Exam 1 Review: Technology and the Criminal Justice System

Professor Byrne, Fall, 2015

Exam Date: Thursday, Oct.8,2015

Required Reading in Text: Chapters 1, 2, 3, 4, 5, and 14

Required Readings from materials section: Byrne and Marx article ( pp17-25 only)

Required Review of Links: China’s All Seeing Eye, Department of Pre-Crime

Exam Format: Short answers and essay format. Questions will be drawn from class lectures, the text, and the online links we reviewed in class. I recommend using the key topics identified below as a study guide. Key terms are identified for each topic area. You will be responsible for knowing these terms, as well as the basic facts related to each topic area (definitions of terms, evidence of effectiveness, extent of use, etc)

Listing of Key People and Terms: Identifications and short answers

1. Richard Sparks’s typology: Crime as Work, Crime at Work, and Crime after Work. (examples) – Kip Schlegaland Charles Cohen chapter 2, Lecture

2. Department of Pre-Crime: lecture/link

3. Risk Assessment instruments: LSI-R,Static 99, and Rraser: Chapter 5/lecture

4. Gary Marx’s social engineering strategies: target removal, target devaluation, target insulation, offender weakening and incapacitation, exclusion, and offense/offender/ target identification. (definitions and examples) – Marx chapter(14)/ Lecture

5. Hard and Soft Technology: definition– Lecture, chapter 1

6. Situational crime prevention strategies (lecture/ link)

7. Sex offender registry and risk assessment: actuarial vs clinical assessment in Massachusetts--lecture

8. False positives vs. false negatives: chapter 5/lecture

9. China’s All Seeing Eye:the Golden Shield. – Lecture/link

10. Electronic surveillance strategies used by federal law enforcement(see Byrne and Marx article)

11. CCTV and Street lighting effectiveness: Welsh and Farrington chapter 4,lectures

12. Silk Road: What is it? Who created it?( Ross Ulbricht) Why? How does it work?link/lecture

15. Bluesnarfing( and Paris Hilton): chapter 2

16. Myths and realities about sex offenders: lecture

17. Threat Assessment, and the findings from theExceptional Case Study Project: chapter 5

18. Computer Network intrusions: hacking (breaking into secure networks), phishing( email-based frauds such as 419 fraud schemes), pharming( fake but legit looking websites),wardriving( hot spots for internet) and steganography( hiding data inside legit looking website or music file)-chapter 2 and electronic crime terms link

19. Enron Corporationand occupational fraud/ crime at work( single largest category of crime, 5% of all annual revenue lost( 500 billion in 2006): chapter 2

20. FBI techno-crime schemes : lecture/ links

Sample Essay questions for review:

  1. Describe how techno-crime occurs at work, as work, and after work. Give examples of techno-crime in each setting.
  2. Can CCTV prevent crime? What does the research reveal?
  3. What do we currently know about preventing known sex offenders from re-offending? Discuss recidivism risk levels, and current strategies to reduce risk( registries, lifetime electronic monitoring)
  4. What is the link( if any) between mental illness and violence? ( see text ch. 5)
  5. What is threat assessment? Can we prevent school violence and/or terrorism using current threat assessment tools?
  6. Can social engineering strategies be used to prevent crime? Describe Marx’s social engineering strategies and give examples.
  7. Can we use soft technology to prevent homicide?
  8. What are the new directions in crime prevention using hard and soft technology( facial recognition, gunshot location, biometrics, risk prediction, etc.) ?
  9. What can we do to prevent school violence?
  10. Can we use involuntary civil commitment to prevent drug abuse, violence, and/or self injury?