1,118 research outputs found

    The Situational Context of Police Sexual Violence: Data and Policy Implications

    Get PDF
    The horrors of sexual crimes perpetrated by law enforcement officers are laid bare in this study of 669 cases of police sexual violence. Here, authors Philip Matthew Stinson, Robert W. Taylor, and John Liederbach identify three scenarios in which law enforcement officers inflict sexual violence upon their mostly-female victims: 1) “driving while female,” 2) child predation, and 3) involvement in the sex worker industry. Especially sobering is the fact that, as opposed to law enforcement doing its solemn duty to report criminality on the part of fellow police officers, “citizens rather than police initiated the detection of the crimes in almost all the cases, whether the context involved child predation (94.8%), driving while female (94.7%), or the sex worker industry (90.8%).” Rather than an anomaly, sexual predation on the part of police, along with the routine cover-ups that perpetuate these crimes, appears to be just one component of the “rotten barrel” that depicts a culture of police corruption

    Police Crime & Less-than-Lethal Coercive Force: A Description of the Criminal Misuse of TASERs

    Get PDF
    This study explores and describes the nature and character of cases that involve the criminal misuse of TASERs by police officers through a content analysis of newspaper articles. The news-based content analysis identified 24 police officers who were arrested for crimes that involved inappropriate use of TASERs over a 65 month period from January 2005 through May 2010. Data on these cases are presented in terms of: a) the arrested officer, b) victim characteristics, and c) the situational context of these events. The news-based content analyses were used to identify and describe some factors that were common among these events, especially in regard to the actions and motivations of the arrested officers and how the situational context appeared to influence the criminal misconduct of officers. The findings indicate that the cases examined did not involve much, if any, situational risk to the officer. The criminal misuse of TASERs seems more likely to involve suspects who are already handcuffed, or even citizens who are clearly not criminals at all

    Research Brief One-Sheet No.5: Police Criminal Misuse of Conductive Energy Devices

    Get PDF
    The purpose of the research is to explore and describe the nature and character of arrest cases that involve the criminal misuse of TASERS by police officers through a content analysis of news articles. The research specifically focuses on factors that were common among the arrest events involving CEDs, especially with regard to the actions and motivations of the arrested officers and how the situational context appeared to influence the criminal misconduct of police officers

    Combinatorial Bounds and Characterizations of Splitting Authentication Codes

    Full text link
    We present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, we prove a combinatorial lower bound on the number of encoding rules and a combinatorial characterization of optimal splitting authentication codes that are multi-fold secure against spoofing attacks. The characterization is based on a new type of combinatorial designs, which we introduce and for which basic necessary conditions are given regarding their existence.Comment: 13 pages; to appear in "Cryptography and Communications

    How to bend galaxy disc profiles - II. Stars surfing the bar in Type-III discs

    Get PDF
    The radial profiles of stars in disc galaxies are observed to be either purely exponential (Type-I), truncated (Type-II) or antitruncated (Type-III) exponentials. Controlled formation simulations of isolated galaxies can reproduce all of these profile types by varying a single parameter, the initial halo spin. In this paper, we examine these simulations in more detail in an effort to identify the physical mechanism that leads to the formation of Type-III profiles. The stars in the antitruncated outskirts of such discs are now on eccentric orbits, but were born on near-circular orbits at much smaller radii. We show that, and explain how, they were driven to the outskirts via non-linear interactions with a strong and long-lived central bar, which greatly boosted their semimajor axis but also their eccentricity. While bars have been known to cause radial heating and outward migration to stellar orbits, we link this effect to the formation of Type-III profiles. This predicts that the antitruncated parts of galaxies have unusual kinematics for disc-like stellar configurations: high radial velocity dispersions and slow net rotation. Whether such discs exist in nature, can be tested by future observations

    Genetic attack on neural cryptography

    Full text link
    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.Comment: 8 pages, 12 figures; section 5 amended, typos correcte

    Becoming Critical Mathematics Pedagogues: A Journey

    Get PDF
    This session will report the findings of a study that explored the beginning transformations in the pedagogical philosophies and practices of three mathematics teachers (middle, high school, and 2-year college) who completed a graduate-level mathematics education course that focused on critical theory and teaching for social justice, and how these transformations are compatible (or not) with reform mathematics education as suggested by the National Council of Teachers of Mathematics (NCTM), and in turn, the new Georgia Performance Standards (GPS). The study employed Freirian participatory research methodology; in fact, the participants were not only coresearchers, but also co-authors of the study. Data collection included reflective essays, journals, and “storytelling”; data analysis was a combination of textual analysis and autoethnography. The findings report that the teachers believed that the course provided not only a new language but also a legitimization to transform their pedagogical philosophies and practices away from the “traditional” and toward a mathematics for social justice—a mathematics that is, indeed, compatible with the reform movements of the NCTM and GPS

    Paper 1: Becoming Critical Mathematics Pedagogues: A Journey

    Get PDF
    This session will report the findings of a study that explored the beginning transformations in the pedagogical philosophies and practices of three mathematics teachers (middle, high school, and 2-year college) who completed a graduate-level mathematics education course that focused on critical theory and teaching for social justice, and how these transformations are compatible (or not) with reform mathematics education as suggested by the National Council of Teachers of Mathematics (NCTM), and in turn, the new Georgia Performance Standards (GPS). The study employed Freirian participatory research methodology; in fact, the participants were not only co- researchers, but also co-authors of the study. Data collection included reflective essays, journals, and “storytelling”; data analysis was a combination of textual analysis and autoethnography. The findings report that the teachers believed that the course provided not only a new language but also a legitimization to transform their pedagogical philosophies and practices away from the “traditional” and toward a mathematics for social justice—a mathematics that is, indeed, compatible with the reform movements of the NCTM and GPS

    Secure exchange of information by synchronization of neural networks

    Full text link
    A connection between the theory of neural networks and cryptography is presented. A new phenomenon, namely synchronization of neural networks is leading to a new method of exchange of secret messages. Numerical simulations show that two artificial networks being trained by Hebbian learning rule on their mutual outputs develop an antiparallel state of their synaptic weights. The synchronized weights are used to construct an ephemeral key exchange protocol for a secure transmission of secret data. It is shown that an opponent who knows the protocol and all details of any transmission of the data has no chance to decrypt the secret message, since tracking the weights is a hard problem compared to synchronization. The complexity of the generation of the secure channel is linear with the size of the network.Comment: 11 pages, 5 figure

    Implementing Shor's algorithm on Josephson Charge Qubits

    Full text link
    We investigate the physical implementation of Shor's factorization algorithm on a Josephson charge qubit register. While we pursue a universal method to factor a composite integer of any size, the scheme is demonstrated for the number 21. We consider both the physical and algorithmic requirements for an optimal implementation when only a small number of qubits is available. These aspects of quantum computation are usually the topics of separate research communities; we present a unifying discussion of both of these fundamental features bridging Shor's algorithm to its physical realization using Josephson junction qubits. In order to meet the stringent requirements set by a short decoherence time, we accelerate the algorithm by decomposing the quantum circuit into tailored two- and three-qubit gates and we find their physical realizations through numerical optimization.Comment: 12 pages, submitted to Phys. Rev.
    corecore