Professor Byrne Lecture: September 23, 2010. Y&feature=related.

Slides:



Advertisements
Similar presentations
MYTH vs. REALITY Top 10 myths about underage drinking Prepared February 2006 for the Maine Office of Substance Abuse by MESAP: Maines Environmental Substance.
Advertisements

A PRESENTATION FOR THE PARENTS OF MIDDLETON PRIMARY SCHOOL
CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
Chapter 7 Resolving Conflicts and Preventing Violence Lesson 3
TECHNOLOGY ACCEPTANCE AND SOCIAL CRIME PREVENTION ESCI, Zugspitze March 4th, 2010 Mag. Maximilian Edelbacher Special investigator, lecturer Dr. Michael.
Criminal Justice Process: Sentencing & Corrections
Community Crime Prevention CCTV in Victoria A Guide to Developing CCTV in Victoria Presenter:Simon Walker Title:Senior Policy Officer Date:13 November.
Crime Control or Crime Culture? Closed Circuit Televisions (CCTV)
Neighborhood Watch John E. Williams, CPS Certified Crime Prevention Specialist Beavercreek Police Department.
Purdue University Calumet Counseling Center Gyte
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
2 Language of Computer Crime Investigation
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Key to the Exercises  Pre-class Work II  the crime problem; serious; crimes; criminals; ine third of; 41 million; 36 to 40 million  soft; crimes and.
Accident and Emergency Dept. Data Sharing to Reduce Alcohol- Related Violence and Violent Crime.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
ASAP Unit Advanced Surveillance And Protection.  Uniquely High Number of Violent Street Gangs  58 Gangs  11,000 Documented Gang Members  Relatively.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
CCTV TECHNOLOGY AND PRIVACY CONCERNS Susan F. Brinkley, Ph.D. University of Tampa.
Gun and Knife Crime. Firearms are taken to be involved in an incident if they are fired, used as a blunt instrument against a person, or used in a threat.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Jim Niehaus October 9, Topics No Cost Considerations Systems with 24/7 Monitoring Service Cameras Motion Sensors References & Product Links.
Perpetuity Research & Consultancy International (PRCI) Ltd Is CCTV working? The effectiveness of CCTV and the British experience.
Hard Technology of Crime Prevention Professor Byrne Lecture: October 7 th, 2009.
Closed Circuit Television - CCTV. In your jotter put the heading “CCTV”. Write down the full name of CCTV CCTV = Closed Circuit Television. Write this.
Technology and the Courts: An Overview of Hard and Soft Technology Innovations Professor James Byrne Professor James Byrne Lecture: Thursday, Nov. 20,
Rights Management McAfee Associates Strategy: Free Anti-Virus Software Downloading He asked users to send him whatever amount they thought it was worth.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Recommendations for Parents The Massachusetts Aggression Reduction Center Bridgewater State College Copyright 2008 © Elizabeth K. Englander.
New Technology in Prisons and Jails: Impact on Safety, Cost, and Offender Rehabilitation Nov.17 th 2009 Lecture Professor James Byrne.
Face Recognition and implications on society By Zubin Singh ICS 131.
The Best Laid Plans: An Assessment of the Intended and Unintended Consequences of Technological Innovation in the Criminal Justice System James M. Byrne,
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Company LOGO Internet Safety A Community Approach.
1 Columbia Police Department, Phase IV Integrated Data Exchange & Analysis (IDEA) This project was supported by Grant No DG-BX-K021 awarded by the.
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
 In September 2012, the rape and murder of 29 year-old Irish woman Jill Meagher in Sydney Rd, Brunswick triggered outrage from the public.
The Social Effect of Information System
Stalking Stalking is a serious crime that occurs when one person engages in actions directed at another person (the target) which causes this person to.
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Avoiding and Preventing Violence
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CRIME PREVENTION AND THE BUILT ENVIRONMENT IN TANZANIA By Ludigija Boniface Bulamile, Lecturer, Department of Architecture, University College of Lands.
China All Seeing Eye. The Beginning Since 2006 over 200,000 cameras installed in a single Chinese city, Shenzhen. Cameras appear in public places sometimes.
Illegal Immigration. Stats According to the Center for Immigration Studies –January 2000 there were 7 million illegal aliens in the US –Illegal alien.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Independent Organizations  No two exactly alike  Hierarchical  Chain of command Potential Problems?  Personnel changes  Internal reorganization.
BETTER SAFE THAN SORRY Unit 6. Which item do you think is the most/least useful? How often do you/your parents use these items? What other pieces of equipment.
1 Crime and Violence: Forces for Good or Evil? Lecture Two The extent of violence.
Amanda Pelkey.  Spain has very low crime rate  50 per 1,000 inhabitants annually  Street crimes occur most often  Pickpockets, robbery, credit card.
Newark Cops & CCTV. Intro of Surveillance cameras to Newark 110 new surveillance cameras & a gunshot detection system planned for Newark Sparked by the.
Bullying Mr. Dillon. Types of Bullying. What are four kinds? Physical: hitting, pushing. Verbal: saying mean/untrue things. Social Isolation: keeping.
Personal BehaviorLesson 5, Chapter 21 Avoiding and Preventing Violence.
AVOIDING AND PREVENTING VIOLENCE. Violence in Our Society Violence is any act that causes physical or psychological harm to a person or damage to property.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Quotation about Anger and Violence. “Violence kills so many Americans and sends so many others into the healthcare system that we must consider it a public.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Chief Constables Performance Report February 2016 OFFICIAL| FOIA - OPEN.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
Yan Byalik, CPP Security Administrator City of Newport News Hampton Roads Public Works Association SME Presentation for Cadet Program.
Preventing Violence In this lesson, you will Learn About… How violence affects teens. The causes of violence in society. What you can do to avoid becoming.
Advantage of Security Systems.  Today security camera is a much needed thing to protect us and to preserve valuable properties.  Along with the home.
Antonia Litten – Eastern Regional Manager
MODULE 10 Applied Technology for Criminal Justice Communication
Viseum UK iVOS FaceRec Viseum UK iVOS FaceRec
Bayo Vista Neighborhood Watch & Emergency Preparation
Presentation transcript:

Professor Byrne Lecture: September 23, 2010

Y&feature=related

CCTV: Closed circuit TV Street Lighting Personal Protection devices: guns, tasors, knives, mace, etc. Home protection devices: locks, surveillance,monitoring,private security Neighborhood protection systems: walled neighborhoods

CCTV and street lighting strategies often used in conjunction More common in England than US Evidence of Effectiveness is mixed Some Evidence of crime reduction for property crimes such as auto theft No Evidence of crime reduction for violent crime

CCTV and Facial Recognition Software linked to National ID Data Base CCTV and Behavior Monitoring Software tested at John Hopkins University Future Shock: Beyond Orwells 1984 scenario CCTV and the Public: Allowing the Public to Monitor CCTV footage and be CRIME SPOTTERS In England, there are 4 million cameras, but only 1000 are being monitored real time

Imagine the scenario: lamp post is triggered by technology to spot you walking strangely begins recording your conversation, scans your face to match your details in the national database, X-rays you to check for weapons shouts "stand still citizen" and scans your brain to check whether you intend to commit a crime sees you're a bit depressed, sections you under mental health act, cops pick you up, hand you in to doctors who lock you up and microchip you.

The Public can monitor cyberspace and report illegal activities to the police Social Network Monitoring to Identify Underage Drinking, Drug Use, Bullying, Evidence of physical abuse, sexual solicitation. The Public can also potentially monitor public spaces via direct access to CCTV feeds. Police can offer rewards for the identification of BOTH cyber and public crimes

Extent of Use: 1 in 2 homes have a gun, but we dont have data on the use of other personal protection devices. Evidence of Effectiveness is debated Gun-related injuries from accidents are a serious problem Tasers are used both to commit crime and prevent crime

Home security systems are more popular in urban areas. Last years murder in Mount Vernon New Hampshire involved the targeting of a home in an isolated, semi-rural area. Case is very similar to the Zantop Murders of two Professors at Dartmouth a few years ago. Judgment Ridge is an excellent book on this crime

There are a variety of hard technology applications being used today. Private, gated communities are one strategy. Private Security systems monitored by private security firms are another strategy. Evidence of effectiveness?

A Case Study: Witness Intimidation and the No Snitching Culture

110 new surveillance cameras & a gunshot detection system planned for Newark Sparked by the death of 3 college students in Summer 07 Plan financed with private money raised by Newark Community Foundation, $3.2 million

In 8 months 44 cameras in a 7 square mile area The area represents the location on 80% of all Newark gun violence in last 3 years

The cameras are on lamp posts, above intersections and on public & private buildings Footage streams real-time to a police communications center

Clerks monitor footage and can adjust camera focus and field of vision Footage is stored for 30 days

Dr. Byrne says NO Research on CCTV in London, England says NO Or Does it Simply displace crime?..

The video surveillance unit has detected 289 criminal incidents for first quarter of 2008 Another 799 incidents were either called in to 911 or officers on patrol

Should the government be able to monitor our public behavior, identify potential offenders, and control the publics access to information that challenges government authority and decisions?

Since 2006 over 200,000 cameras installed in a single Chinese city, Shenzhen. Cameras appear in public places sometimes disguised as lampposts In next 3 years 2 million more CCTVs expected to be installed in Shenzhen

"Since the surveillance cameras came in, we have seen a very dramatic decrease in crime in Shenzhen."

The Chinese surveillance camera market saw revenues of $4.1 billion in 2007, up 24% from 2006 New Technology is being field tested in China today that will be available in the United States in a few years, depending on how civil liberties are viewed in the context of crime prevention

One Chinese company has created software for CCTVs that has the ability to alert police when inordinate numbers of people begin to gather in one location

The future is that Chinese citizens will be watched on CCTV, listened to on their cell phones, monitored on digital voice recognition, internet access limited via The Great Firewall, and movements tracked via national ID card

The Golden Shield is the Chinese government attempt to maintain power and complete control over its citizens The govt has been documented to have limited internet access of foreign news outlets, block cell phone calls and or text messages

Tibetan monks have proclaimed that cameras have been introduced, unwillingly, to prayer rooms and monasteries Of Course, one unintended consequence of these new technologies is that the public can potentially monitor the police and public officials U.S. Examples: from Rodney King to U-tube videos of police and govt officials

New software, that should be out within a year, will have to be able to match a face in a 10 million database in one second. This is the next big thing this technology use distance between eyes as a primary identifier, because it is a feature that does not change with age