36. % of drug offenders in federal and state prison populations

37. % of probationers who successfully complete probation

38. % of parolees who successfully complete parole.

39. Number of offenders under correctional control in the US; % in prison and % under community supervision

40. Cost of corrections; common strategies used to reduce corrections costs

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download