NIJ Conference 2006 Abstracts
Concurrent Panel, Monday, 10:30 AM - 12:00 PM
Portraits of Contemporary Adolescent Offending
Initial Pathways out of Serious Delinquency
Edward P. Mulvey and Carol Schubert
Using data from the Pathways to Desistance study, this presentation will provide information about different trajectories
of self-reported offending over a two- and three-year period after adjudication in a sample of serious adolescent offenders
in two metropolitan areas (N = 1,355). Characteristics of adolescents who report different patterns of offending over time
will be presented. Service involvement and changes in life circumstances over the follow-up period will also be compared for
the groups of offenders showing different patterns of self-reported offending. Implications of these relations for intervention
and policy will be emphasized.
Our Hardest to Love Children: A Portrait of Juvenile Justice
Michael A. Corriero
For centuries philosophers have struggled to define justice, constantly seeking to improve the way humanity applies the concept.
What is justice for children who violate the law? How should a just society judge young offenders? When is it proper to punish
a child as a criminal? What form should the punishment take? And what justifies the practice? As the presiding judge of Manhattan's
Youth Part since 1992, a special court in New York City which has the responsibility of resolving cases of children as young
as 13 who are tried as adults, I have confronted the complex world of troubled children and children in trouble with the law.
I intend to present an accurate portrayal of certain consequences of the policy of trying children as adults as they have
consistently and continuously been revealed to me. My presentation will include an appraisal of the issues presented by such
a policy and my recommendations for improving our juvenile justice system.
Using Global Positioning Systems to Supervise Sex Offenders in the Community
Corrections Use of Location and Tracking Technologies
The criminal justice community has monitored offenders using GPS based technology for more than five years. It is proving
to be a viable alternative to incarceration and electronic monitoring in the home. The competition between vendors has continued
to enhance the services, accuracy and data that these systems provide. This presentation will provide information about the
technologies in use and their operational implementations. The technology presentation will discuss the advantages and limitations
of these systems as well as the opportunities to data mine the tracking information. The operational presentation will touch
on the use of these systems by various agencies, the changes to operational procedures and the improvements to offender monitoring.
Digital Evidence: Investigations, Evidence Preservation, and Analysis
Steganalysis and Stegextraction
This presentation describes the work DCCI is doing regarding the testing of steganalysis programs and the development of steganalysis
and stegextraction tools. With respect to steganalysis, DCCI uses its library of more than 7000 files (4000+ clean files and
3000+ stego files) to test and evaluate programs that claim to have the ability to identify files containing hidden data,
and in some instances identify the steganography program used to hide the data. With respect to stegextraction, DCCI has recently
begun pursuing activities that are aimed at developing software that can extract and, in some cases decrypt data that has
been hidden in a file using a steganography program.
Criminal Justice Lessons Learned from Hurricanes Katrina and Rita
The Impact of Katrina on the Prison Population
One of the effects of Hurricanes Katrina and Rita was the massive relocation of one of the primary feeder systems for the
state correctional system. This presentation reports on the impact to date this population shift has had on the state prison,
parole, and probations populations. It also summarizes what steps the state is taking to significantly lower its prison population
by over 7,000 inmates over the next 18 months to meet its budgetary goals. Finally, analysis of pre and post Katrina/Rita
crime rate data are presented.
Concurrent Panel, Monday, 1:50 PM - 3:15 PM
Who Are We Missing?: Addressing the Criminal Justice Needs of Sexual Assault Victims from Diverse Communities
Research has just begun to explore sexual violence in culturally diverse communities. Understanding the impact of sexual violence
in culturally Deaf communities is often overlooked and considered an undeveloped area of inquiry. Such research calls for
exploratory approaches using qualitative methods and cultural competency when conducting the research activities. Hearing
culture tends to define Deafness as a disability and as such, research has focused on studying disability populations as a
whole without acknowledging the unique character of cultural Deafness. This paradigm may contribute to some of the isolation
issues faced by the Deaf community. NIJ grant 2003-IJ-CX-1035 funded a study that examines the perceptions of Deaf and hearing
service providers who assist Deaf individuals with the aftermath of sexual victimization and who individuals in the Deaf community
tell about their experiences of sexual assault. It also deals with why, and what service gaps exist for the Deaf community
and what can law enforcement do to be a more effective resource for members of the Deaf community. A secondary aim of this
study was to implement a Participatory Action Research (PAR) approach in researching a sensitive topic in the Deaf community
to determine if the PAR approach is effective. This study has four main outcomes. First, the study provides information to
the hearing community regarding Deaf individuals' perspective on the impact of sexual assault on their community. Second,
this study's results include information on help seeking patterns in the Deaf community. Third, this study helps to identify
the needs of Deaf individuals who have been sexually assaulted as well as service gaps affecting this population. Fourth,
this study tests the effectiveness of a participatory research model in recruiting Deaf participants and structuring the study.
This study's results have pertinent applications in understanding the needs of Deaf persons who have been sexually assaulted.
Information regarding Deaf individuals' perceptions of the problem of sexual assault, response to sexual assault, and service
gaps to the Deaf community is vital to creating and sustaining services and policies for the Deaf community.
Reaching Diverse Communities: The National Sexual Assault Online Hotline
After receiving thousands of emails from those in need of support, but unwilling or unable to visit or call their local rape
crisis center, RAINN began development of the National Sexual Assault Online Hotline. Making use of experienced, trained hotline
volunteers to provide high-quality, real-time, anonymous and secure crisis support services, the Online Hotline will provide
a first step to presently underserved groups including the Deaf community, disabled individuals, teens and members of rural
communities where true anonymity does not exist. Hotline development began in November 2004 and has been completed. The National
Sexual Assault Online Hotline will launch nationally in late-2006, following a pilot launch in mid-2006.
Methamphetamine Linkages: Production, Enforcement, and Policy
The Methamphetamine Business in the Wa area of the Golden Triangle
This paper will focus on the changing patterns of drug producing and trafficking in the Wa area of the Golden Triangle. Based
on face-to-face interviews with more than 100 subjects in the Wa and the Kokang areas, including armed group leaders, drug
producers, drug dealers, and other key informants such as businessmen and drug users, this paper will discuss the shift from
heroin to methamphetamine as the drug of choice for drug producers, dealers and users. The individual characteristics of the
methamphetamine dealers and users, the social organization of the methamphetamine trade, and the role of the armed groups'
leaders in the drug trade will also be examined.
Field Investigation Drug Officer (FIDO) Program
David L. Sylvester
A presentation on the Field Investigation Drug Officer (FIDO)Recommended Practice Guide and Training Program, which utilizes
a consistent, standardized curriculum to train certified drug officers in the use of existing and emerging technologies for
the preliminary identification of controlled substances in the field. Providing field drug officers with standardized training,
tools and technology may result in a reduced crime lab workload, a basis for obtaining plea agreements earlier and more often,
and allow for the efficient adjudication of charges. FIDO has produced a standardized training curriculum based on a Recommended
Practice Guide which will provide law enforcement officers with the skills necessary to identify controlled substances using
the common field color testing kits.
The efficiency of the entire criminal justice system is impacted by the overwhelming caseload of drug investigations. As a
result, many cases fail to be prosecuted in a reasonable timeframe or are dismissed due to a lack of timely sample analysis.
Straightforward possession drug cases comprise a significant percentage of those investigations. Handling the cases at the
investigative level has the potential to streamline the adjudication process, enabling the reduction of backlogged investigations
and the efficient use of resources.
The National Institute of Justice (NIJ), in partnership with its National Law Enforcement and Corrections Technology Centers
(NLECTC) and the Forensic Resource Network (FRN), has addressed this issue. A focus group consisting of representatives from
the law enforcement, forensic science, corrections, legal, and judicial communities was established to facilitate development
and deployment of the Field Investigation Drug Officer (FIDO) program. The development of the FIDO program was managed by
the National Forensic Science Technology Center (NFSTC). The NFSTC partnered with the Rural Law Enforcement Technology Center
(RULETC) and Eastern Kentucky University (EKU) for program pilot testing and evaluation.
Following suggestions from the focus group discussions, the program was designed with sufficient flexibility to enable adaptation
based on agency-specific needs and resources and to accommodate future technologies. The program is comprised of a comprehensive
training program and quality assurance system that provides law enforcement personnel with the resources necessary to perform
preliminary identification of controlled substances and testify to the results.
The program affords certified law enforcement officers the capability of providing a preliminary identification of the most
commonly encountered drugs of abuse. The benefits include immediate investigative information without the need for extensive
laboratory analysis as well as facilitation of case adjudication in the preliminary phase. The results of the field test may
factor into obtaining an immediate plea agreement. However, cases proceeding to trial are submitted for complete analysis
at the laboratory. A successful model program at the Phoenix Police Department has demonstrated a positive impact on their
regional criminal justice system with cost savings and increased efficiency at all levels.
Impact of Identity Theft on Victims: New Research and Services for Victims
Identity Theft: First Estimates from the NCVS
Questions about identity theft were added to the National Crime Victimization Survey in July of 2004. Findings from a preliminary
analysis of the first six months of data will be presented. Identity theft was defined as the use or attempted use of existing
credit card accounts, other existing accounts, or personal information to obtain new accounts, loans, or commit other crimes.
Differences between victimization by demographic characteristics of households will be discussed as well as characteristics
of the theft such as how the victim discovered the identity theft, whether the misuse is still ongoing, problems experienced
as a result of the theft, and total amount of monetary loss.
Methodological challenges in measuring identity theft will also be identified.
Stolen Identities: A Victimization Survey
Henry N. Pontell
Identity fraud, a large category of criminal offenses committed through the use of stolen or fictitious identities, has been
termed the fastest growing crime in the U.S. Despite significant social and financial costs, formal research on the issue
has been scarce. The purpose of this study is to provide descriptive data from victims to help inform policies that could
be effective in preventing such offenses, and which respond to the needs of identity theft victims. The research analyzes
data collected by the Identity Theft Resource Center through a survey with confirmed victims who sought the organization's
assistance between July 2003 and October 2004. The findings offer patterns regarding both identity fraud offending and offenders,
depict the nature and consequences of victimization, and underline a current lack of swiftness and effectiveness responses
to the problem.
Recent Findings from OJJDP's Causes and Correlates Program of Research
The Influence of Life Events on Delinquency Initiation, and Continuation
David Huizinga, Amanda Elliott, Linda Cunningham, Kate Johnson
There is evidence that stressful family events (e.g. changes in family structure, serious illness or death of family members,
or moving), and personal life events (e.g., changing schools, breaking up with a girl/boyfriend, changing peer groups) often
lead to involvement in delinquency and crime; and that other life events (e.g., marriage, getting a good job, or having children),
are salient factors for the desistance from delinquency. This presentation examines the influence of such life events, in
the presence of other risk and protective factors, on the initiation of, continuation of, and desistance from delinquency
and later crime. The information used is taken from the qualitative and structured interviews of the longitudinal Denver Youth
Survey, which has extensive data on general life events and life events specific to adolescent concerns.
Intergenerational Continuities in Young Parenthood: Consequences for Children and Grandchildren
Terence P. Thornberry
This presentation examines the impacts of early childbearing across three generations of families in the Rochester Youth Development
Study (RYDS). We examine whether early age at first childbirth in the first generation (G1) impacts their children's development
(G2), and, via that, their grandchildren's development (G3). We find that a) G1's early age at first childbirth leads to adverse
outcomes for G2 and b) G2's early age at first childbirth leads to adverse outcomes for G3. The effect of G1's early age at
first childbirth on G3 is entirely indirect through age at first birth and associated mediating processes in G2.
What Causes Juvenile Delinquents to Stop Offending?
Rolf Loeber, Magda Stouthamer-Loeber, David P. Farrington, and Dustin A.
Relatively few studies have examined predictors of desistance in juvenile delinquency between childhood and early adulthood.
Even fewer studies have examined the interplay between protective and risk factors in predicting later desistance at different
ages (e.g., early adolescence, late adolescence, or early adulthood). The paper presents results from youngest and oldest
cohorts of men in the Pittsburgh Youth Study (N = 1,009), a longitudinal study with 18 to 16 assessments spread between ages
7 and 25. The results show that protective factors are important in predicting which young men desist. The findings also demonstrate
that protective factors to some degree buffer the impact of risk factors. The implications of the findings are discussed in
terms of improving screening devices to better distinguish between those who desist early and those who are likely to persist.
The results also have implications for improving future interventions, particularly those that rely on enhancing protective
factors to increase positive life outcomes that are incompatible with serious delinquency.
Concurrent Panel, Monday, 3:30 PM - 5:00 PM
What Do We Know After Ten Years of Violence Against Women Research Funding?
A Decade of Research on Violence Against Women: What We Know and What We Need to Know
Claire M. Renzetti
During the past 10 years, research on the problem of violence against women has been nothing less than prolific. A major contributor
to the research growth has been the funding provided through the Violence and Victimization Research Division of NIJ. This
presentation draws on VVRD's Compendium of Research on Violence Against Women, as well as submissions to the journal, Violence
Against Women, and interviews with key informants to assess both the strengths and the gaps in our knowledge about the problem
of violence against women. The research produced over the 10 years of VVRD's funding (and the 12 years of publication of Violence
Against Women) has fulfilled two of the major roles that research should fill: increasing understanding of a problem and,
at the same time, identifying critical issues in need of study. A third question to be addressed is: Have we made an impact?
In other words, how has the research been used to bring about significant social change? The research conducted on violence
against women over the past 10 years has resulted in substantial “usable knowledge” that links, arguably more effectively
than most areas of scientific and scholarly knowledge production, the research, practice, and advocacy communities. The presentation
will conclude by considering ways to strengthen these partnerships.
Does Institutional Review Board Oversight Interfere with Good Research?
Prisoners as a Vulnerable Population
Cathy Spatz Widom
This presentation will focus on prisoners as a vulnerable population and will begin with a description of a variety of different
experiences conducting research in prison settings. We will examine the reactions of prisoners to research participation and
compare their reactions to those of individuals in other vulnerable subgroups (defined by economic, social, psychological,
physical health, and child maltreatment status) drawing on empirical findings. Implications for research with prisoners will
Criminal Justice Information Sharing: Real Time Sharing with Real Results
Implementing GJXDM for the Missouri Judiciary
Robin E. Gibson
The Missouri Office of State Courts Administrator (OSCA) has undertaken exciting projects that have enabled the migration
of legacy case management data to the statewide case management system utilizing the Global Justice XML Data Model (GJXDM)
and to transfer case initiation information from Prosecuting Attorneys to the courts. In doing so, OSCA has changed its application
development methodology and significantly reduced new transfer development times. In addition, the first implementations will
have a cost avoidance of over 70 percent from previously used methodologies. The use of GJXDM-based XML will pave the way
for future projects such as electronic case filing. In this case study, OSCA's ongoing involvement with the development of
the GJXDM, application development approach, lessons learned, and a sampling of the technologies used to implement GJXDM will
Federal Death Penalty System
When Does Homicide Become a Federal Case?
Phyllis J. Newton
A homicide occurs. What happens? Who comes to the scene of the homicide? Who investigates? If we believe homicide is a state
crime, why would they be investigated or prosecuted in the federal system? Our study takes as a starting point the studies
conducted by the U.S. Department of Justice for the period of 1995 through 2000 that looked at the question of racial and
regional disparity in federal death penalty cases.
Building on earlier DOJ Studies, former Attorneys General Janet Reno and John Ashcroft asked NIJ to sponsor research related
to the operation of the federal death penalty system. Our research responds directly to the NIJ call for research into the
process by which “homicide cases are investigated and how and why some those cases enter the federal system and others enter
the state system”. To date, inmates residing on federal death row have been convicted of some form of homicide, from those
committed in furtherance of a large drug enterprise or organized crime to those resulting from carjacking or kidnapping. The
early DOJ studies found considerable variation among federal districts in their use of the federal death penalty.
This study examines the processed by which criminal cases, especially homicide cases, enter the federal criminal justice system.
Researchers visited nine federal districts and interviewed all actors in the state and federal criminal justice systems that
potentially played a role in determining whether a homicide case was investigated and prosecuted in the state or federal systems.
Within each district, researched interviewed local and federal prosecutors, local and state police, federal investigative
agents, and defense attorneys who practiced in federal court. The nine districts represented a geographically diverse sample
of federal courts.
This presentation focuses on four of the nine sites in which interviews were conducted, describing site specific findings
as relates to key factors identified within each district that influence the federal processing of homicides. Using comparative
analysis techniques, we explored patterns of similarity and differences among the four federal districts in terms of the processes
and dynamics related to the selection of jurisdiction for investigating and prosecuting homicide cases. The findings suggest
that cross jurisdictional variations in openness and cooperation help to explain why federal districts have highly different
numbers of cases charged capitally (openness meaning willingness of local and federal authorities to consider federal prosecution
of homicide cases and cooperation meaning how closely local and federal authorities work together.
Race and the Decision to Seek the Death Penalty in Federal Cases
Stephen P. Klein
This study examined the relationship between the federal government's decision to seek the death penalty in a case and that
case's characteristics, including the defendant's and victim's race. This research began by identifying the types of data
that would be appropriate and feasible to gather. Next, case characteristics were abstracted from Department of Justice Capital
Case Unit (CCU) files. Defendant and victim race data were obtained from electronic files. Finally, three independent teams
used these data to investigate whether charging decisions were related to defendant or victim race. The teams also examined
whether these decisions were related to case characteristics and geographic area. There are large race effects in the raw
data that are of concern. However, all three teams found that controlling for non-racial case characteristics eliminated these
effects, and these characteristics could predict the seek decision with 85 to 90 percent accuracy. These findings support
the view that decisions to seek the death penalty were driven by heinousness of crimes rather than race. Nevertheless, these
findings are not definitive because of the difficulties in determining causation from statistical modeling of observational
Advancements in Crime Series Analysis for Identifying an Offender's Base of Operations
Finding the Optimal Search Area for a Serial Criminal
In 2005-2006 a group of six undergraduate students and one graduate student from Towson University's Applied Mathematics Laboratory
examined mathematical algorithms that analyze a series of linked crimes and determine the offender's home base using a mathematical
Existing methods include various centrographic techniques, including finding either the centroid or the center of minimum
distance for the crime series, or the circle method of Canter and Larkin (1993). Another class of approaches are probability
distance strategies, where probability density functions are centered at each crime site, then summed, with the maximum corresponding
to the best estimate for the offender's home base. This is exemplified in the work of Rossmo (2000).
In our approach, we assume that an offender with home base z commits a crime at the location x with probability P(x;z,ß) where P has a known form (e.g. Gaussian, or exponential) but the home base z and the shape parameters ß are unknown. We then use the data from the crime series and maximum likelihood methods to find
the best estimates of these unknown parameters.
The advantage of this method is that it allows us to explicitly model geographic features by incorporating them into the structure
of the probability function P. To illustrate, suppose that the geographic region containing the crime series is divided into three subregions: the reporting
jurisdiction, neighboring region(s) that may contain home bases, and neighboring region(s) that cannot contain home bases.
An example of the last type of region is a large body of water. In all other respects we assume that the geography is homogenous.
If we then assume that the P decays like a Gaussian function of the distance between the home base and the crime site, then the best estimate for the
home base of an offender who commits crimes at x1, x2,...,xn in a jurisdiction is Ω
The student team has created a prototype computer program that implements this algorithm. The integration is performed numerically
on a corresponding line integral using a tenth order Gaussian method, while the maximum value of the likelihood function is
calculated using the Broyden-Fletcher-Goldfarb-Shanno quasi-Newton method.
Concurrent Panel, Tuesday, 10:15 AM - 11:45 AM
Conducting Research and Evaluation in Indian Country
Indian Country Research & Evaluation: A Roadmap for Future and Needed
This presentation will highlight extant research and evaluation work on crime, justice, and victimization in Indian country
and identify the need for and gaps in research due to new and emerging issues involving victim services, public safety, preventing
and controlling crime and violence, and strengthening tribal justice systems.
Safety in a Cyber World
The Predator and Prey Alert System (PAPA)
Stalking is a crime typified by repeated harassment of another person and intrusion upon his or her privacy. Cyberstalking
extends stalking into the realm of cyberspace wherein a predator stalks a victim or prey through internet technologies such
as emails, chat rooms, and instant messaging. This presentation describes PAPA which consists of a set of integrated software
and hardware modules and tools designed to support law enforcement in helping victims of cyberstalking. PAPA facilitates the
investigation of such crimes and maintains evidence for the potential prosecution of the cyberstalker. Relevant statutes related
to the use of the PAPA system will also be discussed.
Fighting Online Child Exploitation
Examining the ways that families and children utilize the internet, and which aspects of these uses are putting them most
at risk, and what the CyberScience Lab (CSL) is doing to help law enforcement fight the problem. Examples of some briefing
materials that the CSL uses for outreach and training. In addition, some time will be devoted to taking a glimpse into what
risks new and emerging technologies might pose to our youth, and what the guardians of our young can do to help fight the
growing problem of online exploitation of America's youth.
Child Safety in a Cyber World
Predatory acts against our children are among the most heinous of crimes perpetrated within our society. Historically, communities
as a collective take deliberate and specific actions to protect their children in an effort to prevent these heinous acts.
These protective actions include: education —teaching children to be wary of strangers, to recognize and avoid dangerous situations,
to cry for help when they feel threatened.
Our nation is now faced with technological advancements that allow even the youngest of children to have access to the Internet.
Students today explore the wonders of the world by transporting themselves through cyberspace. They can travel to the brightest
most intellectual domains of the universe and conversely, they may travel to the darkest most detestable realms of the human
imagination; and they travel this world alone. A universal paradigm shift has occurred in the methods and means available
to child predators in pursuit of their prey; and as such a universal paradigm shift has occurred on the preventative tactics
that we employ in our efforts to protect our nation's youth against these predators.
The content of my presentation will address the ramifications of this universal shift as our nation's youth explore the wonders
of the Internet. We truly are a global economy and as such our nation's youth are cyber citizens engaging in online activities.
Those activities include socialization (two way communication whether that be through email, chat or instant messaging), games,
shopping, entertainment and education.
I will be addressing the role of education and youth empowerment and the need to empower our nations youth with the appropriate
tools to minimize the number of predatory acts predicated against them. It is imperative that a proactive well-balanced approach
be deployed to support the challenge of embracing the activities of our nation's youth online.
Progress in Police Responses to Violence Against Women
Examining Factors That Reduce Domestic Violence Assaults: The Impact of a Specialized Domestic Violence Police Unit
Paul C. Friday and Jen Hartman
Using a sample of domestic violence reports to the police in Charlotte, NC from 2003 this study focuses on the recidivist
offending and repeat reported re-victimization of cases processed through a specialized DV Unite compared with cases handled
by regular patrol. The study controls for the fact that the DV Unit handles more serious charges and prior involvement in
prior domestic violence incidents. The prevalence, incidence and severity of future events are studied and policy implications
are discussed. The research finds that: The DV Unit selects the most serious and severe cases as designed; The DV Unit significantly
impacts whether suspects have new domestic violence incidents as reported to the police. Despite being a greater risk for
recidivism because of the seriousness of the initial incident and prior domestic violence charges, DV Unit suspects had lower
offending prevalence in the future; Suspects processed through the DV Unit have fewer future incidents that suspects processed
through regular patrol procedures.
Public Safety Communications: Can They Hear Each Other?
A Prototype Public Safety Cognitive Radio for Universal Interoperability
Charles W. Bostian
Virginia Tech's Center for Wireless Telecommunications in collaboration with Innovative Wireless Technologies (IWT) and Science
Applications International Corporation (SAIC) is developing a software cognitive engine for public safety applications that
will turn any frequency and modulation capable software defined radio into a public safety cognitive radio (PSCR) with significant
interoperability. The first prototype will interoperate with several common public safety waveforms on the 150 MHz, 450, and
800 MHz bands. The PSCR will respond to the commands of a properly authenticated operator by configuring the radio for whatever
combinations of waveform, protocol, operating frequency, and networking are required. In scan mode, the PSCR will search a
selected set of public safety bands, identify the networks that it finds, and present the results in an easy-to-use display
on a laptop screen. To join a given network, the operator will select that network on the display. In gateway mode, the PSCR
will function as a translator, linking two or more networks using different bands, frequencies or waveforms and configuring
itself to optimize its performance for each network.
In the course of describing our work, this presentation reviews the basic concept of a cognitive radio as an intelligent software
package (the cognitive engine) controlling a software defined radio (the radio platform). Like a human operator, the cognitive
engine “reads the radio's meters” (surveys the radio environment, identifying the stations and waveforms it finds there, assessing
the propagation environment, determining channel conditions, etc.,) and “turns the radio's knobs” (specifies center frequency,
transmitter power, modulation type, etc.) to create needed waveforms, establish and maintain the communications links, and
deliver near optimum quality of service. While all of this happens, the radio remains in compliance with FCC regulations and
standard operating procedures. Architecturally, the process consists of two nested loops in which the software observes and
models the radio environment, tests the models for validity, and uses tested models to determine the radio settings. To aid
the reasoning process, the radio uses a memory system to remember any past actions that can be used again or to learn from
them. We present recent results from our work, showing how a GNU radio platform can interoperate with commercial public safety
Land Mobile Radio Connectivity via Shared Satellite IP Networks and the Internet Test and Evaluation Project
The National Law Enforcement and Corrections Technology Center—Northwest's (NLECTC-NW) Land Mobile Radio Connectivity via
Shared Satellite IP Networks and the Internet Test and Evaluation Project goals were to conduct limited, impartial, test and
evaluation of commercial off-the-shelf equipment and affordable commercial satellite systems that might prove successful in
linking remote public safety communications systems to larger urban, land-based, communications networks.
Tests were conducted using commercially available Voice over Internet Protocol gateway equipment, satellite communications
services, and network element equipment. The testing and evaluation focused on public safety land mobile radio communications
links between urban areas and vastly remote Alaskan communities.
The tests evaluated and demonstrated voice over Internet protocol interface units, voice-grade satellite communications (Satcom)
services, as well as Satcom optimized virtual private network products. This presentation describes the limited, impartial,
test and evaluation of commercial off-the-shelf equipment that could potentially provide these links. The presentation will
summarize the test results that indicate remote users of “rural” land mobile radio systems can be connected to users on the
current mainland Alaska Land Mobile Radio system (and other similar systems)—with some caveats. Testing determined that connections
can utilize low-cost shared satellite Internet protocol (IP) connectivity and the Internet, given highly tailored network
design and equipment choices. Although the tested technology implementation may not meet all federal agency security requirements
without additional equipment, identified communications links provided a promising and adequately secure transport means for
local, regional, and state and public safety agencies.
Project54 is a collaborative effort between the University of New Hampshire and the New Hampshire Department of Safety, funded
by the U.S Department of Justice. Since its inception in 1999, this statewide demonstration has grown into a nationally recognized
law enforcement technology program. The Project54 system integrates electronic devices in police cruisers into a single system
with a speech user interface. The system also integrates cruisers and headquarters into an agency-wide data network. The Project54
system has already been deployed in hundreds of cruisers in state and local police agencies throughout New Hampshire and across
the nation. It is also being adapted for use by other first responders. Current program highlights include: continued roll-out
of the Project54 system in NH and elsewhere, with the goal of making Project54 an off-the-shelf, nationally available system;
formal laboratory simulator and field studies of the impact of the Project54 system on officer efficiency and safety, leading
to interface design improvements; development of software and hardware components to effectively manage multiple radios in
a single vehicle and to patch disparate radio systems for communications interoperability; and development and testing of
a system to use digital television channels, licensed to public television stations, to broadcast high-bandwidth data to public
safety vehicles in the field.
Concurrent Panel, Tuesday, 1:50 PM - 3:15 PM
Is the Party Over? An Examination of the Nightclub and Rave Scene With Respect to Drug Use and Crime
Club Drug Use and Drug Acquisition in New York City Club Subcultures
Brian C. Kelly and Jeffrey T. Parsons
Young adult involvement in club subcultures has spanned over three decades and the connection of club subcultures to drug
use endures. This presentation provides an overview of contemporary drug use in NYC club subcultures. Using mixed-methods
data from the Club Drugs and Health Study, the authors provided a descriptive epidemiological profile of drugs among young
adults who attend clubs. The authors present prevalence data from a sample of club-going young adults recruited through time-space
sampling methods to identify lifetime and recent rates of club use within club subcultures. In addition, the authors discuss
mixed-methods data from a cohort of 400 young adults reporting recent club drug use (e.g. MDMA, Ketamine, Cocaine, GHB, Methamphetamine,
and LSD). Results suggest high rates of drug use across the gamut of the pharmacoepia, though cocaine and MDMA are the primary
drugs. Drug-using young adults who frequent dance clubs area a population engaged in extensive poly-drug use. The authors
use qualitative data to describe the social contexts of drug use within these subcultures. This data suggest network-based
drug acquisition practices and underscores distancing by club drug users. The authors highlight the public health significance
of the use of club drugs within these subcultures.
Attacking the Demand Side of Prostitution: Is There a Deterrent Effect?
A Large Specific Deterrent Effect of Arrest for Patronizing a Prostitute
Devon D. Brewer, John J. Potterat, Stephen Q. Muth, and John M. Roberts, Jr.
Prior research suggests that arrest, compared with no police detection, of some types of offenders does not decrease the chances
they will reoffend. We assessed the specific deterrent effect of arrest for patronizing a street prostitute in Colorado Springs
by comparing the incidence of arrest for clients of prostitutes first detected through public health surveillance with the
incidence of rearrest for clients first detected by police arrest. Although these sets of clients were demographically and
behaviorally similar, arrest reduced the likelihood of a subsequent arrest by approximately 70%. In other areas of the US,
arrest did not appear to displace a client's patronizing. Thus, our results suggest that apprehending clients decreases their
patronizing behavior substantially.
Social Justice, Health Education, Program Planning for Individuals in the Sex Trade and the Demand
Since March of 1995, the San Francisco Office of the District Attorney's First Offender Prostitution Program (FOPP), a collaborative
with SAGE and the San Francisco Police Department, has diverted over 7,000 solicitors of prostitutes from the court system
and offered them a unique educational and rehabilitative experience in lieu of criminal prostitution. The First Offender Prostitution
Program was the 1998 recipient of the Ash Institute for Democratic Governance & Innovation award. The program has been replicated
in jurisdictions throughout the U.S., Canada and abroad. Also referred to as the John's School, The First Offender Prostitution
Program is designed and facilitated by individuals formerly involved in the sex trade. It is a restorative justice program
designed to funnel money raised in class fees back into programs for prostituted women and girls, offering treatment, recovery
and a way out. This collaboration between the Justice system, the Health Department, Domestic violence and therapeutic community,
concerned neighborhood groups and Prostitution survivors are intent upon reducing the number of outstanding prostitution warrants
in the court system; preventing and intervening early with those involved in prostitution rather than relying on criminal
prosecution and sanctions; addressing neighborhood crimes linked to prostitution (i.e.-drugs, violence, pimping, etc.); addressing
the root causes of prostitution such as violence, sexual exploitation, poverty and misogyny; focusing on the highest users
of the medical, social, mental health and criminal justice systems; and utilizing prostitution survivors as peer educators
to rehabilitate and reintegrate disenfranchised and disadvantaged women, girls & men.
This mission is being accomplished through creating a multi-pronged approach which includes advocacy, information campaigns,
policy discussions, and interventions focusing on both supply (prostitute) and demand (customer). Also, collaborations are
created with CBO's that assist women and girls escaping prostitution in acquiring services such as housing, medical care,
substance abuse treatment and vocational training.
The First Offender Prostitution program recognizes the need for developing programs that address the core issues in relation
to Men and Boys: Power dynamic of male/female relationships; Perception of women and girls as objects; Physical and sexual
exploitation (i.e.-date rape, childhood sexual abuse, domestic violence, etc.); Attitudes used by current prostitute users
to justify their actions; Increase collaboration and integration of these issues with organizations (schools, CBO's, churches,
criminal justice, etc…) to prevent men from exploiting and victimizing women.
The First Offender Prostitution program recognizes the need to create an infrastructure of services that work to rehabilitate
and reintegrate Women and Girls: Emergency shelters, safe houses, and supportive housing; Utilize prostitution survivors as
peer educators; Establish data bank of resources; Medical care and vocational training; Conduct research on the harm of prostitution;
Media campaigns to raise public awareness; Change social, economic and political structures which generate prostitution; Increase
women's and girls' employment opportunities; Improve educational levels and eradicate illiteracy.
Improving the Success Rate of the Analysis of Compromised DNA Evidence
Scientific and Management Issues Related to the Identification of the World Trade Center Remains
Robert C. Shaler
With the recent finding of bones from the Deutsch Bank in lower Manhattan, the World Trade Center (WTC) identification effort
continues. Clearly, this has been the most heart-wrenching and emotional task any laboratory or agency could face. Importantly,
agencies and people bonded to do the best job possible under impossible circumstances. From the beginning, no one expected
the work would be completed quickly. And knowing the complexity, no one expected it would be free from conflict or mistakes.
These were a given from the outset.
The political climate in New York under Mayor Giuliani and later Mayor Bloomberg were probably the best that could be expected
under those circumstances, in that they mostly left the laboratory alone to perform its duty. Nevertheless, there existed
a climate of expectation with respect to the priority of body identification that interfered with ability of the laboratory
to perform as efficiently as possible. From the day of the attacks on the World Trade Center, a number of seemingly unrelated
issues combined to impede the identification effort. Although these issues never led specifically to misidentifications, they
sometimes delayed the ability to make identifications. Management and scientific issues created situations that often delayed
the DNA analysis of samples not the least of which was the absence of a mass disaster plan for the DNA laboratory. The perceptions
of the public, the media, the families and political officials sometimes combined to impede the identification effort. IT
issues arose that impeded the work dramatically, and the strictly scientific problems related to the quality of the DNA obtained
from the remains also extended the scope of the work.
The quality of the remains posed serious problems. The initial STR testing results showed that a significant percent of the
remains would not permit a sufficiently robust statistical assessment to be made in order to make identifications of most
of the victims. This necessitated an intensive and grueling schedule of research and validation of new testing methods in
order to coax reliable genetic information from the badly decomposed remains.
Forensic Applications of the LINEAR ARRAY Mitochondrial DNA HVI/HVII Region-Sequence Typing Kit
Henry A. Erlich and Cassandra Calloway
The analysis of DNA polymorphisms in forensics specimens can provide valuable information for individual identification by
comparing the DNA profile with that of a reference sample. About 20 years ago, we carried out the PCR amplification and genotyping
of the polymorphic HLA-DQA1 locus with oligonucleotide hybridization probes in the first US forensic application of DNA analysis
(Pennsylvania vs. Pestinikis). Subsequently, we used this typing system for the first post-conviction exoneration (Dotson
case) and then, using immobilized probe technology, launched the first forensic typing kit in 1990. Such sequence based typing
systems as well as those that target length polymorphisms are now well established methods of forensic analysis. For some
specimens, however, the amount of DNA is too low or the DNA is too degraded to allow genetic analysis with chromosomal gene
polymorphisms. One approach to the analysis of such “compromised” samples is to analyze polymorphisms in mitochondrial DNA.
Each cell contains only two copies (maternal and paternal) of a chromosomal gene but contains hundreds to thousands of copies
of mitochondrial genomes, all inherited from the mother.
The mtDNA genome is around 16Kb, with most of the polymorphism localized to two regions, the hypervarible regions HVI and
HVII (each around 400 bp). Over the past several years, we have developed and optimized a rapid method for the analysis of
sequence variation in the HVI and HVII regions of the human mitochondrial genome utilizing PCR amplification and immobilized
probe hybridization. The current, commercial version of this assay consists of two primer pairs for co-amplification of HVI
and HVII regions and 33 probes immobilized in 31 lines for detection of sequence variation within 10 segments of HVI and HVII.
Using this rapid, informative assay, samples can be quickly screened to identify the most probative samples. The remaining
PCR product generated for the linear array assay can be used for sequence analysis if necessary. Additionally, the LINEAR
ARRAYTM Mitochondrial DNA HVI/HVII Region-Sequence Typing Kit consumes 50-75% less sample extract than sequence analysis because
the HVI and HVII regions are amplified simultaneously rather than in two or four separate reactions. This screening strategy
has been utilized by a Swedish Laboratory for casework since 1998 as well as for the identification of Croatian mass grave
remains; results from these analyses and others will be presented here. Additionally, several population studies were conducted
to determine the discrimination power of this panel of HVI/HVII probes, including typing and sequencing 689 samples from four
different populations. The estimated discrimination power of the LINEAR ARRAY mtDNA HVI/HVII Region-Sequence Typing Kit for
African Americans is ~0.9927 compared to 0.9977 for HVI/HVII sequencing estimated from a population database consisting of
~200 African Americans. Some populations have a few relatively common mtDNA HVI/HVII sequences, which limits the informativeness
of current mtDNA typing procedures. To increase the power of discrimination, we are currently co-amplifying segments in other
regions of the mtDNA genome and genotyping with an additional panel of immobilized probes. The incorporation of these additional
polymorphic regions in the typing system should significantly increase the Pd of mtDNA typing, making it a simple, rapid,
and informative method for analyzing compromised forensic specimens.
National Evaluation of Free to Grow: Head Start Partnerships to Promote Substance-Free Communities
Assessing Program Implementation in the National Evaluation of Free to Grow
Dr. Rogers will discuss how the Free to Grow (FTG) model calls for Head Start (HS) agencies to augment their child development
programming with a variety of strategies aimed at strengthening both the family and the surrounding community. Evaluating
implementation required an assessment of the individual strategies as well as changes in the HS agency's orientation, philosophy,
and partnering activities. Several methods were employed to measure implementation: surveys of agency staff and community
partners, activity tracking reports, site visits, and structured interviews. Relative to matched comparison HS agencies, FTG
sites showed enhanced implementation of such strategies as case management, leadership development, and community action,
particularly with regard to use of validated assessment instruments and “branded” curricula and program approaches. Additionally,
FTG sites experienced greater involvement of non-traditional partners (e.g., law enforcement) in their intervention efforts.
These results demonstrate successful uptake of key features of the program model that distinguish FTG grantees from traditional
Building Community and Revitalizing Neighborhoods Through Free to Grow
Mr. Sparks, who is the former Associate Director of the Free to Grow National Program Office, will reflect on the FTG program
model and implementation processes in light of the results of the evaluation. Special reference will be made to Free to Grow's
community strengthening strategies, including partnerships with local law enforcement agencies, community revitalization and
community action for policy change.
Design of the National Evaluation of Free to Grow: Head Start Partnerships to Promote Substance-free Communities
Dr. Wolfson will describe the evaluation design and methods for this large, complex, quasi-experimental community trial. This
will include a discussion of the special challenges inherent in evaluating a program which uses multiple family and community-strengthening
strategies, with the mix of strategies varying across sites. Implications for the field of criminal justice research and evaluation
will be discussed.
Evidence-Based Practices for Probation: Intermediate Measures and Results
Behavioral Management Supervision: Results from a Placed-Based Experiment
Faye S. Taxman
Using the tenets of evidence-based practices, that state of Maryland has crafted and adopted a proactive community supervision
model. The four tenets are: use risk screening tools to identify high risk offenders, use risk screening tools to develop
appropriate behavioral contracts that are based on promoting prosocial behaviors, use incentives and sanctions to reinforce
the behavioral contracts, and work collaboratively with offenders to reinforce positive behaviors. A randomized matched design
was used to assess the effectiveness of the new strategy with a sample size of 548. Study findings include reduced technical
violations and reduced rearrest. The implementation strategy will be discussed since it defines a new strategy for organizational
Concurrent Panel, Tuesday, 3:30 PM - 5:00 PM
Stalking: The Link to Domestic Violence and Sexual Assault
An Overview of Stalking
Michelle M. Garcia
This presentation will focus on the definition of stalking and introduce the intersection of stalking and domestic violence
and sexual assault. Topics covered will include the prevalence of stalking, the impact of stalking on victims, and the lethality
Prison Rape Elimination Act of 2003: Update on Research and Data Collections
Implementing the Prison Rape Elimination Act: Sexual Violence Reported by Current and Former Inmates
Allen J. Beck
The presentation will provide an overview of activities underway at the Bureau of Justice Statistics (BJA) to develop and
test methodologies for measuring sexual assault as reported by current and former inmates. As mandated by the Prison Rape
Elimination Act of 2003, BJS has been directed to measure the incidence and prevalence of sexual assault within the nation's
correctional facilities. Since passage of the Act, BJS has been developing methods to survey current and former inmates and
youth in juvenile correctional facilities. The presentation will focus on the Audio Computer-Assisted Self-Interview methods
of collecting self-reported victimization. The presentation will also include a discussion of the 2005 Survey on Sexual Violence,
which was based on administrative records in all State prison systems, the Federal Bureau of Prisons, and a representative
sample of local jail jurisdictions.
The National Prisoner Survey on Sexual Assault (NPS-SA)
Christopher P. Krebs
The Prison Rape Elimination Act (PREA) of 2003 (P.L. 108-79) requires the Bureau of Justice Statistics (BJS) to develop new
national data collections on the incidence and prevalence of sexual assault within correctional facilities. The Act requires
BJS to survey each year not less than 10% of all federal, state, and local correctional facilities and to provide facility-level
estimates of sexual assault for each sampled facility. To fully implement PREA, BJS has developed a multiple-measure, multiple-method
data collection strategy.
BJS is developing and testing a variety of collection methodologies for obtaining information directly from inmates on their
experiences with sexual assault. For the National Prisoner Survey on Sexual Assault Pilot and National Studies involving adult
inmates, BJS has entered into a cooperative agreement with RTI International (RTI) to develop, test, and field the audio computer-assisted
self-interview (ACASI) methods, in which respondents interact with a computer-assisted questionnaire using a touch-screen
and follow audio instructions delivered via headphones. The use of ACASI is expected to overcome many of the limitations of
previous studies of sexual violence within correctional facilities.
This presentation will cover research being conducted by RTI and BJS, who will discuss their experiences in developing and
testing these new collection methods. They will provide an overview of the survey questionnaires, consent procedures, sample
designs, and interviewing protocols. The session will conclude with a discussion of preliminary findings.
Research of the Prison Rape Elimination Commission
This presentation will focus on identifying and discussing the current research activities of the Prison Rape Elimination
Commission, as they fulfill the mandates of the Prison Rape Elimination Act of 2003. The research activities of the Commission
will be highlighted, with special emphasis on the statutory requirements imposed by the Act, and the ways that Commission
activities complement and add to those of the other federal partners. Updates on the status of research efforts, both sponsored
by the Commission and in partnership with other entities will be discussed. Collaborative efforts between Commission staff
and outside researchers will be highlighted with a focus on how and why such collaborations are advantageous. Additionally,
presentation will emphasize both competing and complementary models of conceptual operationalization, data collection and
interpretation. The role of research in fulfilling the broader mandate of the Prison Rape Elimination Commission to establish
national standards for correctional facilities will serve as the organizing principle to the presentation.
Workshop: Performance Monitoring for the Management of Effective Programs
Everyday Evaluation: Performance Monitoring for the Management of Effective Programs
Mark W. Lipsey
This session is designed to provide an overview of program evaluation methods for monitoring the performance of intervention
programs intended to reduce recidivism for juvenile and adult offenders. Ample evidence indicates that more programs are ineffective
because they are poorly implemented than because they are incapable of affecting recidivism rates. Monitoring program performance
and taking corrective action when it falls below appropriately formulated standards is one of the most effective and efficient
ways to improve outcomes. Taking an evidence-based practice perspective, this session will cover issues and approaches to
determining appropriate standards, defining and collecting performance data, and diagnosing deficiencies that undermine effectiveness.
Internet Crimes Against Persons or Institutions
The Undercover Multipurpose Anti-Spoofing Kit (unMask)
Internet criminals are increasingly preying upon email users by using complex and sophisticated spoofing techniques, generically
termed “phishing,” to trick users into revealing sensitive and personal information. For example, they may use fake but realistic
emails to drive users to bogus websites where they capture passwords and credit card numbers. This presentation describes
an ongoing project called unMask, that seeks to develop a set of software tools that can enable law enforcement agents to
reduce the time and effort needed to investigate such incidents of phishing and identity theft. UnMask will deconstruct the
email and attached source code, and investigate possible discrepancies. The results are stored as an actionable evidentiary
trail and presented as a report that law enforcement agents can use to develop additional viable leads and for subsequent
Catching Criminals in the Age of Triage: Technological and Task Force Solutions in Identity Theft Cases
Electronic commerce has greatly increased the speed with which consumers can purchase products and obtain loans, and greatly
increased the speed with which those same consumers can become identity theft victims. This rapidity has also been a cause
of the growing number of identity theft crimes. The increase in occurrences has caused all institutions in this field - banks,
corporations, credit card issuers, and law enforcement - to prioritize their cases, spending their scarce resources on the
“important” crimes and writing off the others.
This triage significantly hampers the effort to catch and deter identity thieves. Knowing that law enforcement cannot investigate
small thefts, sophisticated thieves keep their thefts small, moving through jurisdictions to increase their volume of fraudulent
transactions and their profit. The information needed to catch these identity theft gangs and their leaders is then spread
among so many agencies that the likelihood of apprehension drops significantly.
Mere coordination amongst law enforcement agencies, historically done through the periodic task force model, is inefficiently
slow and limited. Much data in this field is not even reported to law enforcement as victims deal directly with banks or credit
card companies and do no further reporting.
One program developed by the United States Attorney's Office for the Eastern District of Pennsylvania is RITNET, the Regional
Identity Theft Network. RITNET is a web-based law enforcement database, accessible through RISS. This system is directed to
coordinating data from local, state, and federal law enforcement agencies, across jurisdictional lines, together with information
from private industry and the Federal Trade Commission. RITNET will identify for law enforcement those triaged “small” cases
which are, in fact, not small cases but the hallmark of organized gangs.
Evaluation of Forensic Methods for Ballistic Evidence
Surface Topography Analysis for a Feasibility Assessment of a National Ballistics Imaging Database
Susan M. Ballou
A study was conducted at the National Institute of Standards and Technology (NIST) to assess the feasibility, accuracy, and
technical capability of a national ballistics database of casing and bullet images. Main questions addressed in this research
was whether the identity of suspect crime guns can be based on casing information only, whether identifying guns and gun types
are affected by different types of ammunition, which casing region (firing pin impression, breech face impression, ejector
marks) serves as the best gun-discriminator and how does 3-D topographical imaging methods compare with the technologies currently
in use. Research addressing these questions will be offered during this panel session.
A Statistical Validation of the Individuality of Guns Using 3D Images of Bullets
Weapon identification, its procedures and methodologies, have been developed over the past 100 years. These procedures are
routinely used by firearms examiners and are the basis of their testimony in court. As currently practiced, these procedures
involve a firearms examiner looking at the surface of bullets and attempting to determine whether they were fired by the same
gun. In reaching such conclusions, the firearms examiner relies mostly on his/her training and judgment, making current matching
procedures mostly subjective. The development of DNA identification techniques and the level of accuracy achievable in the
estimation of error rates associated with DNA identification has raised the expectations of the quantitative precision that
may be achieved in forensic analysis. Furthermore, recent Supreme Court decisions such as Daubert and Kumho are making it
increasingly necessary to further formalize the presentation of scientific evidence in court. The subjective nature of current
identification criteria, together with the inability of existing matching methodologies to estimate the probability of error
associated with identification may pose a serious problem for the use of firearms evidence in court. In response to these
concerns, Intelligent Automation Inc. (IAI) conducted the present study under the support of the National Institute of Justice
(NIJ). The first objective of this study was to improve on the state of the art of automated ballistic analysis systems, and
to make such advances available to the law enforcement community. The second objective of this project was to develop and
validate methodologies for ballistic identification, including the estimation of the probability-of-error in the identification
The scope of the present study is unprecedented in the arena of firearms examination. Over the three years of its duration,
a 3D-based ballistic analysis platform capable of handling both pristine and damaged bullets was developed and manufactured.
The barrels used in this study were selected to span the spectrum of weapons commonly found in crime scenes. More than 2800
bullets fired by over 100 barrels of 9 different brands were collected over the duration of this study. This process took
place over a period of more than two years, in dozens of visits to volunteer firearms examiner's facilities who made their
water tanks and time available for this purpose. Three different organizations assisted us in this project: Washington State
Police (thanks to the support of Evan Thompson), the Federal Bureau of Investigation Forensic Laboratory in Quantico VA, (thanks
to the support of Paul Tangren and other FBI personnel), and Baltimore County Police (thanks to the support of Michael Thomas
and Mark Ensor). We are extremely grateful to these firearms examiners who were willing to volunteer their time to this effort.
This project would not have been possible without them. The main conclusions of this research will be presented as part of
Concurrent Panel, Wednesday, 08:30 AM - 10:00 AM
Recent Findings for Improving Batterer Intervention
Supplemental Psychological Treatment for Participants in Domestic Violence Counseling
Edward W. Gondolf
Research on domestic violence perpetrators exposes a significant association of psychological disorders with dropout from
domestic violence counseling and reassault of female partners. State guidelines for domestic violence counseling recommend
assessment for psychological disorders and referral to psychological treatment. This presentation reports on a demonstration
project that tests the utility of screening domestic violence perpetrators for psychological disorders and referring those
who screen positive to psychological treatment in addition to domestic violence counseling. A formative evaluation of the
implementation of the demonstration project will be presented along with a quantitative description of treatment delivery.
The formative evaluation consists of a qualitative summary of direct observations, meeting notes, and staff interviews. Several
organizational and agency problems were associated with implementation delays and inconsistent referrals: concerns raised
by the Institutional Review Board, initial objections from the district attorney, misappropriation of funds by the DV counseling
program, subsequent financial crisis at the DV counseling program, DV program staff's failure to follow protocol, sick-leave
by the psychological clinic director, and billing problems at the clinic. The formative evaluation also exposed agency conflicts
in terms of different priorities, assumptions, and procedures, and revealed the complexity and complications associated with
multiple components across agencies.
A quantitative analysis of treatment delivery was conducted with three comparative samples of the men who screened positive
and were referred to psychological treatment. Nearly half of the 916 men entering the batterer program over 1½-year period
(N=477) scored positive on the Brief Symptoms Inventory (BSI score>62), and these men were more likely to have risk markers
associated with reassault than the men who scored negative on the BSI. The initial 181 men were referred for a mental health
evaluation on a voluntary basis, the next 167 were referred during a transitional phase toward mandated referral, and 167
men received a mandatory referral under the supervision of a case-manager (i.e., failure to comply was subject to further
According to men's self-reports at 4 weeks post-intake (68% response rate), there was an increase in compliance under the
court-mandate, but only a small portion of referred men eventually received treatment. Specifically, 6% of the voluntarily-referred
men made an appointment for a psychological evaluation, 29% during the transitional phase, and 46% under a court-mandate.
However, less than a quarter (23%) of the mandated-referrals actually obtained an evaluation; 15% were recommended for treatment;
and 8% attended a treatment session.
Approximately two-thirds of the men were diagnosed with adjustment disorders, and the remaining men with depressive disorders,
impulse control disorder, or drug dependence. The findings highlight the organizational and operational barriers to implementing
supplemental psychological referral, the crucial need for a casemanager and system coordinator, and the futility of voluntary
referrals. The BSI screening may over-identify psychological disorders, and men with the most severe disorders may not be
complying with the referrals. Greater integration of psychological treatment with DV counseling may be warranted to insure
greater compliance and to monitor supplemental treatment
The Transtheoretical Model and Processes of Resistance in Domestic Violence Offenders
Deborah A. Levesque
Domestic violence programs tend to be highly structured, psycho-educational, and “one-size-fits-all,” neglecting individual
differences in motivation that can affect program effectiveness and participation rates. The Transtheoretical Model of Change
(TTM), in contrast, understands change as progress, over time, through a series of stages and posits that we are more likely
to reduce resistance, facilitate treatment engagement, and produce behavior change when interventions are individualized and
matched to individual stage of change, rather than one-size-fits-all. The model systematically integrates four theoretical
dimensions central to change: 1) stage of change; 2) decisional balance; 3) processes of change; and 4) self-efficacy. In
an effort to improve the TTM's power to explain and facilitate change, we have begun to examine “processes of resistance”
as a separate dimension that can influence stage progression and regression. In the first study reported here, a measure of
resistance was developed and administered to 346 adult male domestic violence offenders in treatment. The study yielded a
38-item measure that assesses eight dimensions of resistance: (1) System Blaming, (2) Problems with Partner, (3) Problems
with Alliance, (4) Social Justification, (5) Hopelessness, (6) Isolation, (7) Psychological Reactance, and (8) Passive Reactance.
In a second study, the resistance measure was administered to a separate sample of 358 domestic violence offenders at treatment
intake and two months later to examine the relationship between resistance and time in treatment, psychological and physical
abuse post-intake, and stage progression and regression. Only System Blaming, Problems with Partner, and Hopelessness decreased
from intake to follow-up. Individuals who engaged in mild and severe physical aggression post-intake scored significantly
higher on all types of resistance but System Blaming and Problems with Alliance. Men who progressed from the Pre-Action stages
to Action showed significant decreases in Problems with Alliance, Social-Justification, and Passive Reactance from intake
to follow-up. Conversely, regression from Action to Pre-Action showed significant increases on these same dimensions, along
with Partner Blame and Isolation. Results suggest that the types of resistance that traditionally have received the most attention
in batterer treatment (e.g., Partner Blaming, System Blaming) are relatively unrelated to behavior. We may need to do more
to monitor other types of resistance, and develop strategies for dealing with them. Motivational interviewing offers one promising
approach. Other approaches identified by domestic violence experts for this project are briefly presented. Assessing and managing
resistance more effectively can complement established practices and potentially increase the impact of programs for domestic
Applications of Operations Research to the Criminal Justice System
Using a Simulation Model to Examine the Allocation of Technology to Improve the Criminal Justice System
Roderick H. MacDonald
The criminal justice system in the United States is large, complex and involves the activities of a number of independent
entities. These independent entities range from state and local police departments, to DAs, courts, jails, prisons, probation,
parole and incarceration alternatives. A criminal passing through the system may come into contact with all these entities
at one time or another. The introduction of different types of technology into the criminal justice system has the potential
to increase the efficiency, in different parts of the system, reduce crime, and save money in the long run. A system dynamics
computer simulation model was developed with assistance of experts working in the criminal justice system at the local and
Incarcerated Mothers, Their Children, and the Nexus With Foster Care
Incarcerated Women, Their Children, and the Nexus with Foster Care
Robert LaLonde, Susan George, Roland Holst, and Rekha Varghese
This study shows how state administrative data can be used to assess the relationships between the criminal justice and child
welfare systems. After matching corrections data on female offenders from Illinois to the state's child welfare records, we
examine the incidence of childhood foster care spells among incarcerated women, the incidence of female prisoners having their
own children in foster care, and how time in prison or jail is associated with different foster care outcomes, such as the
loss of parental rights.
Benefits of Drug and Alcohol Free Housing for Ex-Offenders
The Impact of Alcohol and Drug-Free Housing on Offender Outcomes
Alcohol and drug-free housing serves as a bridge during the difficult transition from correctional facilities and residential
treatment back to the community. Such housing is critical to recovery and often the difference between relapse and long-term
stability. In addition to supporting abstinence and continuing participation in a recovery program, it addresses the criminogenic
risks of negative peer associations and criminal attitudes and beliefs through the development of a pro-social support network.
Washington County is Oregon's fastest growing county with a population of approximately 480,000. It is comprised primarily
of suburban communities to the west of the Portland metropolitan area, with an economy dominated by high-tech businesses and
agriculture. The county lacks the older, affordable housing more readily found in a large city, making it difficult for low-income
persons to find housing. When a corrections client is released from an institution or residential treatment program, this
lack of affordable housing, combined with a criminal history and lack of employment, makes accessing safe housing even more
In recognition of the importance of housing for offenders, Washington County Community Corrections began exploring ways to
expand housing with local non-profit partners. The workshop will review the agency's efforts, which have resulted in the number
of alcohol and drug-free beds expanding from 65 to 235 in the past four years.
Part of the County's success is due to a BJA grant that was implemented starting in January 2004. Grant funds were sub-contracted
through an RFP process to four agencies. Three agencies provide alcohol and drug-free housing directly, and the fourth develops
Oxford Houses. Oxford Houses are self-managed/self-supported houses with 6 to 9 residents who agree to live by certain rules,
including a commitment to remaining clean and sober.
NIJ is in the first year of a three year evaluation of the BJA-funded project. The study is examining the relationship of
alcohol and drug-free housing on drug abuse, criminal activity, and self-sufficiency. It is exploring the differential effects
of offender risk levels, the influence of different combinations of services, and the relative costs and benefits of the various
housing models. There is a special focus on the impact of Oxford Houses. The workshop will provide an overview of the evaluation,
along with preliminary findings.
Concurrent Panel, Wednesday, 10:15 AM - 11:45 AM
Terrorism Databases: Findings and Practical Applications
Using Longitudinal Open Source Terrorism Data to Assess the Impact of Counter Terrorism Policies and Key Historical Events
Gary LaFree and Laura Dugan
Over the past three years we have developed a longitudinal open source Global Terrorism Data (GTD) base on terrorist events
that now contains about 70,000 incidents from 1970 to 1997. Because these data include the date of incidents, they provide
a quasi-experimental platform for statistically assessing changes in terrorism rates following specific counter terrorist
interventions or key historical events. In this paper we demonstrate three ways in which we have exploited this feature to
assess the effects of interventions and events on subsequent terrorist activities: (1) the impact of several counter terrorist
policies on the frequency of aerial hijacking in the United States and elsewhere; (2) the effect of five major British counter
terrorist interventions in Northern Ireland from 1969 to 1992; and (3) the impact of a 1983 attack on the Orly Airport in
Paris by the Armenian Secret Army for the Liberation of Armenia (ASALA). In each case we use Cox proportional hazard models
to estimate the impact of these interventions and events on the likelihood of new terrorist attacks. Our results for the aerial
hijacking analysis show that metal detectors were effective in the prevention of hijackings, but their specific effect on
terrorist hijackings was not significant. Our analysis of nationalist terrorist violence in Northern Ireland shows that the
five British counter terrorist interventions we examined did not significantly reduce the risk of future attacks and in some
cases actually increased attack risk. And our analysis of ASALA showed that the attack on Orly was followed by a significant
decline in terrorist activities. We conclude with a discussion of the strengths and weaknesses of the GTD and the implications
for further research.
The American Terrorism Study: The Use of Federal Indictments from FBI Terrorism Investigations for Expanded Data Collection
Brent L. Smith
The American Terrorism Study tracks the outcomes of federal criminal cases resulting from investigation under a FBI “terrorism
enterprise” investigation. The study currently includes the records of over 600 terrorists indicted for over 8,000 offenses
from 1980 through August 31, 2004. Most recently, the NIJ has funded research using this database as a source for expanded
data collection on the spatial and temporal patterns of terrorists as well as the crimes committed in preparation for terrorist
incidents. This presentation provides examples of the use of the ATS database to test hypotheses regarding preparatory behaviors,
sequencing of preparatory conduct, and the behavior of indicted terrorists during the judicial process.
Correctional Officer Safety
Improving Correctional Officer Safety: Reducing Inmate Weapons
Paul J. Biermann
The purpose of this initiative was to assess the correctional environment to identify items that have potential to become
unconventional weapons and develop safer alternatives. Examples of these unconventional weapons include sharpened toothbrushes,
combs and padlocks placed in socks to be used as bludgeons. The Johns Hopkins University Applied Physics Laboratory (JHU/APL)
assembled a working group consisting of 15 members to gather historical data on unconventional weapons, estimates of the associated
injuries and costs to the correctional system. The group was made up of corrections officials drawn from correctional systems
and members from JHU/APL and the Johns Hopkins University School of Public Health. The group collected and evaluated data
on unconventional weapons used by inmates, selecting the top five unconventional weapons that could be addressed by design
or material changes for further study. With guidance from the group's corrections officials, JHU/APL has lead the effort to
redesign the source of these unconventional weapons. The overall goal was to modify the source design and/or materials so
that the potential for its use as a weapon is negligible. The redesigned items have been demonstrated in prototype form. Implementation
into the prison environment will be accomplished by licensing to a commercial manufacturer or production by prison industries.
Staff Safety In Corrections: National Issues and Trends Related to Inmates with Mental Illnesses and Infectious Diseases
Patricia L. Caruso
The Association of State Correctional Administrators (ASCA) is a professional association whose membership consists of directors
of state departments of corrections, the Federal Bureau of Prisons, and the country's large urban correctional systems. A
sub-committee of ASCA – the Staff Safety and Institutional Stability Committee – is charged with gathering and sharing the
nation's best practices for maintaining staff safety and institutional stability. To this end, the Committee recently conducted
two surveys on the topic of staff safety in correctional settings. The first survey examined promising practices related to
working with inmates with mental illnesses, infectious diseases, or who are housed in special management units – from the
perspective of each agency's Director. The second survey looked into these same areas, but from the perspective of line staff
(corrections and probation/parole) working in the field. This interactive session will present the summary findings from these
two surveys, followed by a discussion of the current trends and issues related to staff safety in the correctional workplace.
Applying Technology to Protect the Public from Concealed Weapons
Available Concealed Weapons Detection Systems for Law Enforcement
Peter J. Costianes
This presentation will present MMW and IR systems recently evaluated at the AFRL Test Facility funded by NIJ. An overview
of the system functionality will be presented to include the underlying physics of operation, data processing and interpretation
involved and results of the on-site testing at AFRL.
Current Research on Child Victimization
Recent Trends in Child Victimization
This module will provide participants with an understanding of the mission, internet knowledge, and free services provided
by the Exploited Child Unit (ECU). This presentation will illustrate recent trends in child sexual exploitation as reported
to the CyberTipline. Additionally, it will highlight the services and findings of the Child Victim Identification Program.
Specific case examples of child victimization will be utilized throughout this presentation to illustrate the learning objectives
of this module.
Poly-Victims: A Concept for Targeting and Helping High Risk Children and Youth
Poly-victims are children with a large number of different kinds of victimization. They make up a substantial proportion of
any group of children identified by a screening for an individual victimization type (such as victims of sexual abuse, witnessing
domestic violence or bullying).Moreover, poly-victimization is an extremely powerful predictor of trauma symptoms and problem
behavior. When taken into account, it substantially eclipses the influence of individual victimizations. New research suggests
the importance for practitioners of identifying children who are experiencing such poly-victimization. This means that practitioners
need to build mechanisms for screening for poly-victims into their contacts and investigations. The findings on poly-victimization
also mean that researchers need to assess a wider range of victimizations in studies of children, rather than limiting assessment
to one particular type, like sexual abuse. In fact, some of the existing research that argues for the long-term effects of
single kinds of victimization may need to be reassessed in light of the evidence about poly-victimization and its impact.
This presentation will address the following issues: What is poly-victimization and how is it best defined?; What is the current
research about the background and characteristics of poly-victims?; How does the concept of poly-victimization change our
previous conceptions about child victimization trauma?; What are the best ways to assess for poly-victimization?; What are
the implications of poly-victimization for investigation, treatment and intervention?; What are the implications of poly-victimization
Much of the work on poly-victimization is based on a national survey of the experiences of over 2000 children and youth aged
2 to 17, the Developmental Victimization Survey (DVS). These children and youth were assessed with the newly developed Juvenile
Victimization Questionnaire (JVQ) that assesses 34 distinct forms of child maltreatment and victimization. Participants will
learn about the JVQ and its national norms established with the DVS.
Findings from the Second Youth Internet Safety Survey
This presentation will describe findings from the second Youth Internet Safety Survey, a telephone survey of a national sample
of 1500 youth Internet users, ages 10 to 17. The presenters will discuss the incidence of sexual solicitation, unwanted exposure
to pornography and harassment among youth Internet users, the changes in the rates and dynamics of such incidents since the
first Youth Internet Safety Survey conducted in 1999-2000, and the implications for prevention. The first and second Youth
Internet Safety Surveys provide some of the first scientific information about online victimization among youth Internet users.
The surveys were funded by the U.S. Department of Justice, OJJDP and the National Center for Missing & Exploited Children.
Concurrent Panel, Wednesday, 1:30 PM - 3:00 PM
Findings From the Multi-Site Evaluation of SVORI
Pamela K. Lattimore
A five-year evaluation of the Serious and Violent Offender Reentry Initiative (SVORI) is currently underway that includes
implementation, impact and economic components. Implementation assessment has been conducted through three program director
surveys across all 89 SVORI programs. The impact evaluation is studying the effectiveness of 16 SVORI programs through multiple
waves of offender interviews and administrative data. The economic analysis will focus on a subset of the impact programs
and entails the collection of detailed cost data that will be combined with service provision and outcome data to assess the
cost-effectiveness of the SVORI programs. This presentation will describe initial findings from the baseline pre-release survey
and the 3-month post-release survey.
Evaluating the Fortune Society's Reentry Services
The Fortune Society, a private organization founded in NYC in 1967, provides former prisoners (about 4500 admitted during
2005) a variety of services, including counseling, substance abuse treatment, residential housing, family support and parenting,
health services (for HIV+ persons), and career development, among others. Abt Associates is presently evaluating the effectiveness
of its programs in increasing employment and earnings as well as reducing recidivism and homelessness. This session will describe
the Fortune Society's operations, the challenges to conducting strong evaluations of multi-service organizations, and the
difficulties presented by the prevailing pattern of funding anti-crime programs through earmarked appropriations.
Prison Industries Enhancement Certification Program (PIECP): A National Evaluation of Prison Work Programs
Cindy J. Smith
This research was the first national empirical assessment of post release employment and recidivism effects based on legislative
intent for inmates participating in Prison Industries Enhancement Certification Program (PIECP) as compared to participants
in traditional industries (TI) and those involved in other than work (OTW) activities. Since 1979, the Bureau of Justice Assistance
has funded various agencies to ensure state compliance with the legislative mandate of the Ashurst-Summers Act without the
benefit of a national evaluation. The PIECP program has grown from 1,724 inmates employed in more than 80 industries to 5,103
inmates employed in over 200 industries across 36 states, and the inmates earned approximately $276.5 million with $162.3
million returned to the economy in the form of room and board, taxes, family support and victims' compensation.
A records review of outcomes for three matched samples, each of approximately 2200 inmates (n=6464), released from 46 prisons
between 1996 and 2001 examines whether PIECP participants return to prison less frequently or enter more successful employment
than otherwise similar inmates participating in traditional prison industries (TI) or other than work (OTW) activities while
in prison. Additional analysis includes comparing gender, race, age at admission to prison, crime type, number of disciplinary
reports, and length of incarceration.
The primary findings of this research are that inmates who worked in open-market jobs in PIECP were found to be significantly
more successful in post-release employment. That is to say, they became tax-paying citizens quicker and remain in that status
longer than TI and OTW releasees. Additionally, PIECP releasees had slower and reduced recidivism, as measured by arrest,
conviction and incarceration, than TI and OTW releasees.
The research results suggest that work plays an integral part in successful re-entry upon release in terms of employment and
recidivism. Additionally, the state and federal coiffeurs benefited from the taxes paid and the room and board collected.
This suggests that increased efforts should be expended to increase private industry partnerships and PIECP jobs. This increase
should be carefully monitored to be sure the program continues to enjoy success as a wider pool of inmates is included.
Technology, Research, and Practice: Introducing and Assessing a Multi-Disciplinary Domestic Violence Communication System
Domestic Violence Communications System Putting the Pieces Together to Stop Domestic Violence
Monica Kaiser, Pam Scanlon, and Katie Mugg
The presentation will include a short history of the DVCS and how it is currently used and by which agencies. In October of
1999, the San Diego Police Department received a grant from the Office of Community Oriented Policing Services to build a
regional computer system (Domestic Violence Communications System-DVCS) to share information between the various agencies
working toward significantly impacting and reducing domestic violence in San Diego County. The goal was to share information
between law enforcement, courts, shelters, victim advocates, batterers' counselors, the District/City Attorney's Offices,
Probation and Child Protective Services. By sharing information, each agency can more effectively assess the overall circumstances
and needs, resulting in more appropriate responses and earlier intervention to break the domestic violence cycle.
The system software links facilities and streamlines communications between numerous agencies involved directly in domestic
violence. It captures, and stores every report, action, incident and component of the family or individual. The system provides
automated access to authorized information concerning the past history of victims, suspects and their families, from law enforcement,
courts, social services, and others who interact with individuals involved in domestic violence. The users are able to view
the family/relationship dynamics and assess particular needs and the degree of danger. It provides users with real-time information
to better serve their clients.
Included in the presentation will be information on: System Requirements; Legal Requirements; Person Query; Case Contact;
Alerts; Notifications; Batterers Treatment Reports.
Cutting-Edge Technologies to Deny Criminals Free Access to the Community
Surveillance Requirements to Recognize and Individualize People
Richard W. Vorder Bruegge
Video and other image-based surveillance systems are becoming more prevalent throughout the United States. In order for such
systems to be effectively used in the identification of criminal suspects and other individuals, certain performance standards
must be met. This presentation will discuss guidelines for closed-circuit television (CCTV) systems developed by the Scientific
Working Group on Imaging Technology (SWGIT), which were designed to ensure that the individuals recorded by such systems could
be identified. Although these guidelines were written to address CCTV systems installed at commercial establishments such
as banks, the recommendations can also be applied to controlled access situations such as those at airports, government buildings,
and sport and entertainment venues.
Once surveillance systems have captured facial images of individuals, there are multiple ways in which these images might
be used. In some cases, automated facial recognition systems can be used to check individuals against established databases
in real-time. In other cases, investigators can provide these images to news media for the purpose of soliciting public assistance
in the identification of the individuals depicted therein. Finally, the images recovered from such systems may be submitted
to a forensic laboratory along with images of known suspects for the purpose of an examination to determine if the subjects
can be identified to the exclusion of all other individuals. The image quality necessary for each of these applications can
vary, with the latter application typically requiring the highest possible image quality. This presentation will address those
image quality issues.
The difference between biometrics and forensics will also be addressed during this presentation, including a discussion of
facial recognition systems. The primary difference is that biometrics is geared toward pre-event situations – such as having
an access control system verify that a person should be allowed to enter a facility - whereas forensics is geared toward post-event
situations – for example, identifying the subject in a CCTV image who robbed a bank. The different requirements of these scenarios
can be a major factor in determining the capabilities needed for a given surveillance system.
Code of the Street: Understanding Justice, Decency, Violence, and Aggression in the Inner City
The Code of the Streets
Of all the problems besetting the poor inner-city black community, none is more pressing than that of interpersonal violence
and aggression. It wreaks havoc daily with the lives of community residents and increasingly spills over into downtown and
residential middle-class areas. Muggings, burglaries, carjackings, and drug-related shootings, all of which may leave their
victims or innocent bystanders dead, as well as drug-related shootings are now common enough to concern all urban and many
suburban residents. The inclination to violence springs from the circumstances of life among the ghetto poor—the lack of jobs
that pay a living wage, the stigma of race, the fallout from rampant drug use and drug trafficking, and the resulting alienation
and lack of hope for the future.
Simply living in such an environment places young people at special risk of falling victim to aggressive behavior. Although
there are often forces in the community which can counteract the negative influences, by far the most powerful being a strong,
loving, "decent" (as inner-city residents put it) family committed to middle-class values, the despair is pervasive enough
to have spawned an oppositional culture, that of "the streets," whose norms are often consciously opposed to those of mainstream
society. These two orientations—decent and street—socially organize the community, and their coexistence has important consequences
for residents, particularly children growing up in the inner city. Above all, this environment means that even youngsters
whose home lives reflect mainstream values—and the majority of homes in the community do—must be able to handle themselves
in a street-oriented environment.
This is because the street culture has evolved what may be called a code of the streets, which amounts to a set of informal
rules governing interpersonal public behavior, including violence. The rules prescribe both a proper comportment and the proper
way to respond if challenged. They regulate the use of violence and so supply a rationale which allows those who are inclined
to aggression to precipitate violent encounters in an approved way. The rules have been established and are enforced mainly
by the street-oriented, but on the streets the distinction between street and decent is often irrelevant; everybody knows
that if the rules are violated, there are penalties. Knowledge of the code is thus largely defensive; it is literally necessary
for operating in public. Therefore, even though families with a decency orientation are usually opposed to the values of the
code, they often reluctantly encourage their children's familiarity with it to enable them to negotiate the inner-city environment.
At the heart of the code is the issue of respect—loosely defined as being treated "right" or granted the deference one deserves.
However, in the troublesome public environment of the inner city, as people increasingly feel buffeted by forces beyond their
control, what one deserves in the way of respect becomes more and more problematic and uncertain. This in turn further opens
the issue of respect to sometimes intense interpersonal negotiation. In the street culture, especially among young people,
respect is viewed as almost an external entity that is hard-won but easily lost, and so must constantly be guarded. The rules
of the code in fact provide a framework for negotiating respect. The person whose very appearance—including his clothing,
demeanor, and way of moving—deters transgressions feels that he possesses, and may be considered by others to possess, a measure
of respect. With the right amount, for instance, he can avoid "being bothered" in public. If he is bothered, not only may
he be in physical danger but he has been disgraced or "dissed" (disrespected). Many of the forms that dissing can take might
seem petty to middle-class people (maintaining eye contact for too long, for example), but to those invested in the street
code, these actions become serious indications of the other person's intentions. Consequently, such people become very sensitive
to advances and slights, which could well serve as warnings of imminent physical confrontation.
This hard reality can be traced to the profound sense of alienation from mainstream society and its institutions felt by many
poor inner-city black people, particularly the young. The code of the streets is actually a cultural adaptation to a profound
lack of faith in the police and the judicial system. The police are most often seen as representing the dominant white society
and not caring to protect inner-city residents. When called, they may not respond, which is one reason many residents feel
they must be prepared to take extraordinary measures to defend themselves and their loved ones against those who are inclined
to aggression. Lack of police accountability has in fact been incorporated into the status system: the person who is believed
capable of "taking care of himself" is accorded a certain deference, which translates into a sense of physical and psychological
control. Thus the street code emerges where the influence of the police ends and personal responsibility for one's safety
is felt to begin. Exacerbated by the proliferation of drugs and easy access to guns, this volatile situation results in the
ability of the street-oriented minority (or those who effectively "go for bad") to dominate the public spaces.
Structure and Culture in African-American Adolescent Violence: A Partial
Test of the Code of the Street Thesis
Eric A. Stewart
Researchers studying the race-violence relationship have tended to focus on either structural or cultural explanations. Although
both explanations are important, they tend to be incomplete. We draw on Anderson's “code of the street” thesis, which combines
structural and cultural explanations to explain the high rates of violence among African American adolescents. Anderson argues
that the street code, which supports the use of violence, is a cultural adaptation to negative neighborhood structural conditions,
as well as family characteristics and racial discrimination. Using two waves of data from 720 African American adolescents
from 259 neighborhoods, we investigated whether neighborhood context, family type, and discrimination influenced adoption
of the street code. We also assessed whether the street code mediated the effects of neighborhood context, family characteristics,
and racial discrimination on violent delinquency. Consistent with Anderson's hypotheses, neighborhood structural characteristics,
living in a street family, and discrimination significantly predicted adopting the street code. Moreover, the street code
mediated about one-fifth of neighborhood effects on violent delinquency, about one-fifth of the effect of racial discrimination,
and about four percent of the effect of family characteristics on violent delinquency. Overall, the results suggest that neighborhood
context, family characteristics, and racial discrimination directly influence adopting the street code, and partially influence
violence indirectly through the street code.
Concurrent Panel, Wednesday, 3:15 PM – 4:45 PM
Strategies for Reducing Gang and Gun Violence: Findings from Project Safe Neighborhoods Cities
Attention Felons: Evaluating Project Safe Neighborhoods in Chicago
Andrew V. Papachristos, Tracey L. Meares, and Jeffrey Fagan
This research uses a quasi-experimental design to evaluate the impact of Project Safe Neighborhood (PSN) initiatives on neighborhood
level crime rates in Chicago. Four interventions are analyzed: (1) increased federal prosecutions for convicted felons carrying
or using guns, (2) the length of sentences associated with federal prosecutions, (3) supply-side firearm policing activities,
and (4) social marketing of deterrence and social norms messages through justice-style offender notification meetings. Using
an individual growth curve models and propensity scores to adjust for non-random group assignment, our findings suggest that
several PSN interventions are associated with greater declines of homicide in the treatment neighborhoods as compared to the
control neighborhoods. The largest effect is associated with the offender notification meetings that stress individual deterrence,
normative change in offender behavior, and increasing views on legitimacy and procedural justice. Possible competing hypotheses
and directions for individual-level analysis are also discussed.
Girls and Delinquency: New Findings and Recent Studies
Addressing Psychological Trauma with Girls in the Juvenile Justice System: Design and Methodology of the Girls in Recovery
from Life Stress (GIRLS)
Psychological trauma and post-traumatic stress disorder (PTSD) are prevalent among youths in the juvenile justice system,
but evidence-based treatments for PTSD with this population have not been developed. Trauma Affect Regulation: Guidelines
for Education and Therapy (TARGET) is the sole promising evidence-informed treatment identified by the National Child Traumatic
Stress Network for traumatized youths in the juvenile justice system. TARGET and its outcomes with adults will be described,
and the design and methodology of a recently initiated OJJDP-funded randomized clinical trial of TARGET with delinquent girls
will be discussed.
Issues in Assessing Risk with Delinquent Girls
Margaret A. Zahn, Susan Brumbaugh, and Colleen McCue
This presentation will give an overview of one of the major tasks of the Girls Study Group: the review of screening and assessment
instruments to determine their applicability for delinquent girls. The goals of this assessment instrument review include:
(1) the identification of instruments that are recommended for use with delinquent and at-risk girls and (2) the generation
of a set of guidelines for the selection and use of screening and assessment instruments appropriate for delinquent girls.
The instrument review involved identifying and collecting relevant information about instruments currently being used with
juvenile offenders and then grouping instruments into various categories based on their purpose, with the primary classification
being (1) treatment-focused instruments designed to identify a condition, problem area, or strength area versus (2) public
safety-focused instruments intended to predict a particular outcome or behavior (e.g., recidivism risk). Our findings indicate
that among instruments developed for use in correctional settings or for use with delinquent or at-risk girls, very few have
been validated or normed specifically for use with girls. We will discuss implications and recommendations, with a specific
focus on risk-based prediction instruments.
Simulation-Based Training for Law Enforcement
Simulated Prison Environment Crisis Aversion Tools (SPECAT)
John S. Shaffer
The SPECAT Program consists of two components involving five separate tools. The first component, the Computer Based Training
(CBT) includes a Video-Based Training tool, an Administrative Records tool, and a Reference Manager tool. The Video-Based
Training tool fully immerses learners into a realistic, information intensive and challenging environment where their decisions
lead them through realistic consequences. The flexible scenario structure and the intuitive interface empower the trainees
to drive the scenario with multiple option and outcome possibilities, which maximizes reusability of the tool. The Administrative
Records tool provides Training Coordinators with student records and a training tool that can foster learning and improve
future scores. The Reference Manager enables approved Administrators to update the references and glossary terms incorporated
within the Video-Based Training Tool and allow the Training tool to evolve with current policies and procedures.
The second component of the SPECAT Program is the Facility Familiarization Tool (FFT) and the FFT Database Maintenance tool.
The FFT is an interactive, 3D modeled facility that virtually eliminates the difficulty and potential risks associated with
exploring a populated and fully operational facility in the traditional setting. It instantly brings layers of mission critical
and facility specific data to the surface while en route to tactical situations. The FFT allows users to become familiar with
the actual facility layout, emergency routing paths, available resources, and the surrounding environment without having to
physically enter the facility. The FFT Database provides approved Administrators the ability to edit data available within
the FFT, enabling the FFT to remain up to date for learning and emergency situations.
Use of Computer Generated Imagery for Law Enforcement Training
Computer Generated Imagery (CGI) has long been a recognized training technology for military applications. Recent developments
in this technology have improved the potential for CGI applications in law enforcement training environments. CGI technology
offers some advantages over traditional video simulations. It allows the creation of user-unique and interactive training
environments and scenarios that can be rapidly modified to meet evolving training needs. With funding from NIJ, NAVAIR Orlando
Training Systems Division and Boston Dynamics, Inc., are using CGI technology to demonstrate the use of Simulation Based Training
for an officer or a team to improve tactics and decision making on the use of force and choice of weapon. The system integrates
speech recognition technology to complement the logic behind the triggering of the specific scenario-branching needed to meet
specific training objectives. This presentation will include an explanation of the current work, and the potential directions
for this promising technology. A limited demonstration of the progress to date will also be presented.
Back to the NIJ Conference home
Date Created: November 27, 2007