1/139
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
When was Ted Bundy’s thing “unleashed”?
1969-1974 and in 1972 he got a college degree
When and where was the height of Bundy’s career?
1974-1978 when he fused sex with violence in Washington, Oregon, Utah, and Colorado (they were good places to hide bodies)
What was Bundy arrested for in 1976?
kidnapping but he escaped to Florida
What happened with Ted Bundy in Florida?
Chi Omega murders that he was pinned for because they identified the bite mark on one of the victims
When was Bundy convicted and then executed?
convicted in 1980 and executed in 1989
Missing missing
the people who were never reported missing and never found
Cultural context in the 1970s
police couldn’t tie together murders outside the state (didn’t share info) and there was little to no cameras or DNA (there was fingerprinting
8th Amendment
protection against excessive bail, fines, and cruel and unusual punishment
Executions from 0→1750
there were public hangings that were supposed to deter (did not work)
Specific vs general deterence
specific is for the individual and general is for the society
Quick and painless death
sign of progress
1870-1880s
Edison vs Westonhouse debate over form of electricity
Trop v Dulles
evolving standards of decency (eligibility for death penalty narrows)
Furman (1972)
abolition of death penalty (corrections and courts are all involved in this)
Jurek (1978)
death penalty restricted to felony murder (serial murder and the murder of the defenseless)
Key cases
Woodson (1976)- need option of life
Coker (1977)- death penalty for rape was unconstitutional
Lockette (1978)- mitigation
Edmund (1982)- both get death if there is an acomplace
Bearfoot- personal assessment of psychologist
Ford (1986)- insanity
Roper- no executions of juveniles
Penry- mitigation of intelectual impairments
Homeland security
adopted to coordinate preparedness and response initiatives at all levels of society; exists to safeguard domestic security (expanded with Hurricane Katrina)
Terrorism
is an unlawful act by group that threaten or use for or violence against human or property targets for intimidation of governments with an underlying political objective (usually antigovernment, religious, or reacial)
Enemy combatants
don’t have the same legal status as prisoners of wars
New terrorism
loose cell-based networks, desire of high-intensity weapons of mass destruction, political motivations, asymmetrical methods that max casualties, use of the internet and media
Two developments of terrorist environment
a new morality and organizational decentralization
Lone-wolf model
have own initiative aligned with extremist causes motivated racial, ideological, or international jihadist ideologies
Precursors to modern security environment
February 1993- first attack on the World Trade Center
October 1995- ten men in NY convicted of plotting attacks
Factors making the attack possible
operatives came into the country solely to carry out the attacks and they received support from inside the US (militants had been know to be in the US since late 1980s and 90s)
Homegrown jihadists incidents
Fort Hood Incident
The Boston Marathon Bombing
The San Bernardino Attack
The Pule Nightclub Attack
Rightist violence vs leftist violence
right violence- originates form historical racial and nativist animosity with religious and antigovernment ideologies
leftist- evolved from American activist environment (civil rights, Black Power, etc.)
Patriot movement
American ideals of individualism, armed citizens, and minimum government interference
Three phases of modern conspiracy beliefs
Cold War era, New World Order, and post-9/11 (“truther”)
What invigorated paranoid political activisim?
Ruby Ridge and the Waco events
Decline of of Patriot organizations
Oklahoma City bombing, the non materialization of the New World Order, and shift to international threats after 9/11
Neo-Nazi and racial supremacists violence
James Wenneker von Brunn, Frazier Glenn Cross, and Dylann Roof
Left political trends
Labor activism (unions), people’s rights (civil rights and stuff), single issue (environment and peace), and questioning traditions (counterculture movements)
Laws on terrorism
The Anti-Terrorism and Effective Death Penalty Act of 1996- provide resources for counterterrorist programs, punish terrorism and terrorist activity
USA Patriot Act- address new security threat
Department of Homeland Security Act of 2002- reorganized homeland security community
USA Patriot Act Improvement and Reauthorization Act of 2005- counterbalance enhanced authority
The USA FREEDOM Act- legalistic approach to controlling terrorism
Homeland security considerations
regulating the media, electronic surveillance, terrorist profiling, and labeling detainees
What are the results of terrorism
causes fear and is uncommon; 9/11 report (pre-9/11, how to combat, and aftermath)
First instance of terrorism
was in 72 and 74 AD (Jewish overthrowing Romans); during the French Revolution was the first use of the word
What happened in 1865
Lincoln assination aimed to take down the government (also cases in Africa with French colonies)
Government induced famons
Russia in the early 1930s with Stalin and is still utilized today
Asymmetric warfair
terrorist blend into society and smaller, less well armed, groups it is difficult to prevent because the attacks are random
International vs domestic
individuals inspired by or are associated with terrorist organizations (from outside) and domestic terrorist have political, religious, or other organizations (inside)
What happened in Japan?
there was a terrorist gas attack in the the subway (good at adapting tech)
How do you combat terrorism?
regime change (give money and weapons), wack-a-mole (act when get info and send them to guantanimo), but you also have to ballence morals and safety
Deaths from fentanyl from 2022-2024
2022: 73k
2023:107k
2024: 74k (drop from awareness)
Takeaways about fentanol
Approved by the FDA, used for capital punishment, 100x more potent than morphine
3 waves of drugs
1999-2010 (oxycotton), 2010-2016 (heroine), and 2016 (fentanyl)
Domestic mitigation
Distribution and manufacturing crackdown, awareness, border control, tariffs, and harm reduction (narcan and needle exchange)
International mitigation
Caters made terrorists, money trail, coast guard, forein supply reduction
Term hacking
derived from hacker in the late 50s and early 60s at MIT to describe skilled hobbyists who advanced computing tech (creative software development)
Phone phreaking
replicated routing tones that produced free calls
Kevin Mitnick
use a varitey low and hight-tech methods to gain access to government and company computer system in the late 80s (and 90s)
Social engineering
the use of deception, manipulation, and influence on others
Spear phishing
a nefarious e-mail seems to be from a legit source that trick the recipient into opening a file that installs malware (cybercriminals can gain access)
Advance-fee scams (Nigerian 419 scam)
involves false promises of large returns for a small money advance by the victim
Distributed denial of service (DDoS)
attack using a network of infected computers (botnet) to overload and disable a website or network
Darknets
internet black markets that hackers sell personal info on
The Onion Router (“Tor”)
designed to shield users against surveillance and anyone knowing their physical locations (“protecting personal freedom and privacy”)
Identity Theft Resource Center (ITRC)
tracks known data breaches in
1.) insider theft
2.) hacker intrusion
3.) data on the move
4.) physical theft
5.) employee error/negligence
6.) accidental Web exposure
7.) unauthorized access
First military cyber weapon
deployed against Iran’s Natanz nuclear fuel enrichment facility in 2010
Declaration of the Independence of Cyberspace
by cyber-libertarian and founder of the digital rights organization Electronic Frontier Foundation (John Perry Barlow) that warns entities that threatens the information sovereignty of the Web
Black hat hackers (“crackers” or “dark-side”)
break into computers and networks to create harmful viruses and even demand ransom (ransomware)
White hat hackers
security professionals breaking into computers to look for vulnerabilities to fix them
Grey hat hackers
compromise systems without evil intent and are basically hackers for hire
Ethical hacking courses
gives students hacking know-how resulted in students using it for nefarious reasons
Neutralization theory
five justifications for criminal behavior
1.) denial of responsibility
2.) denial of injury
3.) denial of victim
4.) condemning the condemners
5.) appeals to higher authorities
General theory of crime
states that crime is a result of the inability to refrain from temptation and impulses
Yar
looked at the disproportionate amount of youth participation in computer hacking activity by mapping categories of expertise with causal factors: moral development, family disfunction, and youth culture and peer associations
First step in computer forensics
finding the physical source of a computer system that was used for a crime (IP address)
What is true about computer forensics
it is difficult, expensive, and time-consuming for local police
Five federal agencies have taken on cybersecurity
FBI, Federal Trade Commission (FTC), Department of Homeland Security (DHS), U.S. Secret Service, and the National Institute of Standards and Technology (NIST)
Crowdsourcing
obtaining info by enlisting services of a large number of people
Factors that contribute to crime
age, association with deviant peers, and lower levels of self-control
Cyberbulling
includes spreading harmful info by text, gaming, and exclusion from online communities
Revenge porn
explicit images shared in order to inflict shame as retaliation
Proposed Intimate Privacy Protection Act
would criminalize the distribution of nonconsensual porn and may standardize the law
Normative-rational theory
looks at police organizations as independent entities and asks what do they do to achieve their mission
Contingency theory
explanation of the behavior of police organizations in terms of environment; adaptation is characteristic
Structural contingency theory
explain organizational structures in terms of environment, size, and strategy
Organizational structure issues
relationship between contingency and the structure, if the contingency changes the structure changes, and the fit between the contingency and the organization determines organizational performance
Morabito
hypothesized that community political structures facilitate policing practices
Three political structures
jurisdiction with city managers, those with partisan elections, and community characteristics
Three part question
what does community policing address that represents a change in the environment and that resulted from a mist-fit between policing and the environment
Organization of findings of police effectiveness
Did the intervention show success and was the method adequate for confidence in the conclusions?
Police practices
CompStat, Lever pulling, Problem-oriented policing, Broken windows, Crime mapping, Third-party policing, intellingence-led policing, Hot-spot policing, and Crackdowns
Two features of police practices
the emergence of police effectiveness as a strog area of research and the return of policing to professionalism
Institutional theory
organizational structure and policy is about satisfying values carried by important constituencies in their environments
Institutional theory issues
transmission of institutional expectations, legitimating processes (percieved treatments is more important than outcome), empirical testing against contingency theory, and police history (eras)
Six ways environmental elements are received by police
imposition, authorization, induced, acquisition, imprinting, and incorporation
Variations of conflict theory
racial threat thesis (minority threat increases with size), inequality thesis (economic inequalities), and racial disturbance thesis (political threats by minorities influence resources devoted to police)
Rational choice theory
resources are distributed according to the need for crime control (conflict theory says that they are aimed at controlling racial minorities)
Sharp’s findings
The baseline for department size predicted organizational size, racial disturbances can also predict size, and there is evidence for the racial threat thesis when all minority groups are included
Hurdle effect
the likelihood of being stopped seems to be more a function of the crime rate in the area than demographic and or socioeconomic characteristics
COP principles
reducing power relations between the police and SDNs and avoiding the technical, authoritative approaches characteristic of community policing
Postmodernism
can be a philosophy rejection of the modern (symbolic use of language) and postmodernism as a time period (natural laws given by God; historical)
Policing characterizations
the fragmentation of values and moralities, globalization, a rise in consumerism, a hollowing out of the nation-state (risk society), adaptive risk-based policing strategies
10 Elements of the Metropolitan Police Act
1.) The police must be stable
2.) They must be under government control (prevent crime)
3.) They must have respect from the public
4.) The police should be ready to protect and preserve life
5.) The police can’t act as agents of revenge
6.) Physical force only as a last resort
7.) Police efficiency is the absence of crime and disorder
8.) The distribution of crime news is essential
9.) The deployment of police strength both by time and area is essential
10.) The securing and training of proper persons is at the root of efficiency
What happened in 1658 in New York
they replaced the rattlewatch with eight paid watchmen
Difference in development of the police
the American’s inability to remove the negative impact of political influence from policing
Pendleton Act 1833
ended the spoils system and led to civil service examinations to select police officers and other public servants
The Progressive Movement
sought to eliminate corruption and return government to the hands of the people
Wickersham Commission
determined that police forces lacked the expertise and equiptment to deal with large American cities