Exam 1 Review: Technology and the Criminal Justice System

Exam 1 Review: Technology and the Criminal Justice System

Professor Byrne, Spring, 2015

Exam Date: Tuesday, March 3,2015

Required Reading in Text: Chapters 1, 2, 3, 4, 5, and 14

Required Readings from materials section: Byrne and Marx article ( pp17-25 only)

Required Review of Links: China’s All Seeing Eye, Department of Pre-Crime

Exam Format: Short answers and essay format. Questions will be drawn from class lectures, the text, and the online links we reviewed in class. I recommend using the key topics identified below as a study guide. Key terms are identified for each topic area. You will be responsible for knowing these terms, as well as the basic facts related to each topic area (definitions of terms, evidence of effectiveness, extent of use, etc)

Listing of Key People and Terms: Identifications and short answers

1. Richard Sparks’s typology: Crime as Work, Crime at Work, and Crime after Work. (examples) – Kip Schlegal chapter, Lecture

2. Department of Pre-Crime: lecture/link

3. Static 99 and Rraser: Chapter 5/lecture

4. Gary Marx’s social engineering strategies: target removal, target devaluation, target insulation, offender weakening and incapacitation, exclusion, and offense/offender/ target identification. (definitions and examples) – Marx chapter(14)/ Lecture

5. Hard and Soft Technology: definition– Lecture, chapter 1

6. Social engineering strategies (chapter 14)

7. Sex offender registry and risk assessment: actuarial vs clinical assessment in Massachusetts--lecture

8. False positives vs. false negatives: chapter 5/lecture

9. China’s All Seeing Eye: the Golden Shield. – Lecture/link

10. Electronic surveillance strategies used by federal law enforcement (see Byrne and Marx article)

11. CCTV and Street lighting effectiveness: Welsh and Farrington chapter 4

12. Silk Road: link/lecture

15. Bluesnarfing: chapter 2

16. Myths and realities about sex offenders: lecture

17. Exceptional Case Study Project: chapter 5

18. Network intrusions: hacking, phishing, pharming,wardriving-chapter 2

19. Enron and occupational fraud/ crime at work: chapter 2

20. The problem of identity fraud: chapter 3

Sample Essay questions for review:

1.  Describe how techno-crime occurs at work, as work, and after work. Give examples of techno-crime in each setting.

2.  Can CCTV prevent crime? What does the research reveal?

3.  What do we currently know about preventing known sex offenders from re-offending? Discuss recidivism risk levels, and current strategies to reduce risk( registries, lifetime electronic monitoring)

4.  What is the link( if any) between mental illness and violence? ( see text ch. 5)

5.  What is threat assessment? Can we prevent school violence and/or terrorism using current threat assessment tools?

6.  Can social engineering strategies be used to prevent crime? Describe Marx’s social engineering strategies and give examples.

7.  Can we use soft technology to prevent homicide?

8.  What are the new directions in crime prevention using hard and soft technology( facial recognition, gunshot location, biometrics, risk prediction, etc.) ?