Contemporary Policing Final Exam Review
Final Exam (#5) Review Sheet: Contemporary Policing, J Szucs
Chapter 13
FBI Index Crimes
- Reference: Page 384, Table 13.1
- Details: Review crimes listed by the FBI, categorizing them based on their frequency of occurrence, ranging from those that happen least to those that happen most.4th Amendment Elements
- Reference: Page 387
- Definition: The 4th Amendment protects citizens from unreasonable searches and seizures. Any search or seizure conducted without a warrant or probable cause is deemed unconstitutional.Landmark Cases
- Weeks v. US
- Details: Established the exclusionary rule, preventing evidence obtained through unlawful search and seizure from being used in federal prosecutions.
- Mapp v. Ohio
- Details: Extended the exclusionary rule to state courts, emphasizing protections under the 4th Amendment.
- Terry v. Ohio
- Details: Affirmed the constitutionality of stop-and-frisk procedures, coming into play when an officer has reasonable suspicion of criminal activity.
- Miranda v. Arizona
- Details: Required that individuals in custody be informed of their rights before being interrogated (Miranda rights).
- Brown v. Mississippi
- Details: Addressed the inadmissibility of coerced confessions, reinforcing due process rights.
- Reference: Pages 390-391, 406, 417-419Probable Cause
- Definition: A legal standard of proof in criminal cases; sufficient reason based upon known facts to believe a crime has been committed or that certain property is connected with a crime.
- Reference: Page 394K-9 Utilization and 4th Amendment Considerations
- Details: Explore the permissible use of trained dogs in searches, the standards applied to such searches under the 4th Amendment, and how the use of K-9s fits into the legal framework of search and seizure.
- Reference: Page 401
Chapter 14
Computers in Policing
- Origin and Utility for Law Enforcement
- Details: Discuss how technology, including computers, has been integrated into modern policing.
- CAD Systems
- Definition: Computer-Aided Dispatch systems utilized for efficient handling of emergency calls and information dissemination among law enforcement.
- Reference: Page 444FBI NCIC Database and ViCap Program
- FBI NCIC Database
- Definition: National Crime Information Center database that allows law enforcement access to criminal justice information.
- ViCap Program
- Definition: Violent Criminal Apprehension Program; a nationwide database that assists in tracking violent crime.
- Reference: Page 448Fingerprint Technology
- Key Concepts:
- AFIS (Automated Fingerprint Identification System): A biometric system for fingerprint recognition.
- Live Scan: A method used to scan fingerprints digitally.
- Fingerprints at Crime Scenes: How to properly collect and analyze fingerprints at crime scenes.
- Reference: Pages 455-457Less-than-Lethal Weapons
- Chemical and Irritant Sprays
- Examples: OC spray (pepper spray), tear gas.
- Tasers
- Details: Devices used to incapacitate subjects through electrical impulses.
- Reference: Pages 460-461Age Progression Technology
- Definition: Methods used to create images of missing persons as they might appear as they age.
- Reference: Page 469Forensic Science/Criminalistics
- Definition: The application of scientific principles and techniques to matters related to the justice system.
- Branches of Forensic Science: Includes multiple disciplines such as biology, chemistry, and physical sciences, each specializing in aspect related to criminal evidence.
- Reference: Pages 470-471Science of DNA
- Overview: Discusses the significance of DNA analysis in criminal investigations, including collection, preservation, and matching techniques.
- Reference: Page 481
Chapter 15
Definition of Terrorism
- Key Elements:
- Domestic Terrorism: Terrorist activities occurring primarily within the United States.
- International Terrorism: Terrorism conducted by foreign entities against American interests.
- Special Interest Groups: Groups that engage in terroristic actions to pursue specific agendas, including environmental terrorism or religious motives.
- References: Pages 505, 510, 513-515Investigating Terrorism
- Overview: Discuss methods used in investigating terrorist activities, including intelligence gathering and community engagement.
- Proactive and Reactive Measures:
- Proactive Measures: Actions taken to prevent terrorist acts before they occur.
- Reactive Measures: Responses and strategies enacted after a terrorist incident takes place.
- Reference: Page 516Roles of Various Agencies
- FBI:
- Details: Investigative body responsible for combatting terrorism and enforcing federal laws.
- Joint Terrorism Task Forces (JTTF):
- Details: Collaboration between federal, state, and local law enforcement agencies to address terrorism.
- Transportation Security Administration (TSA):
- Details: Agency responsible for security in transportation systems, especially aviation.
- USA Patriot Act:
- Details: Legislative act that expands the tools and resources available to the federal government to combat terrorism.
- Reference: Pages 519-522National Security Letters and FISA
- National Security Letters (NSLs):
- Definition: Authorizations for the FBI to obtain information in national security investigations without a court order.
- Foreign Intelligence Surveillance Act (FISA):
- Overview: Governs the surveillance of foreign agents and terrorists, including the requirements needed to obtain a warrant.
- Reference: Page 537