In 2013, California Governor Jerry Brown announced that he would stop new admissions to the state’s Division of Juvenile Justice (DJJ) facilities and provide funds to the counties in an effort to have the counties deal with juveniles at the point they are most likely to return. This is an example of a
________ technology is used to search cargo and luggage for particles left behind when narcotics and explosives contraband are packaged and handled.
Currently, law enforcement agencies are not permitted to collect DNA samples from criminal suspects who have been arrested for serious crimes until after they have been convicted.
A(n) ________ child has engaged in activity that would be considered a crime if committed by an adult.
Which of the following is not a criteria that must be met before an organization may be designated as a foreign terrorist organization?
Which is the first step in decision-making regarding a juvenile whose behavior or alleged behavior is in violation of the law or could otherwise cause a juvenile court to assume jurisdiction?
Today, under modern Islamic law, men and women are treated similarly.
CODIS is a DNA database that allows law enforcement agencies to compare DNA profiles to identify suspects or link serial crimes.
In recent years, the juvenile justice system appears to be
The U.S. has one of the highest rates of software piracy in the world.
Juveniles held in private secure facilities are more likely to have committed a
People who want to retrain traditional ways of thinking and acting may oppose globalization.
A document filed in juvenile court alleging illegal behavior by a juvenile and asking the court to assume jurisdiction over the juvenile is a
________ jurisdiction applies when the juvenile court is the only court that has statutory authority to deal with children for specified infractions.
The child-savers movement
According to Gwynn Nettler, terrorists may kill one person and frighten ten thousand. This is an example of which characteristic of terrorism?
What was the purpose of the SMILECon conference for police officers?
Resolution strategies for changing the juvenile justice system involve permanent organizational and structural modifications, such as closing facilities or eliminating agencies.
Illegally harvesting medical organs for transplantation is a type of biocrime.
The Department of Homeland Security is particularly concerned that weapons of mass destruction and other contraband useful to terrorists might enter the U.S. in which way?
Which of the following is a characteristic of the juvenile justice system?
The ________ hearing is the final stage in the processing of adjudicated juveniles and is similar to an adult sentencing hearing.
Status offenders are delinquent children sent to adult court.
Compare and contrast the juvenile justice system and the adult criminal case process. List and explain two similarities and four differences between them.
The Office of Juvenile Justice and Delinquency Prevention (OJJDP) has identified five significant developments that have taken place over the past decade with significant executive or legislative actions. List and define three of those five developments.
Set 2
Which of the following categories of children violate laws written only for children?
Kent v. United States said courts must provide the essentials of due process in juvenile proceedings.
In 1899 the ________________Juvenile Court Act created a juvenile court, separate in form and function from adult criminal courts. To avoid the lasting stigma of criminality, the law applied the term delinquent rather than criminal to young adjudicated offenders, and that is the model we use today.
In 2011, the U.S. Supreme Court held that the __________ of juvenile suspects must be considered when determining whether they would feel free not to respond to police questioning.
Which landmark U.S. Supreme court case guaranteed juvenile the following rights: Notice of charges, right to counsel, right to confront and to cross examine witnesses, and protection against self‐incrimination?
A detention hearing is held when a serious offense is involved. Statutory provisions may allow for transfer of the case to adult court at the prosecuting attorney’s request.
In 2013, California Governor Jerry Brown announced that he would stop new admissions to the state’s Division of Juvenile Justice (DJJ) facilities and provide funds to the counties in an effort to have the counties deal with juveniles at the point they are most likely to return. This is an example of a:
International terrorism is the unlawful use of force or violence by an individual or a group that is based and operates entirely within the United States and its territories.
Which type of crime is a minor violation of Islamic law that is regarded as an offense against society, not God?
Someone who studies crime and criminal justice on a cross‐national level is known as a comparative criminologist.
Illegal immigration in which an agent is paid to help a person cross a border clandestinely is known as:
The Bipartisan Policy Center’s National Security Preparedness Group released a wide‐ ranging report on the evolving nature of terrorism. The report, Assessing the Terrorist Threat, made it clear that the biggest threat to American national security may now be from:
Which of the following is the internationalization of trade, services, investment, information, and other forms of human social activity?
Biometrics is a modern criminalistics technique used to determine the cause of injury or death.
A police crime‐scene analyst or laboratory worker versed in processing evidence is a:
Biocrime is a criminal offense perpetrated through the use of biologically active substances, but does not include chemicals and toxins.
Forensic entomology is the study of insects to determine such matters as a person’s time of death.
Which of the following is a form of high‐technology fraud that uses official‐looking e‐mail messages to elicit responses from victims, directing them to phony websites?
In 2013, which police department hosted the SMILE national conference for police officers to discuss ways of using social media to their advantage?
This nontechnical type of cyber intrusion relies on persuading or tricking administrators or others to give details of passwords or other information by pretending to be staff, suppliers, police officers, or other trusted individuals.
Define and identify the two major types of terrorism.