Study Guide for Final Exam: Spring, 2007



Study Guide for Final Exam: Spring, 2007

Course: Technology and the Criminal Justice System

Date/Time of Final Exam: Tuesday, May 15, 2007 at 8 am

Location: Weed Lecture Hall B

Be sure to bring a number 2 pencil and identification

Exam Format: Multiple Choice, True/False (50 questions)

Required Reading: All Assigned readings in Byrne and Rebovich text since midterm (chapters on technology and the police by Harris and Hummer, chapters on courts, by Bellone and Corbett, chapters on prisons by Stowell and Byrne/Pattavina, chapters on community corrections by Harris/Byrne and Pattavina/ Taxman)and the following chapters in Pattavina( chapters 6,7,and 10). In addition, you are responsible for(1) all assigned reading from materials link on my webpage( see listing at end of this review), (2) the links identified on the weekly schedule of reading assignments on my web page, and (3) in-class handouts.

Study Topic Areas: The exam will cover the application of hard and soft technology in police, courts, institutional corrections, and community corrections based on the outline below:

The Police and Hard Technology: Federal, state, and local police have applied hard technology not only in the area of individual offender apprehension, but also in the area of community-level surveillance and control. In addition, technological innovations have been used to improve the safety and protection of police officer. Examples include:

1. Improvement in weaponry of police

2. Less-than-lethal force technology used in mob/potential riot situations

3. Computers in squad cars to improve criminal identification and /or for gang identification; computer-based strategies to identify criminal behavior on the internet (e.g. sex offenders, cyber crime, terrorism)

4. Improvements in offender/citizen identification (e.g. biometrics, fingerprints, etc.)

5. Improvements in police protection devices (e.g. bullet proof vests, new construction of police departments)

6. Other applications of hard technology to policing( e.g. sticky foam, barrier strips, water cannons)

 

Weblinks:

Police Technology (all)

- Wisconsin lawmaker urges arming teachers

Project Safe Childhood

Myths and Facts About Sex Offenders

Hummer Chapter

 

The Criminal Justice Technology Mega Site

 

The Police and Soft Technology: The recent emphasis on intelligence-based policing has resulted in a wide range of soft technology advancements that have transformed police problem-solving strategies at the federal, state, and local level.  Examples include:

1. Crime mapping technology (hot spots)

2. Crime analysis technology (COMPSTAT)

3. Improvements in criminal history data systems

4. Other “soft” technology applications in policing (e.g. information sharing within the CJS; public-private information sharing.

 

Materials Link:

Straight Outta Boston: - Article on Operation: Ceasefire

 

NLECTC Video Resource Center

 

"Police Don't Like Black People": African American Young Men's Accumulated Police Experiences

 

The Courts and Hard Technology: Recent changes in court structure (e.g. the proliferation of specialized courts), operations, management, and administration have been facilitated by a number of specific technological advances, particularly related to computers, multimedia technology, and on-site drug testing. Examples include:

1. The “High Technology” courtroom (computers, video, cameras, design features of buildings)

2. Improvements in weapons detection devices used in courthouse settings

3. Focus: the courtroom 21 project at the college of William and Mary Law School

4. Other hard technology applications in court (e.g. drug testing for pretrial detaining)

 

The Courts and Soft Technology: Improvements in information technology have been applied to the unique problems of offenders in specialized courts (e.g. drug courts, reentry courts, domestic violence courts, family courts), as well as the general court administration problems of intersystem coordination (mental health, public health, welfare) case processing, backlog, and decision making.  Examples include:

1. Case flow management systems for prosecutors; the use of case management devices/instruments by court administrators, public defenders, and presiding judges (e.g. backlog reduction strategies, jury selection, case classification/ weighting systems, etc.)

2. Mental health screening for pretrial detainees, at arraignment, competency, drug dependency/multiple problem offender identification.

3. The use of objective risk screening devices by probation officers to aid in PSI completion, and to determine appropriate specialized court referrals

4. Other soft technology applications in the courts (by court type, e.g. reentry courts, drug courts, etc.)

 

Materials Link:

1) Bellone Chapter

2) Corbett Chapter

 

Weblinks:

Court Technology (all)

1) An Informed Response

2) Court Technology: A Status Report

 

Institutional Corrections and Hard Technology: The prison industry has advocated the utilization of a wide range of control technologies to manage an increasingly large federal, state, and local inmate population with a minimum number of line corrections officers.  Examples include:

1. Contraband detection devices used in prison/jail

2. Duress alarm systems for corrections officers in indoor and outdoor settings

3. Language translation devices for use within prisons

4. Remote monitoring of inmate movements in cells and throughout prison

5. Perimeter security technology; new cell extraction technology

6. Less than lethal force in prison

7. Other hard technology applications in prisons and jails (e.g. the Supermax prison)

Weblinks: see corrections technology links

Institutional Corrections and Soft Technology: There are a variety of current and potential soft technology applications to problem solving in institutional settings, both in terms of inmate (classification, treatment and control) and staff (management and protection) issues.  Examples include:

1. Improved inmate classifications systems

2. Improved monitoring technology for inmate phone calls and financial transactions

3. Improved within-prison crime analysis and response capabilities (examination of incident/sanctioning patterns, including transfer, segregation, loss of privileges, etc. identification of high rate offenders and/or prison hot-spot locations)

4. Improved information sharing with community corrections, police, treatment providers (continuity/seamless system), and public health system

5. Improved monitoring of inmate health problems (e.g. mental and physical)

6. Other soft technology applications in prison and jails (e.g. testing new technologies in a simulated “mock” riot; using software to model death row outcomes

Weblinks:

Corrections Technology

 

List of Deadly Campus Shootings

Community Corrections and Hard Technology: A number of recent hard technology advances have been applied directly to the problems associated with the community control of various federal, state, and local probation and parole populations. Examples include:

1. Electronic supervision tools (e.g. GPS)

2. The use of breathalyzers and “instant” drug testing devices to monitor compliance with conditions of release/supervision

3. The use of polygraph tests for selected offender groups (e.g. con artists, sex offenders)

4. Language translators for improved communication between offenders and community corrections officers

5. Kiosks to monitor offender location, using biometric devices

6. Other hard technology applications (e.g. laptop computers for line staff, weapons in CBC, GPS monitoring of staff locations).

Weblinks: See Materials section

Community Corrections and Soft Technology: One consequence of specialized caseloads in community corrections is the recognition that “one size fits all” classification and supervision schemes need to be replaced by state of the art offender/problem specific classification, and case management systems. In addition, the recent emphasis on seamless systems of care/control, as well as new partnership-driven reentry strategies have resulted in the development of a number of innovative data collection/information sharing systems.  Examples include:

1. Drug offender Classification, sex offender classification, mentally ill offender classification, and multiple-problem offender classification for (1) risk, (2) treatment, and (3) control.

2. New improved workload distribution and assessment instruments

3. Improved analytic capabilities within probation and parole agencies, improvement in information sharing with other C.J. agencies, mental health, public health, and community groups

4. Other soft technology applications in community corrections settings (e.g. MIS systems linking measurement of staff activities to offender outcomes (e.g. technicals, rearrests, return to prison, length of time in treatment, etc.)

See materials section and corrections weblinks

Sample Listing of Key Terms: Below is a listing of key terms/facts that you need to study for the final exam:

1. Hard technology applications in policing—new innovations

2. The future of court technology

3. Broken Windows Theory: is it supported by the evidence?

4. COMPSTAT: Does it work? What is it?

5. Operation Ceasefire: did it work in Boston? In L.A.? What is the “pulling levers” strategy?

6. CAD (Computer Aided Dispatch)

7. Latino Paradox

8. Proposition 83 ( location restrictions on sex offenders in Ca)

9. RFID (Radio Frequency Identification Technology)

10. ASI (Addiction Severity Index)

11. HATS (Maryland)

12. JNET (Pennsylvania)

13. Prison gang Classification and Threat Assessment

Extent, Techniques, emerging controversies

14 Extent of Mental Illness in Prison

15. Extent of Disease in Prison

16. External Classification

Percent in general and special population housing

17. Internal Classification

What is it?

18. Supermax Prisons: what is it?

Percent of inmates currently held in supermax

19. Three Strikes Laws

20. Smart Cards

21. Language Translation Devices

VRT, SYSTRAN

22. Duress System

23. Less Than Lethal Force Devices Used in Prison

Types

24. Clinical vs Actuarial Risk Assessment: Which method is more reliable? What is the difference?

25. Biometric Scanning

Types, Effectiveness

26. Stun Belt

27. Back Spatter X-Ray Machine

Application

28. Sexually Dangerous Offender Statutes

Civil Commitment Length

29. Dangerousness Assessment

HARE psychopathology checklist

30. Offender Management Systems

CMC, QUAY

31. Homicides and sexual assault in Prison

Number per year

Rate in prison vs. rate in community( are prisons safer?)

32. Number of Offenders Under Correctional Control in the U.S.

Percent in prison

Percent on probation/parole

33. Penile Plethysmograph

34. Types of Special Probation Conditions—links to technology

35. Washington State Revocation Policy for technical condition violators

36. Monitoring Sex Offenders- Computer Forensic

37. What is GPS?

Use/misuse with sex offenders

38. Supervised Mandatory Release vs. Discretionary Release from Prison

Trends

39. Ignition Interlock Systems for Drunk Drivers

40. California vs. Johnson (Race based classification ruling)

41. Gangs, Prison Violence and Community Violence: are they related?

42. Inter-rater reliability ( and validity) problems associated with the Wisconsin risk classification device used in many jurisdictions

43. Courtroom 21 Project

44. Courtools

45. RMS (Record Management System) for Police

46. ARJIS

47. MDT (Mobile data terminals)

48. Early Warning/Early Intervention Systems

Police Misconduct

49. Hard Technology and Specialized Courts ( e-court project)

50. Drug Testing Methods( which method is most reliable?)

51. Data Warehousing

52. Remote Monitoring of Inmates—new innovations

53. Perimeter Security –new innovations

54. False Positive vs. False Negatives ( what is the difference?)

55. LSI-R (risk classification – Lead Service Inventory- Revised)

56. COP and POP

57. GIS (geographic information systems)

58. Soft technology and community corrections-recent innovations

59. Technology of offender change vs technology of offender control

60. Offender Reentry in Mass: where do released offenders live?Are they released conditionally or unconditionally?

List of Readings included on Materials Section of my web-page:

[pic]

|Manual of Crime Analysis Map Production |This document introduces the reader to various |

| |types of mapping used in crime analysis.  The |

| |reader is exposed to how a mapping specialist is |

| |able to use maps to track crime, use old patterns |

| |to help predict future trends, and how maps are |

| |made presentable to the average person.  Along |

| |with the included text there are several examples |

| |of actual crime maps, as well. |

|Computerized Mapping and Law Enforcement |The National Institute of Justice Research Preview|

| |article on the benefits of mapping when paired |

| |with law enforcement.  Some of the focal points of|

| |discussion include:  Types of analysis, Usefulness|

| |of mapping, Who uses mapping, and the Obstacles to|

| |effective mapping. |

|A Brief History of Crime Analysis |Dating from the London Metropolitan Police |

| |Department in the mid-to-late 1800's up to the |

| |"golden age" of crime analysis during the 1990's, |

| |this brief article talks about the history and |

| |evolution of crime analysis as it exists today. |

|Regional Information Sharing System (RISS) |A brief by the Bureau of Justice Assistance, under|

| |the Department of Justice, that discusses the |

| |background and elements of RISS.  It outlines the |

| |6 regions of the RISS program, their |

| |effectiveness, and the services that they provide.|

|Backscatter X-Rays |New technology.  This technology is able to use |

| |x-rays in order to identify and isolate organic |

| |materials or plastics that are otherwise missed by|

| |normal x-ray technologies. |

|Justice Research and Statistics Association (JRSA) |Publication from the JRSA and BJS National |

| |Conference.  The conference focuses primarily new |

| |advances in technology uses in the Criminal |

| |Justice system over the past year.  Also included |

| |are several articles in which various uses for |

| |already existing technologies are used by several |

| |agencies nation-wide. |

|Soul Train: The New Surveillance and Popular Music |An article by Gary Marx of MIT that analyzes and |

| |discusses the effect of music, particularly music |

| |of the Pop Culture era, and its ability to train |

| |the listener.  The article reviews lyrics from |

| |several songs, looking at lyrics involving |

| |surveillance (i.e. "looking over you"), and the |

| |effect this may have on the listener. |

|Seeing Hazily, but not Darkly, Through the Lens |Another article by Gary Marx.  This article |

| |focuses on the history of surveillance |

| |technologies, their past use and practices, and |

| |the future of the science. |

|Soft Surveillance |A shorter version of the article by Gary Marx.  |

| |The articles discusses the new ramifications that |

| |DNA is having on the Criminal Justice System, and |

| |how volunteering of personal information, like |

| |DNA, is slowly becoming mandatory in some |

| |environments. |

|Summary of Workshops: Bureau of Justice Assistance |A collection of workshops on various topics |

|Table of Contents |throughout the Criminal Justice System.  |

|Straight Outta Boston: |An article on the gangs of Los Angeles and the |

|  |impact of Operation: Ceasefire on these gangs. |

|Crime Mapping and the Policing of Democratic Societies |Article focusing on the major advancements made |

| |via mapping in law enforcement, and the impact it |

| |has had on democratic societies. |

| Technology and Crime Control |This document discusses how technology has been |

| |employed by police agencies. |

|Juvenile Risk Classification In Illinois: An Examination of Inter-Rater |This is a report written by Jim Byrne and Robin |

|Reliability |Robinson, which was submitted to the |

| |Administrative Office of Illinois Courts (December|

| |1990). |

|Crime Control Strategies and Community Change: Reframing The Surveillance vs. |This is an article written by Jim Byrne and Faye |

|Treatment Debate |Taxman that discusses competing correctional |

| |strategies (Forthcoming in Federal Probation). |

| High Risk Classification |This is a report written by James Austin which |

| |assesses the current practices associated with |

| |classifying high-risk and special management |

| |prisoners. |

|Location and Trafficking of Offenders Using GPS Based Systems |This is a PowerPoint presentation that discusses |

| |how GPS technology is employed to track offenders.|

|Prisoner Reentry in Massachusetts |This report written by Lisa Brooks, Amy Solomon, |

| |Sinead Keegan, Rhiana Kohl, and Lori Lahue details|

| |patterns of prisoner reentry for inmates released |

| |in Massachusetts in 2002. |

|Issues Beyond Empirical EM Reports |This article written by J. Robert Lilly discusses |

| |issues related to the Electronic Monitoring (EM) |

| |programs in criminal justice. |

|The Courts and Hard Technology:  Applying Technological Solutions to Legal |This article written by Eric Bellone discusses the|

|Issues |integration of hard technology into the American |

| |court system. |

|Suit Says Online Marketer Ran Scam |Boston Globe 9/12/2006 |

| |This article describes the current internet scam |

| |in which unsuspecting online shoppers are enrolled|

| |in a "discount club" and are charged monthly fees.|

|Digital Crime and Digital Terrorism, Chapter 5 | This chapter covers the issue of white collar |

| |crimes |

|Policing and Hard Technology |This article written by Don Hummer discusses the |

| |use of hard technology by the police. |

|Policing and Soft Technology |This article written by Chris Harris discusses the|

| |use of soft technology by the police. |

|Institutional Corrections and Hard Technology |This article written by Jacob Stowell discusses |

| |the use of hard technology in correctional |

| |institutions. |

|Report on Prisoner Radicalization |This report, issued by the Homeland Security |

| |Policy Institute, discusses the process whereby |

| |prisoners come to harbor extremist views, |

| |including the use of violence for "political or |

| |religious purposes." |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download