SlideShare a Scribd company logo
1 of 34
RESEARCH PAPER
• Mobile computing and its business implications
Research paper basics:
• 10-12 pages in length
• APA formatted
• Minimum six (6) sources – at least two (2) from peer reviewed
journals
• Include an abstract, introduction, and conclusion
Some good questions to ask yourself before turning in your
research paper:
• Is the paper of optimal length?
• Is the paper well organized?
• Is the paper clear and concise?
• Is the title appropriate?
• Does the abstract summarize well?
• Are individual ideas assimilated well?
• Are wording, punctuation, etc. correct?
• Is the paper well motivated?
• Is interesting problem/issue addressed?
• Is knowledge of the area demonstrated?
• Have all key reference been cited?
• Are conclusions valid and appropriate
RESEARCH PAPER GRADING RUBRIC
Criteria/Categories Indicators/Levels
Score 5 4 3-2 1
Abstract and /25 Introduction Good Introductory Issue not clear
Introduction should be clear introductory statement is and
preview of
x 5 = with a preview of statement, but vague and main the
main points
the main points the preview of points are is incomplete
the main points unclear
is lacking
Main Points and /100 Main points are Main points are Main
points are Main points are
Sub Points clearly stated and clearly stated not clear. not clear,
x 20 = developed; but Audience has Audience
specific development of difficulty cannot
examples/support examples/suppo following understand
ing points are rting points are presentation presentation
appropriate and lacking; smooth because student because
there is
clearly transitions jumps around. no sequence of
developed; between points. Examples/supp information.
smooth orting points are Examples/supp
transitions and appropriate but orting points are
well organized. need inappropriate
elaboration or for issue.
are not well
thought out.
Conclusion /25 Well-thought out Well-thought Does not have a
Has neither a
x 5 = concluding out concluding well-thought well-thought
statement that statement but out concluding out concluding
summarizes main does not statement, but statement nor
points well. summarize summarizes summarizes
main points main points main points
well. well. well.
Spelling, /30 No more than No more than Eight to twenty More
than
grammar and two errors in any eight errors in errors in these
twenty errors in
punctuation of these any of these categories these categories
x 6 = categories categories combined. combined.
combined combined
Summary /20 Very interesting A rather Satisfactory Lack of
writing
x 4 = question. interesting and work, but does skills seen by
Evidence that challenging not engage the the quality of
student has put a work, but reader work. The
great amount of student doesn’t concept was
thought into the show much clearly not well
subject. excitement in thought out.
the subject
matter.
By Gene StephenS
PHOTOS: PHOTOS.COM
32 THE FUTURIST July-August 2008 www.wfs.org
The outlook for curtailing cyberspace
crime by technology or conventional
law-enforcement methods is bleak.
Most agencies do not have the person-
nel or the skills to cope with such of-
fenses…. Cybercrime cannot be con-
trolled by conventional methods.
Technology is on the side of the cyber-
space offender and motivation is high—
it’s fun, exciting, and profitable (p. 28).
My suggested solution, unfortu-
nately, seems even more “Pollyanna”
today than it did then: “the only real
help is ... conscience and personal
values, the belief that theft, decep-
tion, and invasion of privacy are sim-
ply unacceptable.”
According to Ray Kurzweil’s “Law
of Accelerating Returns,” technologi-
cal change is exponential rather than
linear; thus, “we won’t experience
100 years of progress in the twenty-
first century—it will be more like
20,000 years of progress (at today’s
rate).” Predicting advances and their
impacts on crime and crime fighting
by 2025, then, is analogous to re-
viewing the next 5,000 years of tech-
nological progress in society.
Kurzweil himself made several
forecasts that could have major im-
plications for cybercrime; for in-
stance, he said that by 2010 personal
computers will be capable of answer-
ing questions by accessing informa-
tion wirelessly via the Internet (this
is one prediction that arrived a little
early). By 2019, he held, a $1,000 per-
sonal computer will have as much
raw power as the human brain; pos-
sibly more important, he believed
that computer chips will be every-
where, embedded in furniture, jew-
elry, walls, clothing, and so on. Also
by 2019, computers and humans
would communicate via two-way
speech and gestures rather than key-
boards. Virtual sex via computer will
become a reality, and education, busi-
ness, and entertainment will also be
increasingly computer based. Road-
ways would be automated and com-
puter controlled, while human–robot
relationships will be commonplace.
Possibly the most renowned of
Kurzweil’s predictions is the coming
of “the Singularity”—when comput-
ers become self-aware—and the
melding of humans and machines.
Kurzweil sees this process well un-
internal theft of clients’ identities by
financially struggling and/or greedy
financial service employees; more
cyberporn, cyberstalking, cyber-
harassment, and cybervengeance;
and the use of biometrics and en-
cryption as methods of protecting
data in cyberspace.
In some other areas, my forecasts
weren’t as accurate. My fascination
with the embryonic field of nano-
technology led to a prediction of or-
ganic nanocomputers implanted in
citizens’ brains by the early twenty-
first century. Related forecasts in-
cluded terrorists sending subliminal
messages directly to the brain im-
plants of potential recruits, cyber-
extortion by hacking into brain im-
plants and scrambling or threatening
to scramble information in it, and the
problem of people with brain im-
plants being unable to a separate vir-
tual reality created by cyberoffenders
in flesh-and-blood reality. This fore-
cast may yet come true, however, for
it’s still early twenty-first century,
and there is plenty of time for this
technology and these disturbing
crimes to begin to appear.
In the 1995 article, I was rather
pessimistic about the short-term ca-
pacity of police to cope with emerg-
ing cybercrime:
In a 1981 article for THE FUTUR-
IST, I wrote, “Data from all areas of
the [criminal justice] system will be
computerized and cross-referenced.
Computers will store the modus ope-
randi of convicted felons, and when a
crime occurs, police may call on the
computer to name the most likely
suspects, or, in some cases, the exact
offender” (“Crime in the Year 2000,”
April 1981). It seemed quite logical at
the time, but the forecast turned out
to be overly optimistic; I underesti-
mated the antipathy to change and
the turf protection within the system.
The first paragraph of a subse-
quent article was more on target:
“Billions of dollars in losses have al-
ready been discovered. Billions more
have gone undetected. Trillions will
be stolen, most without detection, by
the emerging master criminal of the
twenty-first century—the cyberspace
offender” (“Crime in Cyberspace,”
September-October 1995). Admit-
tedly vague, it still seems to be a
fairly accurate evaluation of the evo-
lution of cybercrime.
In the same article, I correctly fore-
cast an explosion of cellular phone
time theft and phone fraud; in-
c re a s e d c y b e r a t t a c k s a n d f r a u d
against government and business;
massive credit card theft and fraud;
By Gene StephenS
In 1981, crImInal-justIce scholar Gene
stephens wrote an artIcle for the
futurIst on “crIme In the Year 2000,”
and In 1995, an artIcle on “crIme In
cYberspace.” In both, he suGGested the
role the computer and Internet would
plaY In crIme and crIme fIGhtInG In the
future. here, he revIews what he Got
rIGht, what he Got wronG, and whY, and
he suGGests the tYpes of cYbercrImes
and cYbercrIme fIGhtInG that wIll
occur bY the Year 2025.
© 2008 World Future Society • 7910 Woodmont Avenue, Suite
450, Bethesda, MD 20814, U.S.A. • All rights reserved.
THE FUTURIST July-August 2008 www.wfs.org 33
nologies spotlights the long-ignored
issues of who owns the World Wide
Web, who manages it, and who has
jurisdiction over it. The answer now
is: Nobody! Can the world’s most
powerful socio-politico-economic
network continue to operate almost
at random, open to all, and thus ex-
cessively vulnerable to cybercrimi-
nals and terrorists alike? Yet any at-
tempt to restrict or police the Web can
be expected to be met by extreme re-
sistance from a plethora of users for a
variety of reasons, many contradictory.
Another reasonable prediction
would be that the Internet will be-
c o m e n o t o n l y t h e n u m b e r- o n e
means of communicating, conduct-
ing business, socializing, entertain-
ing, and just living, but indeed will
handle a huge majority of such inter-
actions; thus, failure to establish and
enforce some basic ground rules will
likely lead to socioeconomic disaster.
If exchange of resources is to be ac-
complished almost exclusively over
the Internet, anonymous surfing will
be a potential threat. Moving funds
without identification could not only
perpetrate individual fraud, but also
bankrupt the system itself. Biomet-
rics and more-advanced systems of
ID will need to be perfected to pro-
tect users and the network. In addi-
tion, multinational cybercrime units
will be required to catch those prey-
ing on users worldwide, as Web surf-
ers in Arlington, Virginia, and Victo-
ria, British Columbia, may be victims
of cyberscams perpetrated in Cairo
or Budapest. Coordination and coop-
eration will be keys to making the
Internet a safer place to travel and
conduct business.
larger capacity usage, but also, by
virtually starting over with the secu-
rity aspects in mind, the future Inter-
net will be safer and more difficult to
attack and disable.
Nanotechnology will increasingly
impact cyberspace by the late 2010s,
and as we try to gain the most advan-
tage possible from new technologies,
new security gaps will emerge that
could turn into nightmares if not
handled carefully. For example, as
data nanobots are implanted in users’
brains (later, organic bots will become
an integral part of the individual),
special attention will have to be paid
to providing advanced firewalls to
keep intruders from cracking into the
bots and terrorizing the recipient.
Could there be a more frightening
crime than having your brain-stored
knowledge erased or scrambled, or
hearing voices threatening to destroy
your memory unless you pay extrav-
agant blackmail? Welcome to the
prospects of mindstalking.
Designer nanobots may also be
loosed on the World Wide Web to en-
gender types of mischief and de-
struction not yet contemplated. All
advanced technology has the capac-
ity to be used for good or evil, de-
pending on the developer/user; and
nanotech would appear to be the ul-
timate example, as it literally can be
used to develop either nanosize
weapons that could destroy the
world or nanosize defense systems
that could protect the planet.
Who’s in Charge?
T h e e x p o n e n t i a l l y i m p ro v i n g
capabilities of emerging Web tech-
der way by 2025 as nanobots begin
to surf the human bloodstream on
search-and-destroy missions to com-
bat pathogens and data nanobots
augment human intelligence and ac-
cess to information. Transhumans will
be on their way to having an inter-
nalized capacity to communicate and
interact with humans, machines, and
other transhumans.
TeChnology’s PoTenTial
imPaCTs on Crime
What follows are my forecasts for
how these developments might af-
fect crime and crime fighting over
the next two decades.
Computer and Internet use will
become increasingly seamless, as
hands-free, voice-activated commu-
nications and data entry and re-
trieval will be commonplace by the
early teen years of this new millen-
nium (the 2010s). The world commu-
nity will have moved a long way in a
few short years, since by late 2007,
1.25 billion people already had ac-
cess to the Internet, though only
about 2% of the world population
regularly accessed it. Science-fiction
writer William Gibson, who coined
the term cyberspace in his 1982 short
story, “Burning Chrome,” forecasts
that a fully wired world—a single
unbroken interface without need for
computers—will complete the evolu-
tion to full access of all Earth’s citizens.
The Defense Advanced Research
Projects Agency (DARPA) set up the
Internet and fostered its early devel-
opment, but DARPA will likely over-
haul its invention in the 2010s. Not
only will the outcome be faster and
“ Computer and Internet use wIll beCome InCreasIngly
seamless, as hands-free, voICe-aCtIvated CommunICatIons and
data entry and retrIeval wIll be CommonplaCe.”
34 THE FUTURIST July-August 2008 www.wfs.org
fleece infidels for funds to pursue
their goals and to provide an avenue
for recruiting others to their flock.
The Internet presents opportunities
to target one’s enemies for economic
and even physical destruction via
cyberterrorism.
Identity theft—already the num-
ber-one crime in the United States
and rapidly expanding throughout
the Internet world—can be expected
to increase at a faster pace and wreak
havoc on the financial and social
worlds of millions around the globe.
It well may be that the only way to
gain control over identity theft will
be the suggested DARPA reconfigu-
ration of the Web and its security ap-
paratus.
These, however, are short-term cri-
ses, which may soon become out-
moded by the ubiquitous wireless
c o m m u n i c a t i o n s n e t w o r k t h a t
should be fully evolved by the
middle to late years of the 2010s.
With no computers, and only sig-
nals in the air to handle all social and
economic activity, expect new cyber-
crimes yet to be invented. Unless a
values revolution (whether spiritual,
religious, or humanistic in origin) oc-
c u r s a n d h u m a n s / t r a n s h u m a n s
choose to refrain from stealing, kill-
ing, and defiling one another, you
can bet creative malcontents will de-
velop new methods to manipulate
the system for their own ends.
In the quest for speed and effi-
ciency on the Web, networks will
grow in size and scope. For example,
a network including all branches of a
large bank grows when several
banks merge and becomes larger still
when all banks in a region join to re-
in individualistic societies such as
the United States would likely be
similar to that in these fictional por-
trayals—rebellion, with a goal of de-
stroying the web of control.
A counterforce that could create a
different type of harm for the indi-
vidual would be continuance of the
policy of no control of the Internet,
allowing often destructive activity—
e.g., harassment, terrorism, and
fraud—without jurisdiction and au-
thority to curtail it. Which would be
worse would depend on which value
dominates—security (i.e., safety and
order) or civil liberties (freedom and
chaos). As always, the role of public
safety in all this is to find the balanc-
ing point, where the degree of safety
is enough to allow the pursuit of in-
dividual happiness.
CyberCrime Progression:
Pigeon DroPs anD iDenTiTy
ThefT
As technology advances at a diz-
zying pace, so will the ways and
means of those wishing to use the
rapidly changing cyberspace as a
tool/milieu for fun and profit, or
worse. In the immediate future, the
increasingly creative scams to bilk
Internet users of their resources will
continue, with literally scores of new
schemes appearing daily on the Web.
Sheiks, abandoned Russian women,
and unclaimed lottery winnings will
be joined by relatives seeking heirs
and other electronic pigeon drops yet
unimagined.
For those who burn with faith or
passion for a cause, the Internet will
continue to provide a means both to
The maTrix may be real
Kurzweil predicts that the equiva-
lent of 4,000 years of technological
advancement will occur during the
first two decades of the twenty-first
century, so it is extremely difficult to
forecast what will happen. The con-
cepts, theories, and formulas for
many of these changes have yet to
emerge from the plethora of ongoing
research and development.
Still, some speculation is possible.
For instance, every square meter of
atmosphere hugging the earth may
be filled with unseen nanodevices
designed to provide seamless com-
munication and surveillance among
all people in all places. Humans will
have nanoimplants, facilitating inter-
action in an omnipresent network.
Everyone will have a unique Internet
Protocol (IP) address.
Since nano-storage capacity is al-
most limitless, all activity and utter-
ances by people everywhere will be
recorded and recoverable. Transpar-
ency will become increasingly ubiq-
uitous as word and deed—whether
spoken or acted out in anger, frustra-
tion, or as a joke—can be almost in-
stantly compared to “the record.”
Can human or even transhuman be-
havior evolve rapidly enough to
withstand such scrutiny? If current
laws were enforced with this level of
supporting evidence, who could pay
for the prison space required to carry
out the mandated punishment?
Another possibility would be the
perfection of The Matrix, as Gibson
envisioned in a series of popular
books and movies, where a powerful
central force controls all activity in a
seemingly free society. The reaction
“ Could there be a more frIghtenIng CrIme than havIng your
braIn-
stored knowledge erased or sCrambled, or hearIng voICes
threatenIng to destroy your memory unless you pay extravagant
blaCkmaIl? welCome to the prospeCts of mIndstalkIng.”
THE FUTURIST July-August 2008 www.wfs.org 35
rect attack on the user—possibly
even invading his brain and memory
stored in neural networks.
As nanoscience advances to the
point that bots in the atmosphere
capture and record all spoken and
physical activity, the choice for law
enforcement—and society—will
evolve: Do we tightly control all
human interaction by holding indi-
viduals responsible for every deed
and action (each of which is sup-
p o r t e d b y p e r m a n e n t l y s t o r e d
evidence) in an efficiently networked
Web, or do we allow creativity and
individualism to emerge by refusing
to set boundaries and jurisdictions
on the Internet, leaving it much as
it is today—without management
or enforcement?
Choosing a “total control” future
might curtail cybercrime and make
the Web a safe vehicle for communi-
cation, socializing, commerce, etc.,
but at a substantial cost to privacy,
freedom of speech, and other civil
liberties. Choosing a “nobody-in-
charge” future might allow a free
flow of information and exchange of
goods and services without govern-
ment interference, but with a sub-
stantial threat to the economic and
social lives of individuals and society
itself posed by cyberoffenders.
By 2025, the whole concept of the
Internet and cybercrime may be
dumped into the dustbin of history.
The greatest threat then might be the
extreme difficulty of separating
virtual (cyber) reality from physical
reality. Already, psychologists warn
that perception can be more impor-
tant than truth: If cyberreality is
m o re c o n v i n c i n g t h a n p h y s i c a l
reality, the virtual world might be-
come the “real” world. Welcome to
The Matrix. ❏
About the Author
Gene Stephens, distin-
guished professor emeritus
of the University of South
Carolina, Columbia, South
Carolina, is the criminal jus-
tice editor of THE FUTUR-
IST. His last article, “Policing
the Future: Law Enforcement’s New Chal-
lenges,” was published in March-April 2005.
His address is 313 Lockner Court, Colum-
bia, South Carolina 29212. E-mail
[email protected]
preme, without recourse, and where
mistakes are not allowed, where “the
record” is proof positive, and where
there is no place for plea bargaining,
mediation, or arbitration? Have we
evolved to this level of “perfection”?
Taming The CyberCriminal
The future path through cyber-
space is filled with threats and op-
portunities, most of which cannot
even be imagined today. With the
equivalent of 5,000 years of techno-
logical progress expected between
2000 and 2025, it’s difficult to fore-
cast the dilemmas that lie ahead, but
thanks to the creativity and genius of
William Gibson, Ray Kurzweil, and
others like them, some predictions
have been made and can be used as
a basis for forecasting future cyber-
crime and crime fighting.
The Internet as we know it—com-
puters, Web sites, e-mail, blogs,
e-commerce, etc.—may be outdated
as soon as the early years of the next
decade (the “twenty-teens”). All
communication will be handled by a
seamless, wireless network of air-
borne signals moving between nano-
bots and individuals with transmit-
ters implanted in them. At this point,
cyberoffenses will become very per-
sonal, as an attack on the Web is a di-
duce costs and speed service deliv-
ery. Then a national banking net
emerges and is soon replaced by a
multinational and finally a world-
wide net. While the network be-
comes more powerful as it grows, it
also becomes more vulnerable to at-
tack. A shutdown of a regional net
would create havoc, but the slack
could be picked up by other nets. If
the worldwide net is closed, how-
ever, true chaos would ensue, leav-
ing banks and their customers at the
mercy of blackmailers, extortionists,
or terrorists. Thus, the larger the net-
works (e.g., energy, medical, educa-
tion; regional, international, world-
wide), the more critical security
becomes.
On the other hand, there may be a
greater threat evolving from the
powerful technology available to
thwart cybercrime and, indeed, all
criminal activity. Authorities have
long said, “If you have nothing to
hide, you have nothing to fear” when
talking about police state surveil-
lance capabilities. This theory may
well be tested by the evolving tech-
nology of the next few years: All ac-
tivity could be seen and recorded,
ready for retrieval and prosecution.
Next comes the development of pre-
ventive strategies. Do we really want
to live in a society where law is su-
“ the greatest threat mIght be the extreme
dIffICulty of separatIng vIrtual (Cyber)
realIty from physICal realIty.”
for more InformatIon
• DARPA: www.darpa.gov and the Internet Society Web site
at www.isoc.org/internet/history/brief.shtml
• WilliAm Gibson: www.williamgibsonbooks.com and
www.skierpage.com/gibson/biblio.htm
• RAy KuRzWeil: www.kurzweilai.net and
www.kurzweiltech.com
• nAnotechnoloGy: www.crnano.org/whatis.htm and
www.nanotech-now.com
36 THE FUTURIST July-August 2008 www.wfs.org
Reproduced with permission of the copyright owner. Further
reproduction prohibited without permission.
COMMENTARY
Now is the Time to Reform our
Criminal Justice System
SENATOR JIM WEBB*
On 26 March 2009, I introduced in
the U.S. Senate a piece of legislation
designed to establish a National
Criminal Justice Commission. The
Presidential level blue-ribbon com-
mission would be charged with con-
ducting an 18-month, top-to-bottom
review of our nation’s entire criminal
justice system, ultimately providing
the Congress and state governments
with specific, concrete recommenda-
tions for reform. The goal of this
legislation is nothing less than a
complete restructuring of the crim-
inal justice system in the United
States. Only an outside commission,
properly structured and charged, can
bring us complete findings necessary
to do so.
Despite burgeoning prisoner
populations, our communities and
neighborhoods are not safer and we
are still not bringing to justice the
actual criminals who perpetrate vio-
lence and criminality as a way of life.
Fixing our system will require us to
reexamine who goes to prison, for
how long and how we address the
long-term consequences of their in-
carceration.
Prior to joining the Senate, I spent
time as a journalist. 25 years ago,
I became the first American journalist
to report from inside the Japanese
prison system. It was when I was
investigating the Japanese criminal
justice system that I became aware
of the systemic difficulties and
challenges that we face here at home.
In 1984, Japan had a population half
the size of ours and was incarcerating
40,000 sentenced offenders, compared
with 580,000 in the United States. As
shocking as that disparity was, the
difference between the countries
now is even more astounding*and
profoundly disturbing. Since then,
Japan’s prison population has not
quite doubled to 71,000, while ours
has quadrupled to 2.3 million.
I strongly believe that there is a
compelling national interest for us to
examine this issue and reshape our
criminal justice system at the federal,
state, and local levels. Our failure to
address these problems cuts against
the notion that we are a society
founded on fundamental fairness.
I believe the high-level commission
that I am advocating will provide us
with that opportunity.
*Jim Webb, author of A Time to Fight:
Reclaiming a Fair and Just America
(2008), is Senior U.S. Senator for Virginia.
Email: http://www.webb.senate.gov
Criminal Justice Ethics
Vol. 28, No. 2, October 2009, 163�167
ISSN 0731-129X print/ISSN 1937-5948 online
# 2009 Senator Jim Webb
http://www.informaworld.com DOI:
10.1080/07311290903181184
http://www.informaworld.com
To begin to understand the need
and urgency of such a commission,
let’s start with a premise that many
Americans are not aware of. With 5%
of the world’s population, our coun-
try now houses 25% of the world’s
reported prisoners. We have an in-
carceration rate in the United States,
the world’s greatest democracy, that
is five times higher than the average
incarceration rate of the rest of the
world. With so many of our citizens
in prison compared with the rest of
the world, there are only two possi-
bilities: Either we are home to the
most evil people on earth or we are
doing something vastly counterpro-
ductive. Obviously, the answer is the
latter.
Since 1980, incarceration rates in
the United States have skyrocketed.
Over the past two decades, we have
been incarcerating more and more
people for non-violent crimes and
for acts that are driven by mental
illness or drug dependence. We are
warehousing the mentally ill in our
prisons. With four times as many
mentally ill people in our prisons as
in mental health institutions, we need
to understand that these people in
prison are not receiving the kind
of treatment they need in order to
remedy the disabilities that led to their
incarceration.
The ‘‘elephant in the bedroom’’ in
many discussions about the criminal
justice system is the sharp increase in
drug-related incarceration over the
past three decades. In 1980, we had
41,000 drug offenders in prison; today
we have more than 500,000. This is an
increase of 1,200% and a significant
proportion of this population is incar-
cerated for possession or non-violent
offenses stemming from drug addic-
tion and related behavioral issues.
Justice statistics also show that
47.5% of all the drug arrests in our
country in 2007 were for marijuana
offenses. Additionally, nearly 60% of
the people in state prisons serving
time for a drug offense had no
history of violence or of any signifi-
cant selling activity. Indeed, four out
of five drug arrests were for posses-
sion of illegal substances, while only
one out of five was for sales. An
estimated three-quarters of the drug
offenders in our state prisons were
there for non-violent or purely drug
offenses. And although experts have
found little statistical difference
among racial groups regarding actual
drug use, African-Americans*who
make up about 12% of the total U.S.
population*accounted for 37% of
those arrested on drug charges, 59%
of those convicted, and 74% of all
drug offenders sentenced to prison.
At the same time, we’re putting
too many of the wrong people in
prison, while not solving the pro-
blems to bring safety to our commu-
nities. Approximately 1 million gang
members live in our country today.
This is an issue that affects every
community in the United States. For
example, the media have recently
paid much attention to the Mexican
drug cartels*and they are the most
violent and visible gang networks
today*but this is not a problem
that exists only along the Mexican
border. The Mexican cartels are oper-
ating in 230 American cities across
the United States. The incidents on
the border should be understood to
illuminate the largeness of the pro-
blem and scope of the challenge.
An examination is also required as
to what happens inside our prisons.
When I was looking at the Japanese
system many years ago, their system
Senator Jim Webb
164
of prison administration was basically
designed on a traditional military
model. You could not be a warden in
a Japanese jail unless you started as a
turnkey. Before becoming a turnkey,
individual candidates had to take
national examinations, and have a
year of preparation and training in
psychology and counseling techni-
ques. Furthermore, the Japanese pro-
motion systems were internal, as in
the United States military. Corrections
provided a quality career path, and
the system created highly trained
people from the very beginning. We
don’t have that in America. Prisons
vary warden to warden, and they vary
locality to locality. We need to find a
better way to manage correctional
facilities in our country and to provide
better support to our correctional
officers in dealing with violent crim-
inals under their supervision.
We also have a serious problem
with prison violence and sexual vic-
timization. It is imperative that we
establish a safe environment for all
inmates, and examine ways to better
prepare them for their release back
into civil society. In addition, we
have many people in our prisons
who are very ill, many suffering
from hepatitis and HIV, and they
are not getting the treatment they
deserve. The de-humanizing envir-
onment of jails and prisons com-
pounds these challenges.
Over the course of last year, as we
began talking about the idea of a
National Criminal Justice Commis-
sion, we started being contacted by
people all across the country*people
from every different part of the
criminal justice system that comes
into play when we talk about in-
carceration. It is a very emotional
issue. I heard from Supreme Court
Justice Kennedy, from prosecutors,
judges, and defense lawyers, from
police on the street, and from former
offenders and people currently in
prison. All of them believe that we
have a mess here*a mess*and that
we have to get a holistic view of it in
order to understand how to solve it.
As to the design of this legislation,
we are looking to shape a commis-
sion with bipartisan balance. The
President would nominate the com-
mission’s leader. The Majority Leaders
and Minority Leaders of both houses
of Congress would appoint two
members each, in consultation with
their respective congressional judiciary
committees. Finally, the Republican
and Democratic Governors Association
would each nominate one member.
It is also imperative to get a group
of people in our country with cred-
ibility and with wide expertise to
examine specific findings and to
come up with policy recommenda-
tions in an 18-month time period.
The purpose of this is not to have a
group of people who are going to sit
around and simply remonstrate
about the problem.
The Commission shall review all
areas of Federal and State criminal
justice practices and make specific
findings, to include an examination
of:
. Reasons for increase in the U.S.
incarceration rate compared to his-
torical standards;
. Incarceration and other policies in
similar democratic, western coun-
tries;
. Prison administration policies, in-
cluding the availability of pre-
employment training programs
and career progression for guards
and prison administrators;
Now is the Time to Reform our Criminal Justice System
165
. Costs of current incarceration po-
licies at the federal, state, and local
level;
. The impact of gang activities, in-
cluding foreign syndicates;
. Drug policy and its impact on
incarceration, crime, and senten-
cing;
. Policies as they relate to the men-
tally ill;
. The historical role of the military
in crime prevention and border
security; and
. Any other area that the Commis-
sion deems relevant.
We believe that these are the most
pressing concerns, and that these
issues need to be examined carefully
and comprehensively.
The first step for the commission
would be to give us factual findings,
and from those findings the second
step would be to give us recommen-
dations for policy changes. The same
issues addressed above in terms of
the findings will apply in terms of
the policy recommendations: how we
can refocus our incarceration poli-
cies; how we can work toward prop-
erly reducing the incarceration rate in
safe, fair, and cost-effective ways that
still protect our communities; how
we should address the issue of prison
violence in all forms; how we can
improve prison administration; how
we can establish meaningful re-entry
programs.
In terms of this last issue, with
such a high volume of people coming
out of prisons, we must, on a national
level, assist local and state commu-
nities to decrease recidivism. It is in
the self-interest of every American
that national leadership design pro-
grams that provide former offenders
a true pathway toward a productive
future.
The National Criminal Justice
Commission Act has already gar-
nered wide support from across the
political and philosophical spectrum,
including 29 sponsors in the Senate,
among them many senior members
of the Senate Judiciary Committee.
My staff and I have engaged with
more than 100 organizations and
associations, representing the entire
gamut of prosecutors, judges, de-
fense lawyers, former offenders, ad-
vocacy groups, think tanks, victims
rights organizations, academics, pris-
oners, and law enforcement on the
street. This engagement is ongoing,
and support continues to grow.
It is my hope that the Congress
will pass this legislation this year.
Although criminal justice reform is
not a popular issue, the problems in
our criminal justice system threaten
every community in the United
States and challenge our notion of
fairness.
When we have 5% of the world’s
population and 25% of the world’s
prison population, there are better
ways to keep our communities safe.
When we still have public safety
issues in every community because
of gang violence, and particularly
transnational gang violence at this
moment, there are better ways to
keep our communities safe. That is
the purpose of having such a com-
mission: to get the greatest minds in
the country together with a specific
timeline to bring specific findings
and policy recommendations to Con-
gress and the states. This commission
of experts will wrestle with the entire
gamut of criminal justice in this
country. Not simply incarceration,
Senator Jim Webb
166
not simply gang violence, not simply
re-entry, but all the pieces of our
criminal justice system, so that we
can have a much needed and long
overdue restructuring of how we
address the crime in this country.
Note
[Based on Senator Webb’s congressional
floor speech to introduce ‘‘The National
Criminal Justice Commission Act of 2009.’’]
Now is the Time to Reform our Criminal Justice System
167

More Related Content

Similar to RESEARCH PAPER • Mobile computing and its busine.docx

How To Write Literature Essays. Scholarship essay: How to write literary essay
How To Write Literature Essays. Scholarship essay: How to write literary essayHow To Write Literature Essays. Scholarship essay: How to write literary essay
How To Write Literature Essays. Scholarship essay: How to write literary essay
bdg8266a
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
smile790243
 
Smart systems manifesto: roadmap for the Internet of Things
Smart systems manifesto: roadmap for the Internet of ThingsSmart systems manifesto: roadmap for the Internet of Things
Smart systems manifesto: roadmap for the Internet of Things
The Marketing Distillery
 

Similar to RESEARCH PAPER • Mobile computing and its busine.docx (15)

The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...
 
Cyber Crime Essay.pdf
Cyber Crime Essay.pdfCyber Crime Essay.pdf
Cyber Crime Essay.pdf
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
 
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
TME0212-49
TME0212-49TME0212-49
TME0212-49
 
How To Write Literature Essays. Scholarship essay: How to write literary essay
How To Write Literature Essays. Scholarship essay: How to write literary essayHow To Write Literature Essays. Scholarship essay: How to write literary essay
How To Write Literature Essays. Scholarship essay: How to write literary essay
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Smart systems manifesto: roadmap for the Internet of Things
Smart systems manifesto: roadmap for the Internet of ThingsSmart systems manifesto: roadmap for the Internet of Things
Smart systems manifesto: roadmap for the Internet of Things
 

More from ronak56

According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
ronak56
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docx
ronak56
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
ronak56
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docx
ronak56
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docx
ronak56
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docx
ronak56
 

More from ronak56 (20)

According to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxAccording to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docx
 
According to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxAccording to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docx
 
According to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxAccording to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docx
 
According to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxAccording to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docx
 
According to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxAccording to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docx
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docx
 
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxAccording to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxAccording to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docx
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docx
 
According to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxAccording to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docx
 
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxAccording to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
 
According to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxAccording to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docx
 
According to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxAccording to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docx
 
According to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxAccording to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docx
 
Access the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxAccess the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docx
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 

RESEARCH PAPER • Mobile computing and its busine.docx

  • 1. RESEARCH PAPER • Mobile computing and its business implications Research paper basics: • 10-12 pages in length • APA formatted • Minimum six (6) sources – at least two (2) from peer reviewed journals • Include an abstract, introduction, and conclusion Some good questions to ask yourself before turning in your research paper: • Is the paper of optimal length? • Is the paper well organized? • Is the paper clear and concise? • Is the title appropriate? • Does the abstract summarize well? • Are individual ideas assimilated well? • Are wording, punctuation, etc. correct? • Is the paper well motivated? • Is interesting problem/issue addressed?
  • 2. • Is knowledge of the area demonstrated? • Have all key reference been cited? • Are conclusions valid and appropriate RESEARCH PAPER GRADING RUBRIC Criteria/Categories Indicators/Levels Score 5 4 3-2 1 Abstract and /25 Introduction Good Introductory Issue not clear Introduction should be clear introductory statement is and preview of x 5 = with a preview of statement, but vague and main the main points the main points the preview of points are is incomplete the main points unclear is lacking Main Points and /100 Main points are Main points are Main points are Main points are Sub Points clearly stated and clearly stated not clear. not clear, x 20 = developed; but Audience has Audience specific development of difficulty cannot examples/support examples/suppo following understand ing points are rting points are presentation presentation appropriate and lacking; smooth because student because there is
  • 3. clearly transitions jumps around. no sequence of developed; between points. Examples/supp information. smooth orting points are Examples/supp transitions and appropriate but orting points are well organized. need inappropriate elaboration or for issue. are not well thought out. Conclusion /25 Well-thought out Well-thought Does not have a Has neither a x 5 = concluding out concluding well-thought well-thought statement that statement but out concluding out concluding summarizes main does not statement, but statement nor points well. summarize summarizes summarizes main points main points main points well. well. well. Spelling, /30 No more than No more than Eight to twenty More than grammar and two errors in any eight errors in errors in these twenty errors in punctuation of these any of these categories these categories x 6 = categories categories combined. combined. combined combined Summary /20 Very interesting A rather Satisfactory Lack of writing x 4 = question. interesting and work, but does skills seen by Evidence that challenging not engage the the quality of
  • 4. student has put a work, but reader work. The great amount of student doesn’t concept was thought into the show much clearly not well subject. excitement in thought out. the subject matter. By Gene StephenS PHOTOS: PHOTOS.COM 32 THE FUTURIST July-August 2008 www.wfs.org The outlook for curtailing cyberspace crime by technology or conventional law-enforcement methods is bleak. Most agencies do not have the person- nel or the skills to cope with such of- fenses…. Cybercrime cannot be con- trolled by conventional methods. Technology is on the side of the cyber- space offender and motivation is high— it’s fun, exciting, and profitable (p. 28). My suggested solution, unfortu- nately, seems even more “Pollyanna” today than it did then: “the only real
  • 5. help is ... conscience and personal values, the belief that theft, decep- tion, and invasion of privacy are sim- ply unacceptable.” According to Ray Kurzweil’s “Law of Accelerating Returns,” technologi- cal change is exponential rather than linear; thus, “we won’t experience 100 years of progress in the twenty- first century—it will be more like 20,000 years of progress (at today’s rate).” Predicting advances and their impacts on crime and crime fighting by 2025, then, is analogous to re- viewing the next 5,000 years of tech- nological progress in society. Kurzweil himself made several forecasts that could have major im- plications for cybercrime; for in- stance, he said that by 2010 personal computers will be capable of answer- ing questions by accessing informa- tion wirelessly via the Internet (this is one prediction that arrived a little early). By 2019, he held, a $1,000 per- sonal computer will have as much raw power as the human brain; pos- sibly more important, he believed that computer chips will be every- where, embedded in furniture, jew- elry, walls, clothing, and so on. Also by 2019, computers and humans would communicate via two-way speech and gestures rather than key-
  • 6. boards. Virtual sex via computer will become a reality, and education, busi- ness, and entertainment will also be increasingly computer based. Road- ways would be automated and com- puter controlled, while human–robot relationships will be commonplace. Possibly the most renowned of Kurzweil’s predictions is the coming of “the Singularity”—when comput- ers become self-aware—and the melding of humans and machines. Kurzweil sees this process well un- internal theft of clients’ identities by financially struggling and/or greedy financial service employees; more cyberporn, cyberstalking, cyber- harassment, and cybervengeance; and the use of biometrics and en- cryption as methods of protecting data in cyberspace. In some other areas, my forecasts weren’t as accurate. My fascination with the embryonic field of nano- technology led to a prediction of or- ganic nanocomputers implanted in citizens’ brains by the early twenty- first century. Related forecasts in- cluded terrorists sending subliminal messages directly to the brain im- plants of potential recruits, cyber- extortion by hacking into brain im- plants and scrambling or threatening
  • 7. to scramble information in it, and the problem of people with brain im- plants being unable to a separate vir- tual reality created by cyberoffenders in flesh-and-blood reality. This fore- cast may yet come true, however, for it’s still early twenty-first century, and there is plenty of time for this technology and these disturbing crimes to begin to appear. In the 1995 article, I was rather pessimistic about the short-term ca- pacity of police to cope with emerg- ing cybercrime: In a 1981 article for THE FUTUR- IST, I wrote, “Data from all areas of the [criminal justice] system will be computerized and cross-referenced. Computers will store the modus ope- randi of convicted felons, and when a crime occurs, police may call on the computer to name the most likely suspects, or, in some cases, the exact offender” (“Crime in the Year 2000,” April 1981). It seemed quite logical at the time, but the forecast turned out to be overly optimistic; I underesti- mated the antipathy to change and the turf protection within the system. The first paragraph of a subse- quent article was more on target: “Billions of dollars in losses have al- ready been discovered. Billions more
  • 8. have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first century—the cyberspace offender” (“Crime in Cyberspace,” September-October 1995). Admit- tedly vague, it still seems to be a fairly accurate evaluation of the evo- lution of cybercrime. In the same article, I correctly fore- cast an explosion of cellular phone time theft and phone fraud; in- c re a s e d c y b e r a t t a c k s a n d f r a u d against government and business; massive credit card theft and fraud; By Gene StephenS In 1981, crImInal-justIce scholar Gene stephens wrote an artIcle for the futurIst on “crIme In the Year 2000,” and In 1995, an artIcle on “crIme In cYberspace.” In both, he suGGested the role the computer and Internet would plaY In crIme and crIme fIGhtInG In the future. here, he revIews what he Got rIGht, what he Got wronG, and whY, and he suGGests the tYpes of cYbercrImes and cYbercrIme fIGhtInG that wIll occur bY the Year 2025. © 2008 World Future Society • 7910 Woodmont Avenue, Suite 450, Bethesda, MD 20814, U.S.A. • All rights reserved. THE FUTURIST July-August 2008 www.wfs.org 33
  • 9. nologies spotlights the long-ignored issues of who owns the World Wide Web, who manages it, and who has jurisdiction over it. The answer now is: Nobody! Can the world’s most powerful socio-politico-economic network continue to operate almost at random, open to all, and thus ex- cessively vulnerable to cybercrimi- nals and terrorists alike? Yet any at- tempt to restrict or police the Web can be expected to be met by extreme re- sistance from a plethora of users for a variety of reasons, many contradictory. Another reasonable prediction would be that the Internet will be- c o m e n o t o n l y t h e n u m b e r- o n e means of communicating, conduct- ing business, socializing, entertain- ing, and just living, but indeed will handle a huge majority of such inter- actions; thus, failure to establish and enforce some basic ground rules will likely lead to socioeconomic disaster. If exchange of resources is to be ac- complished almost exclusively over the Internet, anonymous surfing will be a potential threat. Moving funds without identification could not only perpetrate individual fraud, but also bankrupt the system itself. Biomet-
  • 10. rics and more-advanced systems of ID will need to be perfected to pro- tect users and the network. In addi- tion, multinational cybercrime units will be required to catch those prey- ing on users worldwide, as Web surf- ers in Arlington, Virginia, and Victo- ria, British Columbia, may be victims of cyberscams perpetrated in Cairo or Budapest. Coordination and coop- eration will be keys to making the Internet a safer place to travel and conduct business. larger capacity usage, but also, by virtually starting over with the secu- rity aspects in mind, the future Inter- net will be safer and more difficult to attack and disable. Nanotechnology will increasingly impact cyberspace by the late 2010s, and as we try to gain the most advan- tage possible from new technologies, new security gaps will emerge that could turn into nightmares if not handled carefully. For example, as data nanobots are implanted in users’ brains (later, organic bots will become an integral part of the individual), special attention will have to be paid to providing advanced firewalls to keep intruders from cracking into the bots and terrorizing the recipient. Could there be a more frightening crime than having your brain-stored
  • 11. knowledge erased or scrambled, or hearing voices threatening to destroy your memory unless you pay extrav- agant blackmail? Welcome to the prospects of mindstalking. Designer nanobots may also be loosed on the World Wide Web to en- gender types of mischief and de- struction not yet contemplated. All advanced technology has the capac- ity to be used for good or evil, de- pending on the developer/user; and nanotech would appear to be the ul- timate example, as it literally can be used to develop either nanosize weapons that could destroy the world or nanosize defense systems that could protect the planet. Who’s in Charge? T h e e x p o n e n t i a l l y i m p ro v i n g capabilities of emerging Web tech- der way by 2025 as nanobots begin to surf the human bloodstream on search-and-destroy missions to com- bat pathogens and data nanobots augment human intelligence and ac- cess to information. Transhumans will be on their way to having an inter- nalized capacity to communicate and interact with humans, machines, and other transhumans.
  • 12. TeChnology’s PoTenTial imPaCTs on Crime What follows are my forecasts for how these developments might af- fect crime and crime fighting over the next two decades. Computer and Internet use will become increasingly seamless, as hands-free, voice-activated commu- nications and data entry and re- trieval will be commonplace by the early teen years of this new millen- nium (the 2010s). The world commu- nity will have moved a long way in a few short years, since by late 2007, 1.25 billion people already had ac- cess to the Internet, though only about 2% of the world population regularly accessed it. Science-fiction writer William Gibson, who coined the term cyberspace in his 1982 short story, “Burning Chrome,” forecasts that a fully wired world—a single unbroken interface without need for computers—will complete the evolu- tion to full access of all Earth’s citizens. The Defense Advanced Research Projects Agency (DARPA) set up the Internet and fostered its early devel- opment, but DARPA will likely over- haul its invention in the 2010s. Not only will the outcome be faster and
  • 13. “ Computer and Internet use wIll beCome InCreasIngly seamless, as hands-free, voICe-aCtIvated CommunICatIons and data entry and retrIeval wIll be CommonplaCe.” 34 THE FUTURIST July-August 2008 www.wfs.org fleece infidels for funds to pursue their goals and to provide an avenue for recruiting others to their flock. The Internet presents opportunities to target one’s enemies for economic and even physical destruction via cyberterrorism. Identity theft—already the num- ber-one crime in the United States and rapidly expanding throughout the Internet world—can be expected to increase at a faster pace and wreak havoc on the financial and social worlds of millions around the globe. It well may be that the only way to gain control over identity theft will be the suggested DARPA reconfigu- ration of the Web and its security ap- paratus. These, however, are short-term cri- ses, which may soon become out- moded by the ubiquitous wireless c o m m u n i c a t i o n s n e t w o r k t h a t should be fully evolved by the middle to late years of the 2010s.
  • 14. With no computers, and only sig- nals in the air to handle all social and economic activity, expect new cyber- crimes yet to be invented. Unless a values revolution (whether spiritual, religious, or humanistic in origin) oc- c u r s a n d h u m a n s / t r a n s h u m a n s choose to refrain from stealing, kill- ing, and defiling one another, you can bet creative malcontents will de- velop new methods to manipulate the system for their own ends. In the quest for speed and effi- ciency on the Web, networks will grow in size and scope. For example, a network including all branches of a large bank grows when several banks merge and becomes larger still when all banks in a region join to re- in individualistic societies such as the United States would likely be similar to that in these fictional por- trayals—rebellion, with a goal of de- stroying the web of control. A counterforce that could create a different type of harm for the indi- vidual would be continuance of the policy of no control of the Internet, allowing often destructive activity— e.g., harassment, terrorism, and fraud—without jurisdiction and au- thority to curtail it. Which would be worse would depend on which value
  • 15. dominates—security (i.e., safety and order) or civil liberties (freedom and chaos). As always, the role of public safety in all this is to find the balanc- ing point, where the degree of safety is enough to allow the pursuit of in- dividual happiness. CyberCrime Progression: Pigeon DroPs anD iDenTiTy ThefT As technology advances at a diz- zying pace, so will the ways and means of those wishing to use the rapidly changing cyberspace as a tool/milieu for fun and profit, or worse. In the immediate future, the increasingly creative scams to bilk Internet users of their resources will continue, with literally scores of new schemes appearing daily on the Web. Sheiks, abandoned Russian women, and unclaimed lottery winnings will be joined by relatives seeking heirs and other electronic pigeon drops yet unimagined. For those who burn with faith or passion for a cause, the Internet will continue to provide a means both to The maTrix may be real Kurzweil predicts that the equiva- lent of 4,000 years of technological
  • 16. advancement will occur during the first two decades of the twenty-first century, so it is extremely difficult to forecast what will happen. The con- cepts, theories, and formulas for many of these changes have yet to emerge from the plethora of ongoing research and development. Still, some speculation is possible. For instance, every square meter of atmosphere hugging the earth may be filled with unseen nanodevices designed to provide seamless com- munication and surveillance among all people in all places. Humans will have nanoimplants, facilitating inter- action in an omnipresent network. Everyone will have a unique Internet Protocol (IP) address. Since nano-storage capacity is al- most limitless, all activity and utter- ances by people everywhere will be recorded and recoverable. Transpar- ency will become increasingly ubiq- uitous as word and deed—whether spoken or acted out in anger, frustra- tion, or as a joke—can be almost in- stantly compared to “the record.” Can human or even transhuman be- havior evolve rapidly enough to withstand such scrutiny? If current laws were enforced with this level of supporting evidence, who could pay for the prison space required to carry
  • 17. out the mandated punishment? Another possibility would be the perfection of The Matrix, as Gibson envisioned in a series of popular books and movies, where a powerful central force controls all activity in a seemingly free society. The reaction “ Could there be a more frIghtenIng CrIme than havIng your braIn- stored knowledge erased or sCrambled, or hearIng voICes threatenIng to destroy your memory unless you pay extravagant blaCkmaIl? welCome to the prospeCts of mIndstalkIng.” THE FUTURIST July-August 2008 www.wfs.org 35 rect attack on the user—possibly even invading his brain and memory stored in neural networks. As nanoscience advances to the point that bots in the atmosphere capture and record all spoken and physical activity, the choice for law enforcement—and society—will evolve: Do we tightly control all human interaction by holding indi- viduals responsible for every deed and action (each of which is sup- p o r t e d b y p e r m a n e n t l y s t o r e d evidence) in an efficiently networked Web, or do we allow creativity and individualism to emerge by refusing
  • 18. to set boundaries and jurisdictions on the Internet, leaving it much as it is today—without management or enforcement? Choosing a “total control” future might curtail cybercrime and make the Web a safe vehicle for communi- cation, socializing, commerce, etc., but at a substantial cost to privacy, freedom of speech, and other civil liberties. Choosing a “nobody-in- charge” future might allow a free flow of information and exchange of goods and services without govern- ment interference, but with a sub- stantial threat to the economic and social lives of individuals and society itself posed by cyberoffenders. By 2025, the whole concept of the Internet and cybercrime may be dumped into the dustbin of history. The greatest threat then might be the extreme difficulty of separating virtual (cyber) reality from physical reality. Already, psychologists warn that perception can be more impor- tant than truth: If cyberreality is m o re c o n v i n c i n g t h a n p h y s i c a l reality, the virtual world might be- come the “real” world. Welcome to The Matrix. ❏ About the Author Gene Stephens, distin-
  • 19. guished professor emeritus of the University of South Carolina, Columbia, South Carolina, is the criminal jus- tice editor of THE FUTUR- IST. His last article, “Policing the Future: Law Enforcement’s New Chal- lenges,” was published in March-April 2005. His address is 313 Lockner Court, Colum- bia, South Carolina 29212. E-mail [email protected] preme, without recourse, and where mistakes are not allowed, where “the record” is proof positive, and where there is no place for plea bargaining, mediation, or arbitration? Have we evolved to this level of “perfection”? Taming The CyberCriminal The future path through cyber- space is filled with threats and op- portunities, most of which cannot even be imagined today. With the equivalent of 5,000 years of techno- logical progress expected between 2000 and 2025, it’s difficult to fore- cast the dilemmas that lie ahead, but thanks to the creativity and genius of William Gibson, Ray Kurzweil, and others like them, some predictions have been made and can be used as a basis for forecasting future cyber- crime and crime fighting.
  • 20. The Internet as we know it—com- puters, Web sites, e-mail, blogs, e-commerce, etc.—may be outdated as soon as the early years of the next decade (the “twenty-teens”). All communication will be handled by a seamless, wireless network of air- borne signals moving between nano- bots and individuals with transmit- ters implanted in them. At this point, cyberoffenses will become very per- sonal, as an attack on the Web is a di- duce costs and speed service deliv- ery. Then a national banking net emerges and is soon replaced by a multinational and finally a world- wide net. While the network be- comes more powerful as it grows, it also becomes more vulnerable to at- tack. A shutdown of a regional net would create havoc, but the slack could be picked up by other nets. If the worldwide net is closed, how- ever, true chaos would ensue, leav- ing banks and their customers at the mercy of blackmailers, extortionists, or terrorists. Thus, the larger the net- works (e.g., energy, medical, educa- tion; regional, international, world- wide), the more critical security becomes. On the other hand, there may be a greater threat evolving from the powerful technology available to
  • 21. thwart cybercrime and, indeed, all criminal activity. Authorities have long said, “If you have nothing to hide, you have nothing to fear” when talking about police state surveil- lance capabilities. This theory may well be tested by the evolving tech- nology of the next few years: All ac- tivity could be seen and recorded, ready for retrieval and prosecution. Next comes the development of pre- ventive strategies. Do we really want to live in a society where law is su- “ the greatest threat mIght be the extreme dIffICulty of separatIng vIrtual (Cyber) realIty from physICal realIty.” for more InformatIon • DARPA: www.darpa.gov and the Internet Society Web site at www.isoc.org/internet/history/brief.shtml • WilliAm Gibson: www.williamgibsonbooks.com and www.skierpage.com/gibson/biblio.htm • RAy KuRzWeil: www.kurzweilai.net and www.kurzweiltech.com • nAnotechnoloGy: www.crnano.org/whatis.htm and www.nanotech-now.com 36 THE FUTURIST July-August 2008 www.wfs.org Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
  • 22. COMMENTARY Now is the Time to Reform our Criminal Justice System SENATOR JIM WEBB* On 26 March 2009, I introduced in the U.S. Senate a piece of legislation designed to establish a National Criminal Justice Commission. The Presidential level blue-ribbon com- mission would be charged with con- ducting an 18-month, top-to-bottom review of our nation’s entire criminal justice system, ultimately providing the Congress and state governments with specific, concrete recommenda- tions for reform. The goal of this legislation is nothing less than a complete restructuring of the crim- inal justice system in the United States. Only an outside commission, properly structured and charged, can bring us complete findings necessary to do so. Despite burgeoning prisoner populations, our communities and neighborhoods are not safer and we are still not bringing to justice the actual criminals who perpetrate vio-
  • 23. lence and criminality as a way of life. Fixing our system will require us to reexamine who goes to prison, for how long and how we address the long-term consequences of their in- carceration. Prior to joining the Senate, I spent time as a journalist. 25 years ago, I became the first American journalist to report from inside the Japanese prison system. It was when I was investigating the Japanese criminal justice system that I became aware of the systemic difficulties and challenges that we face here at home. In 1984, Japan had a population half the size of ours and was incarcerating 40,000 sentenced offenders, compared with 580,000 in the United States. As shocking as that disparity was, the difference between the countries now is even more astounding*and profoundly disturbing. Since then, Japan’s prison population has not quite doubled to 71,000, while ours has quadrupled to 2.3 million. I strongly believe that there is a compelling national interest for us to examine this issue and reshape our criminal justice system at the federal, state, and local levels. Our failure to address these problems cuts against the notion that we are a society
  • 24. founded on fundamental fairness. I believe the high-level commission that I am advocating will provide us with that opportunity. *Jim Webb, author of A Time to Fight: Reclaiming a Fair and Just America (2008), is Senior U.S. Senator for Virginia. Email: http://www.webb.senate.gov Criminal Justice Ethics Vol. 28, No. 2, October 2009, 163�167 ISSN 0731-129X print/ISSN 1937-5948 online # 2009 Senator Jim Webb http://www.informaworld.com DOI: 10.1080/07311290903181184 http://www.informaworld.com To begin to understand the need and urgency of such a commission, let’s start with a premise that many Americans are not aware of. With 5% of the world’s population, our coun- try now houses 25% of the world’s reported prisoners. We have an in- carceration rate in the United States, the world’s greatest democracy, that is five times higher than the average incarceration rate of the rest of the world. With so many of our citizens in prison compared with the rest of the world, there are only two possi-
  • 25. bilities: Either we are home to the most evil people on earth or we are doing something vastly counterpro- ductive. Obviously, the answer is the latter. Since 1980, incarceration rates in the United States have skyrocketed. Over the past two decades, we have been incarcerating more and more people for non-violent crimes and for acts that are driven by mental illness or drug dependence. We are warehousing the mentally ill in our prisons. With four times as many mentally ill people in our prisons as in mental health institutions, we need to understand that these people in prison are not receiving the kind of treatment they need in order to remedy the disabilities that led to their incarceration. The ‘‘elephant in the bedroom’’ in many discussions about the criminal justice system is the sharp increase in drug-related incarceration over the past three decades. In 1980, we had 41,000 drug offenders in prison; today we have more than 500,000. This is an increase of 1,200% and a significant proportion of this population is incar- cerated for possession or non-violent offenses stemming from drug addic- tion and related behavioral issues.
  • 26. Justice statistics also show that 47.5% of all the drug arrests in our country in 2007 were for marijuana offenses. Additionally, nearly 60% of the people in state prisons serving time for a drug offense had no history of violence or of any signifi- cant selling activity. Indeed, four out of five drug arrests were for posses- sion of illegal substances, while only one out of five was for sales. An estimated three-quarters of the drug offenders in our state prisons were there for non-violent or purely drug offenses. And although experts have found little statistical difference among racial groups regarding actual drug use, African-Americans*who make up about 12% of the total U.S. population*accounted for 37% of those arrested on drug charges, 59% of those convicted, and 74% of all drug offenders sentenced to prison. At the same time, we’re putting too many of the wrong people in prison, while not solving the pro- blems to bring safety to our commu- nities. Approximately 1 million gang members live in our country today. This is an issue that affects every community in the United States. For example, the media have recently paid much attention to the Mexican drug cartels*and they are the most violent and visible gang networks
  • 27. today*but this is not a problem that exists only along the Mexican border. The Mexican cartels are oper- ating in 230 American cities across the United States. The incidents on the border should be understood to illuminate the largeness of the pro- blem and scope of the challenge. An examination is also required as to what happens inside our prisons. When I was looking at the Japanese system many years ago, their system Senator Jim Webb 164 of prison administration was basically designed on a traditional military model. You could not be a warden in a Japanese jail unless you started as a turnkey. Before becoming a turnkey, individual candidates had to take national examinations, and have a year of preparation and training in psychology and counseling techni- ques. Furthermore, the Japanese pro- motion systems were internal, as in the United States military. Corrections provided a quality career path, and the system created highly trained people from the very beginning. We don’t have that in America. Prisons
  • 28. vary warden to warden, and they vary locality to locality. We need to find a better way to manage correctional facilities in our country and to provide better support to our correctional officers in dealing with violent crim- inals under their supervision. We also have a serious problem with prison violence and sexual vic- timization. It is imperative that we establish a safe environment for all inmates, and examine ways to better prepare them for their release back into civil society. In addition, we have many people in our prisons who are very ill, many suffering from hepatitis and HIV, and they are not getting the treatment they deserve. The de-humanizing envir- onment of jails and prisons com- pounds these challenges. Over the course of last year, as we began talking about the idea of a National Criminal Justice Commis- sion, we started being contacted by people all across the country*people from every different part of the criminal justice system that comes into play when we talk about in- carceration. It is a very emotional issue. I heard from Supreme Court Justice Kennedy, from prosecutors, judges, and defense lawyers, from
  • 29. police on the street, and from former offenders and people currently in prison. All of them believe that we have a mess here*a mess*and that we have to get a holistic view of it in order to understand how to solve it. As to the design of this legislation, we are looking to shape a commis- sion with bipartisan balance. The President would nominate the com- mission’s leader. The Majority Leaders and Minority Leaders of both houses of Congress would appoint two members each, in consultation with their respective congressional judiciary committees. Finally, the Republican and Democratic Governors Association would each nominate one member. It is also imperative to get a group of people in our country with cred- ibility and with wide expertise to examine specific findings and to come up with policy recommenda- tions in an 18-month time period. The purpose of this is not to have a group of people who are going to sit around and simply remonstrate about the problem. The Commission shall review all areas of Federal and State criminal justice practices and make specific findings, to include an examination of:
  • 30. . Reasons for increase in the U.S. incarceration rate compared to his- torical standards; . Incarceration and other policies in similar democratic, western coun- tries; . Prison administration policies, in- cluding the availability of pre- employment training programs and career progression for guards and prison administrators; Now is the Time to Reform our Criminal Justice System 165 . Costs of current incarceration po- licies at the federal, state, and local level; . The impact of gang activities, in- cluding foreign syndicates; . Drug policy and its impact on incarceration, crime, and senten- cing; . Policies as they relate to the men- tally ill; . The historical role of the military
  • 31. in crime prevention and border security; and . Any other area that the Commis- sion deems relevant. We believe that these are the most pressing concerns, and that these issues need to be examined carefully and comprehensively. The first step for the commission would be to give us factual findings, and from those findings the second step would be to give us recommen- dations for policy changes. The same issues addressed above in terms of the findings will apply in terms of the policy recommendations: how we can refocus our incarceration poli- cies; how we can work toward prop- erly reducing the incarceration rate in safe, fair, and cost-effective ways that still protect our communities; how we should address the issue of prison violence in all forms; how we can improve prison administration; how we can establish meaningful re-entry programs. In terms of this last issue, with such a high volume of people coming out of prisons, we must, on a national level, assist local and state commu- nities to decrease recidivism. It is in the self-interest of every American
  • 32. that national leadership design pro- grams that provide former offenders a true pathway toward a productive future. The National Criminal Justice Commission Act has already gar- nered wide support from across the political and philosophical spectrum, including 29 sponsors in the Senate, among them many senior members of the Senate Judiciary Committee. My staff and I have engaged with more than 100 organizations and associations, representing the entire gamut of prosecutors, judges, de- fense lawyers, former offenders, ad- vocacy groups, think tanks, victims rights organizations, academics, pris- oners, and law enforcement on the street. This engagement is ongoing, and support continues to grow. It is my hope that the Congress will pass this legislation this year. Although criminal justice reform is not a popular issue, the problems in our criminal justice system threaten every community in the United States and challenge our notion of fairness. When we have 5% of the world’s population and 25% of the world’s prison population, there are better
  • 33. ways to keep our communities safe. When we still have public safety issues in every community because of gang violence, and particularly transnational gang violence at this moment, there are better ways to keep our communities safe. That is the purpose of having such a com- mission: to get the greatest minds in the country together with a specific timeline to bring specific findings and policy recommendations to Con- gress and the states. This commission of experts will wrestle with the entire gamut of criminal justice in this country. Not simply incarceration, Senator Jim Webb 166 not simply gang violence, not simply re-entry, but all the pieces of our criminal justice system, so that we can have a much needed and long overdue restructuring of how we address the crime in this country. Note [Based on Senator Webb’s congressional floor speech to introduce ‘‘The National Criminal Justice Commission Act of 2009.’’]
  • 34. Now is the Time to Reform our Criminal Justice System 167