police admin
CompStat relies heavily on:
Accurate statistical crime data.
Explain the role of a fusion center in the day-to-day operations of a large metropolitan police agency. Do you think that fusion centers would be very helpful to smaller agencies as well? Why or why not?
Acts as a data center within a police agency. Serves as an intelligence hub and clearinghouse for all potentially relevant homeland security and crime information. Information can be used to assess local terror threats and aid I more traditional anti-crime operations. Combs through criminal complaints; arrest, correctional, parole records; 911 calls; police requests for information to provide officers with information tools necessary to stop a terrorist event or investigate a crime. Disseminate relevant and timely intelligence both vertically and horizontally. Intelligence assists in providing information to decision-makers. Often work very closely with smaller agencies and different jurisdictions. Although a small agency can benefit from the intelligence disseminated from a fusion center, it seems unnecessary for them to have their own. Very expensive. It is possible that there will not be enough activity/information to accurately recognize trends or make predictions. State-level fusion centers typically make their services/information available to smaller agencies. Fusion centers benefit from smaller agencies sharing information with them, as well (this is one of the main reasons for having fusion centers). If there is critical infrastructure/key resources within the jurisdiction of a smaller agency, the closest fusion center (typically at the state level) will have already have completed a threat assessment for such areas of concern (often with the assistance of the local agency) and made copies available to the smaller jurisdictions. By having intelligence in many different places (i.e. many fusion centers) it increases the likelihood that information may be overlooked or not disseminated to all appropriate agencies.
Which of the following agencies has been incorporated in the Department of Homeland Security?
All of the above
Because fusion centers are developed to support operations during an emergency that is either human-made, such as a terrorist event, or natural, such as a hurricane, flood, or tornado, their scope is considered to be:
All-hazard
The theory of crime that argues that crime increases in neighborhoods where visible signs of social decay are present and not cleaned up is:
Broken windows.
The CompStat program in Minneapolis is referred to as:
CODEFOR.
frontier closings
1890- the official date set by the federal government for the "closing of the frontier," a key point in the transition from a rural to an urban society
prohibition
1919 to 1933
Define CompStat and identify the core principles of CompStat as presented in the New York City model.
A collection of modern management practices, military-like deployment efforts, and strong enforcement strategies, all based on the availability of accurate and timely statistical crime data. Focus on making the police more efficient and effective Analysis of accurate and timely intelligence and statistical crime information based on geographical settings and/or areas, using high technology computer systems. Rapid deployment of resources, particularly combining patrol with non-uniform agents within a specific area aimed at specific targets. Tactics that focus on visible street crime or "quality of life" crimes. Relentless follow-up and assessment that includes placing accountability on all levels within the organization.
Which of the following is not one of the primary goals of a fusion center?
Conduct interviews with suspected terrorist operatives.
What is a hate crime? Give examples and discuss relevant current events in your community that might be labeled hate crime.
Crimes committed against an individual because of his/her actual or perceived race, religion, ethnicity, gender, and/or sexual orientation. Threats of violence. Violent or property crimes. Cause physical and/or emotional trauma. Make others who share the same characteristic(s) of a victim feel vulnerable. Examples: Roman persecution of Christians, Nazi pogroms, genocide, lynching of African Americans, cross burning, painting of swastikas, assaults on the GLBT Population, etc. Recent hate crimes in the news: Stabbing of a Muslim man while saying "Muslims are the root of problems;" Attacks against the homeless population are being treated as hate crimes in some states; Bullying peers due to perceived homosexuality, resulting in the victim committing suicide (perpetrator of bullying now often charged in the death); etc.
Which of the following is an example of international terrorism?
Cuban DGI
Define intelligence.
Data and information that have been evaluated, analyzed, and produced with careful conclusions and recommendations. A product created from systematic and thoughtful examination, placed in context, and provided to law enforcement executives. Outlines facts and alternatives that can inform critical decisions.
Illegal ____________ refers to accessing private sector databases that are not controlled or authenticated.
Data mining
President George W. Bush created the ____________ to focus on the anti-terrorism effort in the United States.
Department of Homeland Security
Discuss the development of the Department of Homeland Security and its four primary areas of responsibility.
Developed in 2002 by President George W. Bush Originally headed by Tom Ridge to focus on the anti-terrorism effort. Absorbed many existing enforcement agencies (TSA, U.S. Coast Guard, U.S. Customs, ATF, U.S. secret Service, and FEMA) and created a division to analyze intelligence gathered by the FBI, CIA and other police and military agencies. Thrid-largest federal department. Responsible for immigration policy, airport security, and the protection of the president Four primary areas of responsibility: Boarder security and transportation, emergency preparedness and response; chemical, biological, radiological, and nuclear countermeasures; Intelligence analysis and infrastructure protection
White-supremacist groups' use of the Internet to recruit potential members and spread their message of hate is referred to as:
Digital hate.
The final step in the intelligence cycle, known as ____________, is the distribution of raw or finished intelligence o the consumers whose needs initiated the intelligence requirements
Dissemination
The Neo-Nazis typology
Domestic Terrorism
The national Alliance typology
Domestic Terrorism
Which of the following forms of terrorism involves actions conducted by a group within a nation?
Domestic terrorism.
The Earth Liberation Front is one of the most infamous, single-issue ____________ groups active in the United States.
Ecoterrorist
____________ serve as clearinghouses for all potentially relevant homeland security information.
Fusion centers
Harms inflicted on a victim by an offender whose motivation derives primarily from hatred directed at a perceived characteristic of the victim are known as:
Hate crimes.
The person most often associated with problem-oriented policing is:
Herman Goldstein
Homemade booby-trap explosives, known as ____________, are responsible for the majority of the casualties of U.S. troops in Iraq and Afghanistan.
Improvised explosive devices (IEDs)
Which of the following is not a key feature of CAPS?
Increased administrative bureaucracy
A relatively new policing style focused on offenders, not crime incidents, using intelligence analysis to prevent crime
Intelligence-led policing
Data and information that have been evaluated, analyzed, and produced with careful conclusions and recommendations is known as:
Intelligence.
The concept of a "holy war" is known as:
Jihad
Which of the following is an example of domestic terrorism?
KKK
____________ is acts of insurgency by narcotics and drug traffickers aimed at influencing the policies of a specific government or society through violence and intimidation.
Narco-terrorism
Where was the nation's first fusion center developed?
New York City
Which of the following is not associated with CompStat?
Occasional follow-up and assessment
Which of the following is an example of state terrorism?
Pol Pot
The philosophy of community policing is based on two perspectives:
Proactive and information-based police responses.
A "holy war" is a concept perverted by ____________ to justify a physical war against the West.
Radical Islamists
State Terrorism typology
Saddam Hussein
The four-step, problem-solving methodology referred to as SARA stands for:
Scanning, Analysis, Response, and Assessment
Discuss ecoterrorists and describe two modern ecoterrorist groups? How do ecoterrorists differ from more passive ecological movements?
Single-issue terrorist groups. Violent activity of animal rights and environmental extremists. Distrust mass media, despise government, believe large corporations exploit the resources of the world. Domestic terrorists. Send letter bombs to corporations, set up booby traps to injure loggers, firebomb stores that sell furs. The Animal Liberation Front (ALF) and the Earth Liberation Front (ELF) arose out of peaceful movements. Pose one of the most significant new threats in domestic terrorism. Differ from passive movements in that they advocate violence and destruction to accomplish their ends.
Which of the following is not a focus of artificial intelligence?
Social science applications
Adolph Hitler typology
State Terrorism
The crime analysis technique that involves a tabular display of reported crimes within a given pattern of time and/or location is:
Tactical crime analysis.
International Terrorism typology
The (former) Soviet KGB
Describe the Intelligence Cycle as presented in the National Criminal Intelligence Sharing Plan (NCISP).
The Intelligence Cycle is the process of developing unrefined data into polished intelligence. Consists of six steps: 1. Requirements are information needs that need to be known in order to safeguard the nation; 2. Planning and Direction is the management of the entire effort; 3. Collection is the gathering of raw information (i.e. interviews, surveillances, searches, etc.) based on requirements; 4. Processing and Exploitation involves converting information that has been collected into a usable form by decrypting, translating, and reducing data; 5. Analysis and Production is the process of converting raw information into intelligence; 6. Dissemination is the distribution of finished intelligence to consumers.
How do you define terrorism? Explain the myriad of problems associated with defining this term and discuss the concept that one person's terrorist is another person's freedom fighter.
The premeditated, deliberate, systematic violent actions or threats to innocent people to create fear and intimidation in order to gain political or tactical advantage. Difficult to define because of shifting interests, nterpretations, political agendas, religious beliefs, cultural differences, and human rights rhetoric. Those committing terrorist acts typically do not view themselves as criminals because they believe in the ideology for which they are fighting.
A style of policing based on response to calls for service after the activity has occurred; reactive and incident-driven
Traditional policing
Hezbollah typology
Transnational Terrorism
al-Fatah typology
Transnational Terrorism
al-Qaeda typology
Transnational Terrorism
Which of the following forms of terrorism involves actions conducted in the international arena that are not members of a nation state?
Transnational terrorism.
Who are the predominant targets of radical Islamic terrorists, such as al-Qaeda? Why?
United States is the primary target, along with other "Western" influences (who support the U.S. and its policies) The radical Islamic movement calls for a violent purification movement throughout the Middle East and the greater Islamic world - to do this, the Middle East must be purged of Western influence. Political religious, and/or ideologically-motivated causes. U.S. support for Israel.
Which of the following is a criticism of fusion centers?
a. Ambiguous lines of authority. b. Private sector involvement. c. Illegal data mining. All of the above.
Which of the following is not one of the steps identified in the FBI's intelligence cycle?
a. Analysis and production. b. Collection. c. Planning and direction. All of the above are a part of the intelligence cycle.
Which of the following is an example of transnational terrorism?
a. al-Qaeda. b. HAMAS. c. Hezbollah. All of the above.
untouchables
agents in Chicago would couldn't be corrupted during the prohibition era.
KKK
terrorist group against African Americans
zero tolerance policing
where small crimes are committed that leads to an influx of larger crimes to be committed.
Police Administration
written by OW Wilson knows as the "Bible" for police administration
Metropolitan Police Act
1829; 1st full time police agency for London, supported by Sir Robert Peel
National Organization of Black Law Enforcement Executives
1976 NOBLE works toward the elimination of racism and bias amount enforcement
Teddy Roosevelt
1st commissioner of NYPD
National Association of American Asian Law Enforcement commanders (NAAALEC)
2002, organization fostering leadership, fraternal enrichment, and advancement
Do you believe the hot-spots policing strategies discussed in Chapter 2 would work in your own community? Justify your answer.
Answers will vary based on community. Potential items include, but are not limited to: Would work in community because there are areas that demand the majority of police attention. Would not work in community because the community has adopted a COP philosophy, so other means of addressing crime are more appropriate.
If you were a police officer, would you prefer to work in a department that primarily practices traditional or community policing? Explain your reasoning.
Answers will vary. Those in favor of traditional policing may include rationale such as a highly structured organization, crime-fighting, and innovating policing strategies such as SWAT, electronic surveillance, etc. Those in favor of community policing may include rationale such as building relationships with the community, maintaining a proactive approach that involves crime prevention, and wanting to help solve problems.
The ________ program was designed to move from being a traditional, reactive, incident-driven agency to a more productive and community-oriented department.
Chicago Alternative Policing Strategy (CAPS)
A policing philosophy that focuses o general neighborhood problems as a source of crime: preventive, proactive, and information-based
Community policing
________ is a collection of modern management practices, military-like deployment efforts, and strong enforcement strategies all based on the availability of accurate and timely statistical crime data.
CompStat
Many of the single-issue terrorist groups that arose from relatively peaceful movements and call for a renewal of the planet's geophysical and biological environment and advocate the use of violence are known as:
Ecoterrorists.
A style of policing using the best available research to guide, manage, and evaluate police operations within a community
Evidence-based policing
Define community policing.
Focuses on a service orientation Characterized by building key partnerships within the community and addressing a variety of social problems within a neighborhood other than just crime Crime is not viewed as the sole purview of the police, but rather an entire community's responsibility Preventative, proactive, information driven
In a police department committed to community policing, police effectiveness is measured by:
Greater community involvement.
U.S. citizens who convert to radical Islamic extremism and fight for the jihadist movement are known as:
Homegrown terrorists
Which type of policing forces the police to identify specific areas with undue concentrations of crime and then direct their resources at those places?
Hot-Spots Policing
A geographically based approach to crime-fighting focusing on in-depth analysis of "places" and times, and deploying police officers to those locations that account for the majority of calls for service and crime in a community
Hot-spots policing
What type of policing focuses on an in-depth analysis of places and times, which results in deploying officers to those locations that account for the majority of calls for police service?
Hot-spots policing.
____________ is a product created from systematic and thoughtful examination, placed in context, and provided to law enforcement executives, with facts and alternatives that can inform critical decisions.
Intelligence
Which of the following forms of terrorism involves actions conducted in the international arena that are members of a nation state?
International terrorism
The crime analysis technique that involves a graphic portrayal of associations and relationships among people is:
Link analysis
A style of community policing that focuses on crime and social problems in select neighborhoods and districts
Neighborhood-oriented policing
The purpose of crime analysis is to:
Organize massive quantities of raw information about criminal acts and then to forecast future events from the statistical manipulation of this data.
A proactive policing style that uses information and analytical tools to prevent crime while using the fewest police resources possible
Predictive policing
You are a police officer whose department emphasizes that few crime incidents are isolated, but rather they may be a part of a wider set of urban phenomena. You are probably working in a department whose philosophy is driven what approach to policing?
Problem-oriented
A style of policing that addresses reoccurring social problems within a community through an innovative, four-step model called SARA
Problem-oriented policing
Identify the problems commonly associated with traditional policing.
Reactive in nature, respond to calls for services after an activity occurs Relies on randomized motor patrol; Not effective in deterring crime or catching suspects Role of individual officer reduced to patrolling for and responding to crime
While directed patrol usually involves the directing of patrol officers to specific locations during their patrol shift, what type of patrol concentrates additional officers on specific locations at specific times?
Saturation.
Which of the following forms of terrorism involves actions conducted by a government agency against their own people?
State terrorism.
The crime analysis technique that involves the study of crime and/or social problems in a specific area is:
Strategic crime analysis
The crime analysis technique that involves computerized reports derived from court-ordered telephone long distance billing is:
Telephone toll analysis
Domestic Terrorism typology
The Animal Liberation Front
International Terrorism typology
The Central Intelligence Agency (CIA)
Describe some of the criticisms aimed at fusion centers and the law enforcement responses to terrorism.
Three primary concerns that plague fusion centers: 1. Fusion centers are expensive and cost-benefit analysis reveals significant money spent for very little, tangible evidence of success. Few terrorist incidents have actually been prevented due to the work of fusion centers; 2. Many fusion centers have expanded their role to include crime fighting and reduction, which is well beyond the initial intention of funding centers for the coordination of intelligence and information to prevent terrorism; 3. Fusion centers come close to violating the civil liberties of people with regard to racial and ethnic profiling and breaches of privacy.
Why do you think some "traditional" police personnel have not been supportive of the community policing concept?
True implementation of COP requires a decentralized police agency with less of a bureaucratic structure. In addition, it requires police administrators relinquish some of their decision-making authority and turn it over to the patrol officers who are actually working with citizens in the community. Many police administrators have been hesitant to give up such authority.
Which of the following is not a key feature of the Chicago Alternative Policing Strategy (CAPS)?
Use of random moving patrol cars to deter crime. Officers assigned to different beats and watches so that they can better address crime problems for a larger geographic responsibility.
What has been the impact of information technologies on the police?
Used in data analysis Storage and maintenance of data Administrative decision making
The crime analysis technique that involves charting that depicts key events of criminal activity in chronological order is:
Visual investigative analysis
A focused police strategy built on the philosophy that visible signs of social decay often lead to more serious crimes in a specific neighborhood; emphasizes strict enforcement of the law for even minor crimes of disorder
Zero-tolerance policing
The most infamous radical Islamic terror groups is ____________.
al-Qaeda
Computer software systems focused on the intelligent processing of knowledge versus mere data processing are known collectively as ________.
artificial intelligence
The goal of ________ is to develop computers that can think as well as see, hear, walk, talk, and feel.
artificial intelligence
Raymond Fosdick
author who played a major role in the Cleveland Foundation Study that found that the civil service test made it harder to terminate difficult officers
Lexow Committee
committee that examined corruption in the New York Police Department 1894-1895
Industrial Revolution
drew the population towards cities (1760-1830) leading to the Metropolitan Police Act in London
Sir Robert Peel
driving force behind the London Metropolitan Act. His officers were called "Bobbies".
community-oriented policing
early 1980's policing that essentially provided custom-tailored police services to neighborhoods and business districts. used interchangeably with problem-oriented policing
August Vollmer
father of modern law enforcement who believed that police officers should get an education
Pendelton Act
federal legislation 1883 establishing the US Civil Service Commission
Forces Act
federal legislation to combat KKK (1870)
With the advent of sophisticated computerized mapping, researchers have found a widespread adoption of ________ tools across police departments.
geographic information systems (GIS
Much like evidence-based policing, ________ policing reflects the direct application of empirical data that show that crime is not randomly dispersed, but rather is concentrated in isolated areas.
hot spots
Arising from the 9/11 terrorist attacks, ________ is a relatively new policing style focused on offenders, not crime incidents, using intelligence analysis to prevent crime.
intelligence-led policing
muckrakers
journalists and writes who exposed corruption
temperance movement
late 19th century anti-alcohol movement; church based. beginnings of prohibition
Black Codes
laws quickly adopted in southern states following the Civil War to repress African Americans.
National Association of Women Law Enforcement Executives
made with unique needs of women holding senior positions of law enforcement
As a style of community policing, ________ focuses on crime and social problems in select neighborhoods or districts.
neighborhood-oriented policing
National Criminal Justice Reference Service
online reference source for criminal justice students, scholars, practitioners, and the public
Kansas City Preventive Patrol Study
part of the trilogy of research and experiment that rocked policing in the early 1970s
military model
police theory that there is a war against crime and the police are front-line soldiers
Hispanic American Police Command Officers Association
provides training and other opportunities for its members
reformation period
reformers sought to free policing from political abuses and corruption; had two needsL arouse apathetic public and a conceptual model to drive it.
While directed patrol usually involves the "direction" of patrol officers to specific locations during their patrol shift, ________ concentrates additional officers on specific locations at specific times.
saturated patrol
lynching
sever beating, but later became illegally hanging someone
bootleggers
someone who smuggled illegal alcohol during prohibition; also referred to people who hid a flask in their boot or held one to their leg with a garter.
Jim Crow Laws
southern laws that repressed African Americans, enacted 1880-1960 following the black codes
slave patrols
the hunting down of fugitive slaves, administering impromptu punishments
politics
the process of acquiring and maintaining control over a government including its policies, administration, and operations
evidence-based policing
theory of policing that grew out of 1998 artile by Larry Sherman, who argued that police practices should be based on the best evidence available.
political machine
tightly controlled political party headed by a boss or small autocratic group whose purpose was to repeatedly win election for personal gain, often through cheating