Midterm Review: Technology and Criminal Justice System, Fall 2009 Professor Byrne

Midterm Date: Tuesday, Oct.20th, 11am

Exam Format: Multiple Choice and True/False

NOTE: Bring a #2 pencil to the exam

What we have covered to date:

1. Readings from text: Chapters 1,2, 4,5, 6,14

2. All web links in the following areas: technology of crime, technology of crime prevention, and police technology (hard tech links only).

3. The following articles and reports from the Materials section:(1) Technology and crime control; (2) Taser’s Delirium Defense, and (3) High Priority Criminal Justice Technology Needs.

Key People and Terms to remember:

1.Sex Offenders: Myths and Facts….web-link to report by the Center for Sex Offender Management

2.Garrido case

3.Biometrics, DNA, etc.

4. Offender Exclusionas a crime prevention strategy: what is it?( Gary Marx article, In Search of the Silver Bullet web-link)

5. Target Insulationas a crime prevention strategy: what is it?Gary Marx article, In Search of the Silver Bullet web-link)

6. Newark’s CCTV

7. Hard Technology of Crime Prevention ( Identify Applications)….text, chapter 4 and handout on situational crime prevention

8. Soft Technology of Crime Prevention ( Identify Applications)….text, ch.5

9. The role of the private sector in CJ technology development( identify key areas and extent of involvement)…text, chapters 1

10. Criminal Justice Industrial Complex; Military Industrial Complex (define)…text, chapter1

11. Richard Sparks’ Typology of Technology Crime (crime at work, crime as work, and crime after work)….text chapters 1 and 2

12.Terrorist Threat Assessment: what is it? is it reliable?...text, chapter 5

13. Identity Theft: Techniques….weblink on technology of crime

14. Identity Theft: Cost to victims? Cost to businesses?... weblink on technology of crime

15. Identity Theft: Profile of criminals and victims (percent of households victimized)

16. Taser: the delirium defense; effectiveness( see PERF study)

17. Snelgrave case

18. Sex Crimes and the Internet

19. Nigerian Letter/419 Fraud: what is it?...text, chapter 2 and.web-link

20. Check and Card Fraud (cost)….web-link under technology of crime

21. Consumer Fraud Complaints to FTC( number and most common types of complaints)

22. Phishing, Spoofing, and Pretexting( Define? Extent of problem?)…..text, chapter2, and web-link

23. InternetCrimeComplaintCenter : types and number of complaints…web-link

24. Telemarketing Predators: A Profile ….weblink

25. FBI Common Fraud Schemes( identify different types)….weblink and lecture

26.Hard Techologies: Effectiveness of guns, less than lethal force, gunshot location devices, etc.

27. NLETC: NationalLawEnforcementTechnologyCenter( What is it?)…weblink

28. Profiling School Shooters: is it possible? What is the exceptional case study project?( Secret Service weblink)

29. Seung Hui Cho : Theoretical Profile( see Virginia Tech Report, Appendix N)

30. Target Removalas a crime prevention strategy: what is it?( Marx article)

31. Sex Offender Risk Level : what percentage will re-offend?

32.keylogging technology

33.Shenzhen and CCTV

34. CCTV: does it prevent crime?( With and without street lighting)...text, chapter4

35. Target Devaluation as a crime prevention strategy: what is it?( Marx article; and ch.14)

36. Offender Incapacitationas a crime prevention strategy: what is it?( Marx article; ch 14)

37. Bluesnarfing( and Paris Hilton)…text, chapter 2

38.False positives

39. Credit card fraud

40. Extent of use of police technology( see technology and crime control in materials section)

41. RRasor: what is it?( See Harris chapter in text)

42. Actuarial vs. clinical prediction: which is more accurate?

43. Clandestine Drug Labs: nature and extent of problem

45. Extent of the problem and Distribution Methods for Child Pornography on the Internet….handout and weblink

46. Sex offender registration: limits of system( see article link on Garrido)

47. Bots ( what are they and how often are they used to infect internet protocol

addresses ?)

48.What percentage of all financial transactions occur electronically?...chapter 2, text

49. National ID

50. The Golden Shield

Detailed Listing of Weekly lectures, materials, and readings

Week 1 & 2 (Sept. 3, 8, 10)

An Overview of the course: Assessing the impact of technological change on crime, law, and social control

Byrne, chapter 1

Claremont Presentation

Program helps identify likely violent parolees

Case Shows Limits of Sex Offender Alert Programs

Phillip Garrido

Week 3 (Sept 15, 17)

The New Technology of Crime: Advances in both hard and soft technology have not been restricted to the criminal justice system’s response to crime; these advances have resulted in new opportunities for crime, new forms of criminality, new techniques for committing crime, and the creation of new categories of both offenders and victims.

  1. Exploring the impact of technology on criminal opportunity (e.g. newDrugs/new crimes; the internet and criminal opportunity)
  2. New forms of criminality (e.g. internet scams and sex crimes)
  3. New techniques for committing crimes through advances in hard and
  4. Soft technology (e.g. computer software programs, pirating, firearms)
  5. New categories of offenders and victims

Other Reading from Materials Link:

1) Gary Marx "Silver Bullet"

Web-links:

New Technology of Crime

Byrne text, chapter 2, 14

Other Assigned Reading:

Identity Theft 1

Identity Theft 2

Telemarketing Fraud

Internet links for Computer Crime

*Internet Crime Schemes**

Identity theft growing, getting harder to stop

Internet Crime Schemes Ppt.

Week 4 (Sept. 22, 24)

The New Technology of Crime: Advances in both hard and soft technology have not been restricted to the criminal justice system’s response to crime; these advances have resulted in new opportunities for crime, new forms of criminality, new techniques for committing crime, and the creation of new categories of both offenders and victims.Identity Theft Task Report - 2008.

New Technology of Crime : Crime at work, crime as work, and crime after work

New Technology of Crime: Identity Theft, Internet Crime schemes, and Internet Sex crimes

Byrne text, Chapter3

Identity Theft Lecture

additional reading for lecture:

page 1

page 2

Techno-Crime Lecture

Keylogging Technology

Week 5 (Sept. 29, Oct. 1)

Crime Prevention and Soft Technology: Various forms of soft, information-based technology have been applied to the prevention of a diverse number of crimes, including terrorism, school violence, workplace violence and sex crimes. Examples include:

  1. Threat assessment instruments (e.g. prevent school violence, terrorism, etc.)
  2. Bullying identification protocol
  3. Sex offender registration; sex offender risk assessment devices
  4. The use of “profiling” to prevent crime
  5. The use of mental health data by school officials; and linking mental health, criminal record, and gun purchase data bases; lessons learned from Virginia Tech tragedy
  6. The application of other forms of soft technology to crime prevention (e.g. information sharing, improved nationwide data collection protocol for criminal histories, etc.)

Tuesday, September 29, 2009

1:00 – 4:00

CampusRecreationCenter

Materials Link:

1)United States Secret Service National Threat Assessment Center

2)CDC's National Center for Injury Prevention and Control

Crime Prevention and Soft Technology PowerPoint

Technology & Crime Prevention (Risk Assessment/Prediction) ppt.

Myths and Facts About Sex Offenders

Frontline: The Killer at Thurston High: 'Profiling' School Shooters

The Final Report and Findings of the Safe School Initiative

Final report: Virginia Tech Tragedy

List of Deadly Campus Shootings

Byrne text, chapter 5

Technology and Crime Prevention Lecture

Week 6 (Oct. 6, 8))

Crime Prevention and Hard Technology: There are a number of recent hard technology advances that have general applications to crime prevention strategies, both at the individual and community level. Examples include:

  1. Taser guns as a citizen protection device
  2. Closed circuit video monitoring of hot spot areas
  3. Street lighting as a crime prevention strategy; other environmental design options
  4. The application of other forms of hard technology to crime prevention (e.g. ignition interlock systems, alcohol censoring devices, mace, metal detectors, security systems, etc.)

Byrne text, chapter 4

Tools of the Trade: Risk Prediction Instruments PPT.

China's All Seeing Eye PPT.

Newark Cops & CCTV PPT.

Hard Technology of Crime Prevention PPT

Bridging the Language Divide - Link to Webcast and PDF.

Long Lens of the Law

FBI Testimony

FBI Warning: Homegrown Terrorists

Week 7 (Oct. 13, 15)

The Police and Hard Technology: Federal, state, and local police haveapplied hard technology not only in the area of individual offender apprehension, but also in the area of community-level surveillance and control. In addition, technological innovations have been used to improve the safety and protection of police officer. Examples include:

  1. Improvement in weaponry of police
  2. Less-than-lethal force technology used in mob/potential riot situations
  3. Computers in squad cars to improve criminal identification and /or for gang identification; computer-based strategies to identify criminal behavior on the internet (e.g. sex offenders, cyber crime, terrorism)
  4. Improvements in offender/citizen identification (e.g. biometrics, fingerprints, etc.)
  5. Improvements in police protection devices (e.g. bullet proof vests, new construction of police departments)
  6. Other applications of hard technology to policing

Hard Tech PowerPoint.

Police and New Technology PowerPoint.

PERF Body Armor

PERF Taser

Metal Storm Weaponry

Weblinks:Police Technology links (all)

Hummer Chapter6 in Byrnetext