Exam 1 Review: Technology and the Criminal Justice System
Professor Byrne, Fall 2010
Exam Date: Thursday, Sep. 30, 2010
Required Reading in Text: Chapters 1, 2, 3, 4, and 14
Required Reading from Materials Section: Anti-depressants article, NIJ Technology overview
Required Readings in Schedule: All links for each week, through today’s class
Required Review of Links: All listed under Technology of Crime
Exam Format: Multiple Choice and true-false questions (20-25). Questions will be drawn from class lectures, the text, and the online readings/links we reviewed in class. I recommend using the key topics identified below as a study guide. Key terms are identified for each topic area. You will be responsible for knowing these terms, as well as the basic facts related to each topic area (definitions of terms, evidence of effectiveness, extent of use, etc)
Listing of Key People and Terms:
1. Richard Sparks’s typology: Crime as Work, Crime at Work, and Crime after Work. (examples) – Textbook, Lecture
2. The Private Sector’s role in Cybercrime Law Enforcement. – Textbook
3. CCTV: effectiveness, displacement of crime – Textbook/ Lectures
4. Gary Marx’s social engineering strategies: target removal, target devaluation, target insulation, offender weakening and incapacitation, exclusion, and offense/offender/ target identification. (definitions and examples) – Textbook/ Lecture
5. Hard and Soft Technology: definition and examples from court, corrections, community corrections and policing. – Lecture
6. Phillip Garrido – Link
7. Identity Theft: extent of the problem, techniques, offender profile – Lectures, Links
8. Internet Crime Schemes: identify and define each type – Lecture
9. Check and Credit Card Fraud: How they are acquired, extent of problem. – Lecture
10. New Technology and Youth: Cyberstalking, sexting, child pornography, and solicitation. – Lecture
11. Hard Technology and the Prevention of Crime: examples – Lecture
12. Newark Cops and CCTV: know the case, was it effective? – Lecture
13. China’s All Seeing Eye: know where in China, the case, the Golden Shield. – Lecture
14. Common Fraud Schemes as listed by the F.B.I. – Link
15. Telemarketing Fraud: who are the offenders, how much do they make? – Link
16. Anti-Depressants: do they work? – Link
17. National Institute of Justice: What is it and what is its mission? - Link
18. Street lighting effectiveness:
19. Minority Report: future of technology prevention? – In Class
20. F.B.I.: The threat of foreign vs. homegrown terrorists – Link
Know the use and definitions of the following terms provided in class, readings and links:
21. Bluesnarfing:
22. Hacking:
23. Phishing:
24. Ponzi Scheme (Bernie Madoff):
25. Password Crackers:
26. Malicious Code:
27. Key Loggers:
28. Trojan Horse:
29. Bot:
30. Encryption:
31. Steganography:
32. Spoofing: