Midterm Review: Technology and Criminal Justice System, Fall 2009 Professor Byrne
Midterm Date: Tuesday, Oct.20th, 11am
Exam Format: Multiple Choice and True/False
NOTE: Bring a #2 pencil to the exam
What we have covered to date:
1. Readings from text: Chapters 1,2, 4,5, 6,14
2. All web links in the following areas: technology of crime, technology of crime prevention, and police technology (hard tech links only).
3. The following articles and reports from the Materials section:(1) Technology and crime control; (2) Taser’s Delirium Defense, and (3) High Priority Criminal Justice Technology Needs.
Key People and Terms to remember:
1.Sex Offenders: Myths and Facts….web-link to report by the Center for Sex Offender Management
2.Garrido case
3.Biometrics, DNA, etc.
4. Offender Exclusionas a crime prevention strategy: what is it?( Gary Marx article, In Search of the Silver Bullet web-link)
5. Target Insulationas a crime prevention strategy: what is it?Gary Marx article, In Search of the Silver Bullet web-link)
6. Newark’s CCTV
7. Hard Technology of Crime Prevention ( Identify Applications)….text, chapter 4 and handout on situational crime prevention
8. Soft Technology of Crime Prevention ( Identify Applications)….text, ch.5
9. The role of the private sector in CJ technology development( identify key areas and extent of involvement)…text, chapters 1
10. Criminal Justice Industrial Complex; Military Industrial Complex (define)…text, chapter1
11. Richard Sparks’ Typology of Technology Crime (crime at work, crime as work, and crime after work)….text chapters 1 and 2
12.Terrorist Threat Assessment: what is it? is it reliable?...text, chapter 5
13. Identity Theft: Techniques….weblink on technology of crime
14. Identity Theft: Cost to victims? Cost to businesses?... weblink on technology of crime
15. Identity Theft: Profile of criminals and victims (percent of households victimized)
16. Taser: the delirium defense; effectiveness( see PERF study)
17. Snelgrave case
18. Sex Crimes and the Internet
19. Nigerian Letter/419 Fraud: what is it?...text, chapter 2 and.web-link
20. Check and Card Fraud (cost)….web-link under technology of crime
21. Consumer Fraud Complaints to FTC( number and most common types of complaints)
22. Phishing, Spoofing, and Pretexting( Define? Extent of problem?)…..text, chapter2, and web-link
23. InternetCrimeComplaintCenter : types and number of complaints…web-link
24. Telemarketing Predators: A Profile ….weblink
25. FBI Common Fraud Schemes( identify different types)….weblink and lecture
26.Hard Techologies: Effectiveness of guns, less than lethal force, gunshot location devices, etc.
27. NLETC: NationalLawEnforcementTechnologyCenter( What is it?)…weblink
28. Profiling School Shooters: is it possible? What is the exceptional case study project?( Secret Service weblink)
29. Seung Hui Cho : Theoretical Profile( see Virginia Tech Report, Appendix N)
30. Target Removalas a crime prevention strategy: what is it?( Marx article)
31. Sex Offender Risk Level : what percentage will re-offend?
32.keylogging technology
33.Shenzhen and CCTV
34. CCTV: does it prevent crime?( With and without street lighting)...text, chapter4
35. Target Devaluation as a crime prevention strategy: what is it?( Marx article; and ch.14)
36. Offender Incapacitationas a crime prevention strategy: what is it?( Marx article; ch 14)
37. Bluesnarfing( and Paris Hilton)…text, chapter 2
38.False positives
39. Credit card fraud
40. Extent of use of police technology( see technology and crime control in materials section)
41. RRasor: what is it?( See Harris chapter in text)
42. Actuarial vs. clinical prediction: which is more accurate?
43. Clandestine Drug Labs: nature and extent of problem
45. Extent of the problem and Distribution Methods for Child Pornography on the Internet….handout and weblink
46. Sex offender registration: limits of system( see article link on Garrido)
47. Bots ( what are they and how often are they used to infect internet protocol
addresses ?)
48.What percentage of all financial transactions occur electronically?...chapter 2, text
49. National ID
50. The Golden Shield
Detailed Listing of Weekly lectures, materials, and readings
Week 1 & 2 (Sept. 3, 8, 10)
An Overview of the course: Assessing the impact of technological change on crime, law, and social control
Byrne, chapter 1
Claremont Presentation
Program helps identify likely violent parolees
Case Shows Limits of Sex Offender Alert Programs
Phillip Garrido
Week 3 (Sept 15, 17)
The New Technology of Crime: Advances in both hard and soft technology have not been restricted to the criminal justice system’s response to crime; these advances have resulted in new opportunities for crime, new forms of criminality, new techniques for committing crime, and the creation of new categories of both offenders and victims.
- Exploring the impact of technology on criminal opportunity (e.g. newDrugs/new crimes; the internet and criminal opportunity)
- New forms of criminality (e.g. internet scams and sex crimes)
- New techniques for committing crimes through advances in hard and
- Soft technology (e.g. computer software programs, pirating, firearms)
- New categories of offenders and victims
Other Reading from Materials Link:
1) Gary Marx "Silver Bullet"
Web-links:
New Technology of Crime
Byrne text, chapter 2, 14
Other Assigned Reading:
Identity Theft 1
Identity Theft 2
Telemarketing Fraud
Internet links for Computer Crime
*Internet Crime Schemes**
Identity theft growing, getting harder to stop
Internet Crime Schemes Ppt.
Week 4 (Sept. 22, 24)
The New Technology of Crime: Advances in both hard and soft technology have not been restricted to the criminal justice system’s response to crime; these advances have resulted in new opportunities for crime, new forms of criminality, new techniques for committing crime, and the creation of new categories of both offenders and victims.Identity Theft Task Report - 2008.
New Technology of Crime : Crime at work, crime as work, and crime after work
New Technology of Crime: Identity Theft, Internet Crime schemes, and Internet Sex crimes
Byrne text, Chapter3
Identity Theft Lecture
additional reading for lecture:
page 1
page 2
Techno-Crime Lecture
Keylogging Technology
Week 5 (Sept. 29, Oct. 1)
Crime Prevention and Soft Technology: Various forms of soft, information-based technology have been applied to the prevention of a diverse number of crimes, including terrorism, school violence, workplace violence and sex crimes. Examples include:
- Threat assessment instruments (e.g. prevent school violence, terrorism, etc.)
- Bullying identification protocol
- Sex offender registration; sex offender risk assessment devices
- The use of “profiling” to prevent crime
- The use of mental health data by school officials; and linking mental health, criminal record, and gun purchase data bases; lessons learned from Virginia Tech tragedy
- The application of other forms of soft technology to crime prevention (e.g. information sharing, improved nationwide data collection protocol for criminal histories, etc.)
Tuesday, September 29, 2009
1:00 – 4:00
CampusRecreationCenter
Materials Link:
1)United States Secret Service National Threat Assessment Center
2)CDC's National Center for Injury Prevention and Control
Crime Prevention and Soft Technology PowerPoint
Technology & Crime Prevention (Risk Assessment/Prediction) ppt.
Myths and Facts About Sex Offenders
Frontline: The Killer at Thurston High: 'Profiling' School Shooters
The Final Report and Findings of the Safe School Initiative
Final report: Virginia Tech Tragedy
List of Deadly Campus Shootings
Byrne text, chapter 5
Technology and Crime Prevention Lecture
Week 6 (Oct. 6, 8))
Crime Prevention and Hard Technology: There are a number of recent hard technology advances that have general applications to crime prevention strategies, both at the individual and community level. Examples include:
- Taser guns as a citizen protection device
- Closed circuit video monitoring of hot spot areas
- Street lighting as a crime prevention strategy; other environmental design options
- The application of other forms of hard technology to crime prevention (e.g. ignition interlock systems, alcohol censoring devices, mace, metal detectors, security systems, etc.)
Byrne text, chapter 4
Tools of the Trade: Risk Prediction Instruments PPT.
China's All Seeing Eye PPT.
Newark Cops & CCTV PPT.
Hard Technology of Crime Prevention PPT
Bridging the Language Divide - Link to Webcast and PDF.
Long Lens of the Law
FBI Testimony
FBI Warning: Homegrown Terrorists
Week 7 (Oct. 13, 15)
The Police and Hard Technology: Federal, state, and local police haveapplied hard technology not only in the area of individual offender apprehension, but also in the area of community-level surveillance and control. In addition, technological innovations have been used to improve the safety and protection of police officer. Examples include:
- Improvement in weaponry of police
- Less-than-lethal force technology used in mob/potential riot situations
- Computers in squad cars to improve criminal identification and /or for gang identification; computer-based strategies to identify criminal behavior on the internet (e.g. sex offenders, cyber crime, terrorism)
- Improvements in offender/citizen identification (e.g. biometrics, fingerprints, etc.)
- Improvements in police protection devices (e.g. bullet proof vests, new construction of police departments)
- Other applications of hard technology to policing
Hard Tech PowerPoint.
Police and New Technology PowerPoint.
PERF Body Armor
PERF Taser
Metal Storm Weaponry
Weblinks:Police Technology links (all)
Hummer Chapter6 in Byrnetext