police admin

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

CompStat relies heavily on:

Accurate statistical crime data.

Explain the role of a fusion center in the day-to-day operations of a large metropolitan police agency. Do you think that fusion centers would be very helpful to smaller agencies as well? Why or why not?

Acts as a data center within a police agency. Serves as an intelligence hub and clearinghouse for all potentially relevant homeland security and crime information. Information can be used to assess local terror threats and aid I more traditional anti-crime operations. Combs through criminal complaints; arrest, correctional, parole records; 911 calls; police requests for information to provide officers with information tools necessary to stop a terrorist event or investigate a crime. Disseminate relevant and timely intelligence both vertically and horizontally. Intelligence assists in providing information to decision-makers. Often work very closely with smaller agencies and different jurisdictions. Although a small agency can benefit from the intelligence disseminated from a fusion center, it seems unnecessary for them to have their own. Very expensive. It is possible that there will not be enough activity/information to accurately recognize trends or make predictions. State-level fusion centers typically make their services/information available to smaller agencies. Fusion centers benefit from smaller agencies sharing information with them, as well (this is one of the main reasons for having fusion centers). If there is critical infrastructure/key resources within the jurisdiction of a smaller agency, the closest fusion center (typically at the state level) will have already have completed a threat assessment for such areas of concern (often with the assistance of the local agency) and made copies available to the smaller jurisdictions. By having intelligence in many different places (i.e. many fusion centers) it increases the likelihood that information may be overlooked or not disseminated to all appropriate agencies.

Which of the following agencies has been incorporated in the Department of Homeland Security?

All of the above

Because fusion centers are developed to support operations during an emergency that is either human-made, such as a terrorist event, or natural, such as a hurricane, flood, or tornado, their scope is considered to be:

All-hazard

The theory of crime that argues that crime increases in neighborhoods where visible signs of social decay are present and not cleaned up is:

Broken windows.

The CompStat program in Minneapolis is referred to as:

CODEFOR.

frontier closings

1890- the official date set by the federal government for the "closing of the frontier," a key point in the transition from a rural to an urban society

prohibition

1919 to 1933

Define CompStat and identify the core principles of CompStat as presented in the New York City model.

A collection of modern management practices, military-like deployment efforts, and strong enforcement strategies, all based on the availability of accurate and timely statistical crime data. Focus on making the police more efficient and effective Analysis of accurate and timely intelligence and statistical crime information based on geographical settings and/or areas, using high technology computer systems. Rapid deployment of resources, particularly combining patrol with non-uniform agents within a specific area aimed at specific targets. Tactics that focus on visible street crime or "quality of life" crimes. Relentless follow-up and assessment that includes placing accountability on all levels within the organization.

Which of the following is not one of the primary goals of a fusion center?

Conduct interviews with suspected terrorist operatives.

What is a hate crime? Give examples and discuss relevant current events in your community that might be labeled hate crime.

Crimes committed against an individual because of his/her actual or perceived race, religion, ethnicity, gender, and/or sexual orientation. Threats of violence. Violent or property crimes. Cause physical and/or emotional trauma. Make others who share the same characteristic(s) of a victim feel vulnerable. Examples: Roman persecution of Christians, Nazi pogroms, genocide, lynching of African Americans, cross burning, painting of swastikas, assaults on the GLBT Population, etc. Recent hate crimes in the news: Stabbing of a Muslim man while saying "Muslims are the root of problems;" Attacks against the homeless population are being treated as hate crimes in some states; Bullying peers due to perceived homosexuality, resulting in the victim committing suicide (perpetrator of bullying now often charged in the death); etc.

Which of the following is an example of international terrorism?

Cuban DGI

Define intelligence.

Data and information that have been evaluated, analyzed, and produced with careful conclusions and recommendations. A product created from systematic and thoughtful examination, placed in context, and provided to law enforcement executives. Outlines facts and alternatives that can inform critical decisions.

Illegal ____________ refers to accessing private sector databases that are not controlled or authenticated.

Data mining

President George W. Bush created the ____________ to focus on the anti-terrorism effort in the United States.

Department of Homeland Security

Discuss the development of the Department of Homeland Security and its four primary areas of responsibility.

Developed in 2002 by President George W. Bush Originally headed by Tom Ridge to focus on the anti-terrorism effort. Absorbed many existing enforcement agencies (TSA, U.S. Coast Guard, U.S. Customs, ATF, U.S. secret Service, and FEMA) and created a division to analyze intelligence gathered by the FBI, CIA and other police and military agencies. Thrid-largest federal department. Responsible for immigration policy, airport security, and the protection of the president Four primary areas of responsibility: Boarder security and transportation, emergency preparedness and response; chemical, biological, radiological, and nuclear countermeasures; Intelligence analysis and infrastructure protection

White-supremacist groups' use of the Internet to recruit potential members and spread their message of hate is referred to as:

Digital hate.

The final step in the intelligence cycle, known as ____________, is the distribution of raw or finished intelligence o the consumers whose needs initiated the intelligence requirements

Dissemination

The Neo-Nazis typology

Domestic Terrorism

The national Alliance typology

Domestic Terrorism

Which of the following forms of terrorism involves actions conducted by a group within a nation?

Domestic terrorism.

The Earth Liberation Front is one of the most infamous, single-issue ____________ groups active in the United States.

Ecoterrorist

____________ serve as clearinghouses for all potentially relevant homeland security information.

Fusion centers

Harms inflicted on a victim by an offender whose motivation derives primarily from hatred directed at a perceived characteristic of the victim are known as:

Hate crimes.

The person most often associated with problem-oriented policing is:

Herman Goldstein

Homemade booby-trap explosives, known as ____________, are responsible for the majority of the casualties of U.S. troops in Iraq and Afghanistan.

Improvised explosive devices (IEDs)

Which of the following is not a key feature of CAPS?

Increased administrative bureaucracy

A relatively new policing style focused on offenders, not crime incidents, using intelligence analysis to prevent crime

Intelligence-led policing

Data and information that have been evaluated, analyzed, and produced with careful conclusions and recommendations is known as:

Intelligence.

The concept of a "holy war" is known as:

Jihad

Which of the following is an example of domestic terrorism?

KKK

____________ is acts of insurgency by narcotics and drug traffickers aimed at influencing the policies of a specific government or society through violence and intimidation.

Narco-terrorism

Where was the nation's first fusion center developed?

New York City

Which of the following is not associated with CompStat?

Occasional follow-up and assessment

Which of the following is an example of state terrorism?

Pol Pot

The philosophy of community policing is based on two perspectives:

Proactive and information-based police responses.

A "holy war" is a concept perverted by ____________ to justify a physical war against the West.

Radical Islamists

State Terrorism typology

Saddam Hussein

The four-step, problem-solving methodology referred to as SARA stands for:

Scanning, Analysis, Response, and Assessment

Discuss ecoterrorists and describe two modern ecoterrorist groups? How do ecoterrorists differ from more passive ecological movements?

Single-issue terrorist groups. Violent activity of animal rights and environmental extremists. Distrust mass media, despise government, believe large corporations exploit the resources of the world. Domestic terrorists. Send letter bombs to corporations, set up booby traps to injure loggers, firebomb stores that sell furs. The Animal Liberation Front (ALF) and the Earth Liberation Front (ELF) arose out of peaceful movements. Pose one of the most significant new threats in domestic terrorism. Differ from passive movements in that they advocate violence and destruction to accomplish their ends.

Which of the following is not a focus of artificial intelligence?

Social science applications

Adolph Hitler typology

State Terrorism

The crime analysis technique that involves a tabular display of reported crimes within a given pattern of time and/or location is:

Tactical crime analysis.

International Terrorism typology

The (former) Soviet KGB

Describe the Intelligence Cycle as presented in the National Criminal Intelligence Sharing Plan (NCISP).

The Intelligence Cycle is the process of developing unrefined data into polished intelligence. Consists of six steps: 1. Requirements are information needs that need to be known in order to safeguard the nation; 2. Planning and Direction is the management of the entire effort; 3. Collection is the gathering of raw information (i.e. interviews, surveillances, searches, etc.) based on requirements; 4. Processing and Exploitation involves converting information that has been collected into a usable form by decrypting, translating, and reducing data; 5. Analysis and Production is the process of converting raw information into intelligence; 6. Dissemination is the distribution of finished intelligence to consumers.

How do you define terrorism? Explain the myriad of problems associated with defining this term and discuss the concept that one person's terrorist is another person's freedom fighter.

The premeditated, deliberate, systematic violent actions or threats to innocent people to create fear and intimidation in order to gain political or tactical advantage. Difficult to define because of shifting interests, nterpretations, political agendas, religious beliefs, cultural differences, and human rights rhetoric. Those committing terrorist acts typically do not view themselves as criminals because they believe in the ideology for which they are fighting.

A style of policing based on response to calls for service after the activity has occurred; reactive and incident-driven

Traditional policing

Hezbollah typology

Transnational Terrorism

al-Fatah typology

Transnational Terrorism

al-Qaeda typology

Transnational Terrorism

Which of the following forms of terrorism involves actions conducted in the international arena that are not members of a nation state?

Transnational terrorism.

Who are the predominant targets of radical Islamic terrorists, such as al-Qaeda? Why?

United States is the primary target, along with other "Western" influences (who support the U.S. and its policies) The radical Islamic movement calls for a violent purification movement throughout the Middle East and the greater Islamic world - to do this, the Middle East must be purged of Western influence. Political religious, and/or ideologically-motivated causes. U.S. support for Israel.

Which of the following is a criticism of fusion centers?

a. Ambiguous lines of authority. b. Private sector involvement. c. Illegal data mining. All of the above.

Which of the following is not one of the steps identified in the FBI's intelligence cycle?

a. Analysis and production. b. Collection. c. Planning and direction. All of the above are a part of the intelligence cycle.

Which of the following is an example of transnational terrorism?

a. al-Qaeda. b. HAMAS. c. Hezbollah. All of the above.

untouchables

agents in Chicago would couldn't be corrupted during the prohibition era.

KKK

terrorist group against African Americans

zero tolerance policing

where small crimes are committed that leads to an influx of larger crimes to be committed.

Police Administration

written by OW Wilson knows as the "Bible" for police administration

Metropolitan Police Act

1829; 1st full time police agency for London, supported by Sir Robert Peel

National Organization of Black Law Enforcement Executives

1976 NOBLE works toward the elimination of racism and bias amount enforcement

Teddy Roosevelt

1st commissioner of NYPD

National Association of American Asian Law Enforcement commanders (NAAALEC)

2002, organization fostering leadership, fraternal enrichment, and advancement

Do you believe the hot-spots policing strategies discussed in Chapter 2 would work in your own community? Justify your answer.

Answers will vary based on community. Potential items include, but are not limited to: Would work in community because there are areas that demand the majority of police attention. Would not work in community because the community has adopted a COP philosophy, so other means of addressing crime are more appropriate.

If you were a police officer, would you prefer to work in a department that primarily practices traditional or community policing? Explain your reasoning.

Answers will vary. Those in favor of traditional policing may include rationale such as a highly structured organization, crime-fighting, and innovating policing strategies such as SWAT, electronic surveillance, etc. Those in favor of community policing may include rationale such as building relationships with the community, maintaining a proactive approach that involves crime prevention, and wanting to help solve problems.

The ________ program was designed to move from being a traditional, reactive, incident-driven agency to a more productive and community-oriented department.

Chicago Alternative Policing Strategy (CAPS)

A policing philosophy that focuses o general neighborhood problems as a source of crime: preventive, proactive, and information-based

Community policing

________ is a collection of modern management practices, military-like deployment efforts, and strong enforcement strategies all based on the availability of accurate and timely statistical crime data.

CompStat

Many of the single-issue terrorist groups that arose from relatively peaceful movements and call for a renewal of the planet's geophysical and biological environment and advocate the use of violence are known as:

Ecoterrorists.

A style of policing using the best available research to guide, manage, and evaluate police operations within a community

Evidence-based policing

Define community policing.

Focuses on a service orientation Characterized by building key partnerships within the community and addressing a variety of social problems within a neighborhood other than just crime Crime is not viewed as the sole purview of the police, but rather an entire community's responsibility Preventative, proactive, information driven

In a police department committed to community policing, police effectiveness is measured by:

Greater community involvement.

U.S. citizens who convert to radical Islamic extremism and fight for the jihadist movement are known as:

Homegrown terrorists

Which type of policing forces the police to identify specific areas with undue concentrations of crime and then direct their resources at those places?

Hot-Spots Policing

A geographically based approach to crime-fighting focusing on in-depth analysis of "places" and times, and deploying police officers to those locations that account for the majority of calls for service and crime in a community

Hot-spots policing

What type of policing focuses on an in-depth analysis of places and times, which results in deploying officers to those locations that account for the majority of calls for police service?

Hot-spots policing.

____________ is a product created from systematic and thoughtful examination, placed in context, and provided to law enforcement executives, with facts and alternatives that can inform critical decisions.

Intelligence

Which of the following forms of terrorism involves actions conducted in the international arena that are members of a nation state?

International terrorism

The crime analysis technique that involves a graphic portrayal of associations and relationships among people is:

Link analysis

A style of community policing that focuses on crime and social problems in select neighborhoods and districts

Neighborhood-oriented policing

The purpose of crime analysis is to:

Organize massive quantities of raw information about criminal acts and then to forecast future events from the statistical manipulation of this data.

A proactive policing style that uses information and analytical tools to prevent crime while using the fewest police resources possible

Predictive policing

You are a police officer whose department emphasizes that few crime incidents are isolated, but rather they may be a part of a wider set of urban phenomena. You are probably working in a department whose philosophy is driven what approach to policing?

Problem-oriented

A style of policing that addresses reoccurring social problems within a community through an innovative, four-step model called SARA

Problem-oriented policing

Identify the problems commonly associated with traditional policing.

Reactive in nature, respond to calls for services after an activity occurs Relies on randomized motor patrol; Not effective in deterring crime or catching suspects Role of individual officer reduced to patrolling for and responding to crime

While directed patrol usually involves the directing of patrol officers to specific locations during their patrol shift, what type of patrol concentrates additional officers on specific locations at specific times?

Saturation.

Which of the following forms of terrorism involves actions conducted by a government agency against their own people?

State terrorism.

The crime analysis technique that involves the study of crime and/or social problems in a specific area is:

Strategic crime analysis

The crime analysis technique that involves computerized reports derived from court-ordered telephone long distance billing is:

Telephone toll analysis

Domestic Terrorism typology

The Animal Liberation Front

International Terrorism typology

The Central Intelligence Agency (CIA)

Describe some of the criticisms aimed at fusion centers and the law enforcement responses to terrorism.

Three primary concerns that plague fusion centers: 1. Fusion centers are expensive and cost-benefit analysis reveals significant money spent for very little, tangible evidence of success. Few terrorist incidents have actually been prevented due to the work of fusion centers; 2. Many fusion centers have expanded their role to include crime fighting and reduction, which is well beyond the initial intention of funding centers for the coordination of intelligence and information to prevent terrorism; 3. Fusion centers come close to violating the civil liberties of people with regard to racial and ethnic profiling and breaches of privacy.

Why do you think some "traditional" police personnel have not been supportive of the community policing concept?

True implementation of COP requires a decentralized police agency with less of a bureaucratic structure. In addition, it requires police administrators relinquish some of their decision-making authority and turn it over to the patrol officers who are actually working with citizens in the community. Many police administrators have been hesitant to give up such authority.

Which of the following is not a key feature of the Chicago Alternative Policing Strategy (CAPS)?

Use of random moving patrol cars to deter crime. Officers assigned to different beats and watches so that they can better address crime problems for a larger geographic responsibility.

What has been the impact of information technologies on the police?

Used in data analysis Storage and maintenance of data Administrative decision making

The crime analysis technique that involves charting that depicts key events of criminal activity in chronological order is:

Visual investigative analysis

A focused police strategy built on the philosophy that visible signs of social decay often lead to more serious crimes in a specific neighborhood; emphasizes strict enforcement of the law for even minor crimes of disorder

Zero-tolerance policing

The most infamous radical Islamic terror groups is ____________.

al-Qaeda

Computer software systems focused on the intelligent processing of knowledge versus mere data processing are known collectively as ________.

artificial intelligence

The goal of ________ is to develop computers that can think as well as see, hear, walk, talk, and feel.

artificial intelligence

Raymond Fosdick

author who played a major role in the Cleveland Foundation Study that found that the civil service test made it harder to terminate difficult officers

Lexow Committee

committee that examined corruption in the New York Police Department 1894-1895

Industrial Revolution

drew the population towards cities (1760-1830) leading to the Metropolitan Police Act in London

Sir Robert Peel

driving force behind the London Metropolitan Act. His officers were called "Bobbies".

community-oriented policing

early 1980's policing that essentially provided custom-tailored police services to neighborhoods and business districts. used interchangeably with problem-oriented policing

August Vollmer

father of modern law enforcement who believed that police officers should get an education

Pendelton Act

federal legislation 1883 establishing the US Civil Service Commission

Forces Act

federal legislation to combat KKK (1870)

With the advent of sophisticated computerized mapping, researchers have found a widespread adoption of ________ tools across police departments.

geographic information systems (GIS

Much like evidence-based policing, ________ policing reflects the direct application of empirical data that show that crime is not randomly dispersed, but rather is concentrated in isolated areas.

hot spots

Arising from the 9/11 terrorist attacks, ________ is a relatively new policing style focused on offenders, not crime incidents, using intelligence analysis to prevent crime.

intelligence-led policing

muckrakers

journalists and writes who exposed corruption

temperance movement

late 19th century anti-alcohol movement; church based. beginnings of prohibition

Black Codes

laws quickly adopted in southern states following the Civil War to repress African Americans.

National Association of Women Law Enforcement Executives

made with unique needs of women holding senior positions of law enforcement

As a style of community policing, ________ focuses on crime and social problems in select neighborhoods or districts.

neighborhood-oriented policing

National Criminal Justice Reference Service

online reference source for criminal justice students, scholars, practitioners, and the public

Kansas City Preventive Patrol Study

part of the trilogy of research and experiment that rocked policing in the early 1970s

military model

police theory that there is a war against crime and the police are front-line soldiers

Hispanic American Police Command Officers Association

provides training and other opportunities for its members

reformation period

reformers sought to free policing from political abuses and corruption; had two needsL arouse apathetic public and a conceptual model to drive it.

While directed patrol usually involves the "direction" of patrol officers to specific locations during their patrol shift, ________ concentrates additional officers on specific locations at specific times.

saturated patrol

lynching

sever beating, but later became illegally hanging someone

bootleggers

someone who smuggled illegal alcohol during prohibition; also referred to people who hid a flask in their boot or held one to their leg with a garter.

Jim Crow Laws

southern laws that repressed African Americans, enacted 1880-1960 following the black codes

slave patrols

the hunting down of fugitive slaves, administering impromptu punishments

politics

the process of acquiring and maintaining control over a government including its policies, administration, and operations

evidence-based policing

theory of policing that grew out of 1998 artile by Larry Sherman, who argued that police practices should be based on the best evidence available.

political machine

tightly controlled political party headed by a boss or small autocratic group whose purpose was to repeatedly win election for personal gain, often through cheating


Set pelajaran terkait

Accident & Sickness Policy Provisions, Clauses and Riders

View Set

Introduction to Prophets Study Guide

View Set

APUSH Unit 5 College Board Review Questions

View Set

24.1 - 24.3 : the urinary system, anatomy of the kidneys

View Set

Application questions: Endocrine System

View Set

Vision & Hearing Certification Test

View Set