Critical Issues Unit 2 Study Guide

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/139

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

140 Terms

1
New cards

When was Ted Bundy’s thing “unleashed”?

1969-1974 and in 1972 he got a college degree

2
New cards

When and where was the height of Bundy’s career?

1974-1978 when he fused sex with violence in Washington, Oregon, Utah, and Colorado (they were good places to hide bodies)

3
New cards

What was Bundy arrested for in 1976?

kidnapping but he escaped to Florida

4
New cards

What happened with Ted Bundy in Florida?

Chi Omega murders that he was pinned for because they identified the bite mark on one of the victims

5
New cards

When was Bundy convicted and then executed?

convicted in 1980 and executed in 1989

6
New cards

Missing missing

the people who were never reported missing and never found

7
New cards

Cultural context in the 1970s

police couldn’t tie together murders outside the state (didn’t share info) and there was little to no cameras or DNA (there was fingerprinting

8
New cards

8th Amendment

protection against excessive bail, fines, and cruel and unusual punishment

9
New cards

Executions from 0→1750

there were public hangings that were supposed to deter (did not work)

10
New cards

Specific vs general deterence

specific is for the individual and general is for the society

11
New cards

Quick and painless death

sign of progress

12
New cards

1870-1880s

Edison vs Westonhouse debate over form of electricity

13
New cards

Trop v Dulles

evolving standards of decency (eligibility for death penalty narrows)

14
New cards

Furman (1972)

abolition of death penalty (corrections and courts are all involved in this)

15
New cards

Jurek (1978)

death penalty restricted to felony murder (serial murder and the murder of the defenseless)

16
New cards

Key cases

Woodson (1976)- need option of life

Coker (1977)- death penalty for rape was unconstitutional

Lockette (1978)- mitigation

Edmund (1982)- both get death if there is an acomplace

Bearfoot- personal assessment of psychologist

Ford (1986)- insanity

Roper- no executions of juveniles

Penry- mitigation of intelectual impairments

17
New cards

Homeland security

adopted to coordinate preparedness and response initiatives at all levels of society; exists to safeguard domestic security (expanded with Hurricane Katrina)

18
New cards

Terrorism

is an unlawful act by group that threaten or use for or violence against human or property targets for intimidation of governments with an underlying political objective (usually antigovernment, religious, or reacial)

19
New cards

Enemy combatants

don’t have the same legal status as prisoners of wars

20
New cards

New terrorism

loose cell-based networks, desire of high-intensity weapons of mass destruction, political motivations, asymmetrical methods that max casualties, use of the internet and media

21
New cards

Two developments of terrorist environment

a new morality and organizational decentralization

22
New cards

Lone-wolf model

have own initiative aligned with extremist causes motivated racial, ideological, or international jihadist ideologies

23
New cards

Precursors to modern security environment

February 1993- first attack on the World Trade Center

October 1995- ten men in NY convicted of plotting attacks

24
New cards

Factors making the attack possible

operatives came into the country solely to carry out the attacks and they received support from inside the US (militants had been know to be in the US since late 1980s and 90s)

25
New cards

Homegrown jihadists incidents

Fort Hood Incident

The Boston Marathon Bombing

The San Bernardino Attack

The Pule Nightclub Attack

26
New cards

Rightist violence vs leftist violence

right violence- originates form historical racial and nativist animosity with religious and antigovernment ideologies

leftist- evolved from American activist environment (civil rights, Black Power, etc.)

27
New cards

Patriot movement

American ideals of individualism, armed citizens, and minimum government interference

28
New cards

Three phases of modern conspiracy beliefs

Cold War era, New World Order, and post-9/11 (“truther”)

29
New cards

What invigorated paranoid political activisim?

Ruby Ridge and the Waco events

30
New cards

Decline of of Patriot organizations

Oklahoma City bombing, the non materialization of the New World Order, and shift to international threats after 9/11

31
New cards

Neo-Nazi and racial supremacists violence

James Wenneker von Brunn, Frazier Glenn Cross, and Dylann Roof

32
New cards

Left political trends

Labor activism (unions), people’s rights (civil rights and stuff), single issue (environment and peace), and questioning traditions (counterculture movements)

33
New cards

Laws on terrorism

The Anti-Terrorism and Effective Death Penalty Act of 1996- provide resources for counterterrorist programs, punish terrorism and terrorist activity

USA Patriot Act- address new security threat

Department of Homeland Security Act of 2002- reorganized homeland security community

USA Patriot Act Improvement and Reauthorization Act of 2005- counterbalance enhanced authority

The USA FREEDOM Act- legalistic approach to controlling terrorism

34
New cards

Homeland security considerations

regulating the media, electronic surveillance, terrorist profiling, and labeling detainees

35
New cards

What are the results of terrorism

causes fear and is uncommon; 9/11 report (pre-9/11, how to combat, and aftermath)

36
New cards

First instance of terrorism

was in 72 and 74 AD (Jewish overthrowing Romans); during the French Revolution was the first use of the word

37
New cards

What happened in 1865

Lincoln assination aimed to take down the government (also cases in Africa with French colonies)

38
New cards

Government induced famons

Russia in the early 1930s with Stalin and is still utilized today

39
New cards

Asymmetric warfair

terrorist blend into society and smaller, less well armed, groups it is difficult to prevent because the attacks are random

40
New cards

International vs domestic

individuals inspired by or are associated with terrorist organizations (from outside) and domestic terrorist have political, religious, or other organizations (inside)

41
New cards

What happened in Japan?

there was a terrorist gas attack in the the subway (good at adapting tech)

42
New cards

How do you combat terrorism?

regime change (give money and weapons), wack-a-mole (act when get info and send them to guantanimo), but you also have to ballence morals and safety

43
New cards

Deaths from fentanyl from 2022-2024

2022: 73k

2023:107k

2024: 74k (drop from awareness)

44
New cards

Takeaways about fentanol

Approved by the FDA, used for capital punishment, 100x more potent than morphine

45
New cards

3 waves of drugs

1999-2010 (oxycotton), 2010-2016 (heroine), and 2016 (fentanyl)

46
New cards

Domestic mitigation

Distribution and manufacturing crackdown, awareness, border control, tariffs, and harm reduction (narcan and needle exchange)

47
New cards

International mitigation

Caters made terrorists, money trail, coast guard, forein supply reduction

48
New cards

Term hacking

derived from hacker in the late 50s and early 60s at MIT to describe skilled hobbyists who advanced computing tech (creative software development)

49
New cards

Phone phreaking

replicated routing tones that produced free calls

50
New cards

Kevin Mitnick

use a varitey low and hight-tech methods to gain access to government and company computer system in the late 80s (and 90s)

51
New cards

Social engineering

the use of deception, manipulation, and influence on others

52
New cards

Spear phishing

a nefarious e-mail seems to be from a legit source that trick the recipient into opening a file that installs malware (cybercriminals can gain access)

53
New cards

Advance-fee scams (Nigerian 419 scam)

involves false promises of large returns for a small money advance by the victim

54
New cards

Distributed denial of service (DDoS)

attack using a network of infected computers (botnet) to overload and disable a website or network

55
New cards

Darknets

internet black markets that hackers sell personal info on

56
New cards

The Onion Router (“Tor”)

designed to shield users against surveillance and anyone knowing their physical locations (“protecting personal freedom and privacy”)

57
New cards

Identity Theft Resource Center (ITRC)

tracks known data breaches in

1.) insider theft

2.) hacker intrusion

3.) data on the move

4.) physical theft

5.) employee error/negligence

6.) accidental Web exposure

7.) unauthorized access

58
New cards

First military cyber weapon

deployed against Iran’s Natanz nuclear fuel enrichment facility in 2010

59
New cards

Declaration of the Independence of Cyberspace

by cyber-libertarian and founder of the digital rights organization Electronic Frontier Foundation (John Perry Barlow) that warns entities that threatens the information sovereignty of the Web

60
New cards

Black hat hackers (“crackers” or “dark-side”)

break into computers and networks to create harmful viruses and even demand ransom (ransomware)

61
New cards

White hat hackers

security professionals breaking into computers to look for vulnerabilities to fix them

62
New cards

Grey hat hackers

compromise systems without evil intent and are basically hackers for hire

63
New cards

Ethical hacking courses

gives students hacking know-how resulted in students using it for nefarious reasons

64
New cards

Neutralization theory

five justifications for criminal behavior

1.) denial of responsibility

2.) denial of injury

3.) denial of victim

4.) condemning the condemners

5.) appeals to higher authorities

65
New cards

General theory of crime

states that crime is a result of the inability to refrain from temptation and impulses

66
New cards

Yar

looked at the disproportionate amount of youth participation in computer hacking activity by mapping categories of expertise with causal factors: moral development, family disfunction, and youth culture and peer associations

67
New cards

First step in computer forensics

finding the physical source of a computer system that was used for a crime (IP address)

68
New cards

What is true about computer forensics

it is difficult, expensive, and time-consuming for local police

69
New cards

Five federal agencies have taken on cybersecurity

FBI, Federal Trade Commission (FTC), Department of Homeland Security (DHS), U.S. Secret Service, and the National Institute of Standards and Technology (NIST)

70
New cards

Crowdsourcing

obtaining info by enlisting services of a large number of people

71
New cards

Factors that contribute to crime

age, association with deviant peers, and lower levels of self-control

72
New cards

Cyberbulling

includes spreading harmful info by text, gaming, and exclusion from online communities

73
New cards

Revenge porn

explicit images shared in order to inflict shame as retaliation

74
New cards

Proposed Intimate Privacy Protection Act

would criminalize the distribution of nonconsensual porn and may standardize the law

75
New cards

Normative-rational theory

looks at police organizations as independent entities and asks what do they do to achieve their mission

76
New cards

Contingency theory

explanation of the behavior of police organizations in terms of environment; adaptation is characteristic

77
New cards

Structural contingency theory

explain organizational structures in terms of environment, size, and strategy

78
New cards

Organizational structure issues

relationship between contingency and the structure, if the contingency changes the structure changes, and the fit between the contingency and the organization determines organizational performance

79
New cards

Morabito

hypothesized that community political structures facilitate policing practices

80
New cards

Three political structures

jurisdiction with city managers, those with partisan elections, and community characteristics

81
New cards

Three part question

what does community policing address that represents a change in the environment and that resulted from a mist-fit between policing and the environment

82
New cards

Organization of findings of police effectiveness

Did the intervention show success and was the method adequate for confidence in the conclusions?

83
New cards

Police practices

CompStat, Lever pulling, Problem-oriented policing, Broken windows, Crime mapping, Third-party policing, intellingence-led policing, Hot-spot policing, and Crackdowns

84
New cards

Two features of police practices

the emergence of police effectiveness as a strog area of research and the return of policing to professionalism

85
New cards

Institutional theory

organizational structure and policy is about satisfying values carried by important constituencies in their environments

86
New cards

Institutional theory issues

transmission of institutional expectations, legitimating processes (percieved treatments is more important than outcome), empirical testing against contingency theory, and police history (eras)

87
New cards

Six ways environmental elements are received by police

imposition, authorization, induced, acquisition, imprinting, and incorporation

88
New cards

Variations of conflict theory

racial threat thesis (minority threat increases with size), inequality thesis (economic inequalities), and racial disturbance thesis (political threats by minorities influence resources devoted to police)

89
New cards

Rational choice theory

resources are distributed according to the need for crime control (conflict theory says that they are aimed at controlling racial minorities)

90
New cards

Sharp’s findings

The baseline for department size predicted organizational size, racial disturbances can also predict size, and there is evidence for the racial threat thesis when all minority groups are included

91
New cards

Hurdle effect

the likelihood of being stopped seems to be more a function of the crime rate in the area than demographic and or socioeconomic characteristics

92
New cards

COP principles

reducing power relations between the police and SDNs and avoiding the technical, authoritative approaches characteristic of community policing

93
New cards

Postmodernism

can be a philosophy rejection of the modern (symbolic use of language) and postmodernism as a time period (natural laws given by God; historical)

94
New cards

Policing characterizations

the fragmentation of values and moralities, globalization, a rise in consumerism, a hollowing out of the nation-state (risk society), adaptive risk-based policing strategies

95
New cards

10 Elements of the Metropolitan Police Act

1.) The police must be stable

2.) They must be under government control (prevent crime)

3.) They must have respect from the public

4.) The police should be ready to protect and preserve life

5.) The police can’t act as agents of revenge

6.) Physical force only as a last resort

7.) Police efficiency is the absence of crime and disorder

8.) The distribution of crime news is essential

9.) The deployment of police strength both by time and area is essential

10.) The securing and training of proper persons is at the root of efficiency

96
New cards

What happened in 1658 in New York

they replaced the rattlewatch with eight paid watchmen

97
New cards

Difference in development of the police

the American’s inability to remove the negative impact of political influence from policing

98
New cards

Pendleton Act 1833

ended the spoils system and led to civil service examinations to select police officers and other public servants

99
New cards

The Progressive Movement

sought to eliminate corruption and return government to the hands of the people

100
New cards

Wickersham Commission

determined that police forces lacked the expertise and equiptment to deal with large American cities