Exam 1 Review: Technology and the Criminal Justice System

Professor Byrne, Fall 2010

Exam Date: Thursday, Sep. 30, 2010

Required Reading in Text: Chapters 1, 2, 3, 4, and 14

Required Reading from Materials Section: Anti-depressants article, NIJ Technology overview

Required Readings in Schedule: All links for each week, through today’s class

Required Review of Links: All listed under Technology of Crime

Exam Format: Multiple Choice and true-false questions (20-25). Questions will be drawn from class lectures, the text, and the online readings/links we reviewed in class. I recommend using the key topics identified below as a study guide. Key terms are identified for each topic area. You will be responsible for knowing these terms, as well as the basic facts related to each topic area (definitions of terms, evidence of effectiveness, extent of use, etc)

Listing of Key People and Terms:

1. Richard Sparks’s typology: Crime as Work, Crime at Work, and Crime after Work. (examples) – Textbook, Lecture

2. The Private Sector’s role in Cybercrime Law Enforcement. – Textbook

3. CCTV: effectiveness, displacement of crime – Textbook/ Lectures

4. Gary Marx’s social engineering strategies: target removal, target devaluation, target insulation, offender weakening and incapacitation, exclusion, and offense/offender/ target identification. (definitions and examples) – Textbook/ Lecture

5. Hard and Soft Technology: definition and examples from court, corrections, community corrections and policing. – Lecture

6. Phillip Garrido – Link

7. Identity Theft: extent of the problem, techniques, offender profile – Lectures, Links

8. Internet Crime Schemes: identify and define each type – Lecture

9. Check and Credit Card Fraud: How they are acquired, extent of problem. – Lecture

10. New Technology and Youth: Cyberstalking, sexting, child pornography, and solicitation. – Lecture

11. Hard Technology and the Prevention of Crime: examples – Lecture

12. Newark Cops and CCTV: know the case, was it effective? – Lecture

13. China’s All Seeing Eye: know where in China, the case, the Golden Shield. – Lecture

14. Common Fraud Schemes as listed by the F.B.I. – Link

15. Telemarketing Fraud: who are the offenders, how much do they make? – Link

16. Anti-Depressants: do they work? – Link

17. National Institute of Justice: What is it and what is its mission? - Link

18. Street lighting effectiveness:

19. Minority Report: future of technology prevention? – In Class

20. F.B.I.: The threat of foreign vs. homegrown terrorists – Link

Know the use and definitions of the following terms provided in class, readings and links:

21. Bluesnarfing:

22. Hacking:

23. Phishing:

24. Ponzi Scheme (Bernie Madoff):

25. Password Crackers:

26. Malicious Code:

27. Key Loggers:

28. Trojan Horse:

29. Bot:

30. Encryption:

31. Steganography:

32. Spoofing: