Free Essay

Prison System Comparison

In:

Submitted By ywbbabygurl1
Words 1193
Pages 5
Prison System Comparison The purpose of state prisons and federal prisons is to confine offenders who commit an illegal act (breaking the law) against society. State prisons are for offenders who commit a criminal act or acts within that particular state. The federal prisons are for offenders who commit white-collar crimes, for political criminals, illegal aliens, and such. Both the state prisons and the federal prisons have different levels of security, depending on the crime committed and the seriousness of the crime- causing physical harm to someone or self, murder, rape, drug trafficking, and so on. The state prisons and the federal prisons considers the institutional needs of each inmate, called the initial classification, a determination on the level of security an inmate needs. Classification “determines what prison he will be sent to, what security level he will be housed in, what his work assignment will be, and what programs he will be allowed to take part in,” (Foster, 2006, p. 160). State prisons hold the majority of inmates compared to that of the federal prisons, at various levels of security. These levels of security include open security facilities to super-maximum security prison, differing slightly between the state prisons and the federal prisons. Both the state and the federal prisons deal with overcrowdings and inmates and staff suffer with safety and health issues. Because of the “War on Drugs,” more, and more people are sent to prison serving longer prison terms, which in turn increases the prisons population. In addition to the increase are the parole violators and the violent criminals Starting back in 1785, prisons were to incorporate “principles of isolation, work, and penitence to change the nature of confinement,” (Foster, 2006, p. 120). Through the reform eras, state prisons have upgraded to better lighting, better management of prison labor, and developed work camps for prisoners. As of today, the expansion of prisons increased as the population of inmates increased. Such expansions was to include facilities for women, juveniles, and drug addicts among other, in addition to those of less serious crimes to the most serious of crimes. This expansion included security levels to impose on inmates of certain crimes. The security levels for state prisons are as followed: Super-maximum security prison- this is the highest level of security, for those who are a high security risk such as a threat to international and national security, or dangerous to the world on the outside (and inside), to name a couple. These inmates are in single cell solitaire confinement 23 hours a day with about an hour in the exercise yard alone. The inmates have minimal contact with others and are under surveillance at all times.
Maximum security prisons- this is the second highest level of security, similar to that of the super maximum security prisons. It has the lowest inmate to guard ratio, and it houses prisoners who are the most dangerous to the community, prison staffing, and other inmates. Inmates are in his or her cell for 23 hours a day with around an hour to exercise and shower. The Prisoners are highly under surveillance at this level as like the super maximum level.
Close-High security prisons- this level of security is less restrictive than that of the maximum security level. This facility is double-fenced with watch towers and gun men. Although the movement of inmates is minimal, he or she is allowed out of the cell to work, attend programs, shower, and exercise.
Medium security prisons- these facilities have dormitory like cells, sharing with numerous of other inmates. Inmates sleep in military like style bunk beds. It has watch towers, gun men, and double fencing, although is less restrictive compared to that of the close-high security prisons with less supervision and control over the internal movements of inmates. Most offenders start out in this security level if not a threat or dangerous to anyone.
Minimum security prisons- this security level prison has single perimeter fencing, no watch towers, or wondering gun men. Also unlike the medium security prison, far less supervision is necessary. These inmates pose the least amount of risk to public safety. Inmates participate in community work assignments and prelease transition programs, to name a few.
Open security facilities- this facility is somewhat like the minimum security prison, better known as a halfway house, work release centers, or other types of community-based facility. No armed guards or fencing are within this facility. If a prisoner tries to leave or escape, he or she is sent to a maximum security prison as an escape risk.
The state prison system “agree that only about 15 to 20 percent of prisoners require maximum-security; the rest do fine with less,” (Foster, 2006, p. 125). Each state prison is slightly different from one another when determining which level of security to confine an inmate too. The newer prisons are smaller, more relaxed, and the design is more modern as well as the amenities.
In the past, inmates who committed a federal crime were put in a state prison facility. As federal crime rose, so did the overcrowdings of state prisons. Because of the overcrowding issues, a federal prison opened up for those who committed a federal crime. As time has passed, more, and more federal prisons opened up. The levels of security, very similar to the state prisons’ levels, are as followed:
Minimum security prisons- this is a federal prison camp for those who commit less serious crimes and is not a dangerous risk to others or self. This federal prison level is similar to the state minimum security level prisons.
Low security prisons- these prisons have double fencing and similar to dormitory like housing units, also similar to that of the state medium security level prison
Medium security prisons- these prisons have cell housings, more internal control over inmates, and stronger perimeters. This prison is similar to the states close-high security prisons.
High security prisons- again this prison is similar to the states maximum security prison. This prison has around the clock guards, and the inmates are more of a risk to others. Inmates have little to no interaction with others, in confinement most of the day.
Administrative security- this prison includes those of special inmates- illegal aliens, medical cases, and so on, which houses the highest security threat inmates. This federal security level is similar to the states maximum security or super maximum security level prisons.
Those who have committed a federal crime such as white-collar crimes or drug trafficking, serve more time behind bars, limiting the use of probation. For good time behavior, “federal inmates now serve 85 percent of their actual sentencing, getting no more than a 15 percent sentence reduction for good behavior,” (Foster, 2006, p. 140). Comparing the federal prisons to the state’s prisons, federal prisons have less violent criminals versus those who commit robbery, kidnapping, murder, and so on, in the state prisons. Federal prisons consist of white-collar criminals and political criminals whereas state prisons do not deal with them.

Reference
Foster, B. (2006). Corrections: The Fundamentals. Upper Saddle River, NJ: Prentice Hall.

Similar Documents

Free Essay

Ext2,Ext3,Ext4

... Introduction What is an Ext2 file system ? The Second Extended File System (EXT2) file system is a replacement of the Extended File System (EXT). The file system was created by Rémy Card in 1993. EXT2 was the default file system for Linux until EXT3 came along. EXT2 still is a favored file system for Flash and USB drives due the lack of journaling. Journaling requires more writes to the storage unit and can be slow on these external devices. The Flash and USB drives have a limited number of write cycles. The file and space limitations are as follows: Block Size: 1KB 2KB 4KB 8KB File size: 16 GB 256 Gigabytes 2 Terabytes 2 Terabytes File system: 4 Terabytes 8 Terabytes 16 Terabytes 32 Terabytes The directory and file structure is not indexed, so searching within a directory with a large amount of files can be time consuming. EXT2 allows for a patch to be added which is an add-on (e2compr) to allow file compression. Compression is a method which compresses files on the file system to save space. Compression can also increase read speeds from the storage unit. Files and directories are stored within Inodes. The date ranges for timestamps can only go as high as January 18, 2038. Once this date is reached, the EXT2 file system will no longer store proper timestamps. Either other file systems must be used or a patch must be applied, if one exists. What is an Ext3 file system ? The EXT2 file system was extended by Stephen Tweedie in 1998 to...

Words: 5604 - Pages: 23

Free Essay

Linux

...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................

Words: 17681 - Pages: 71

Premium Essay

This Is Not a Test

...recursively change user, group and other permissions on files/directories * chown - options to recursively change file and directory user ownership * chgrp - options to recursively change file and directory group ownership * kill - superkill vs sending other signals to a process * ps - options to list all running processes on a Linux/Gnu system * top – Interactive Linux Tasks Status Display * grep - know how to use to find specific lines of info in output/files (you should have learned about this command in Intro to Unix/Linux Systems.) Shell expansion characters - be able to respond to questions regarding usage of '*' - asterisk, all files or all matching strings '?' - question mark, single character  What are the components of a Linux distribution? * Kernel * Desktop Environment * System Libraries * System Tools * Developmental Tools * File Structure Popular Distributions:  * Redhat,  * CentOS * Fedora  * Suse * Debian * Ubuntus What sort of hardware architecture can Linux be installed on? * Intel-x86 systems * Embedded systems From what sources can Linux be installed? * CD- ROM * Hard Disk * Floopy Disk * USB * Network Installation * ftp * http * nfs Who created the Linux Kernel? What does open source mean? Where is the kernel stored on a CentOS distro (/boot), What is its name (bzImage, vmlinuz).  * Linus Torvalds – Creator in...

Words: 4587 - Pages: 19

Free Essay

Nt1410 Exercise 3-1

...file systems. With Windows and Linux primarily being used on desktop computers, the amount of storage as well as the overall performance is better than Android file systems. Android still puts up a good fight considering it is mainly tablet and smartphone based. Let’s explore these filing systems for these three power houses in this computer based era. Windows file system has been around for a very long time and with age comes the ability to fine tune their file systems. There are 3 different file systems available for Windows. They are NTFS, FAT32, and FAT or FAT16. The NTFS is the preferred system due to its many benefits. The NTFS offers the user the ability to recover from some disk related errors automatically, improves support for larger hard disk, as well as has a better security because you can set permissions as well as encryptions to keep files safe. NTFS was introduced in Windows NT and at present is major file system for Windows. This is a default file system for disk partitions and the only file system that is fortified for disk partitions over 32GB. The file system is quite extensible and fortifies many file properties, including access control, encryption etc. Each file on NTFS is stored as file descriptor in Master File Table and file content. Master file table contains all information about the file: size, allocation, name etc. The first and the last sectors of the file system contain file system settings (boot record or superblock). This file system uses...

Words: 999 - Pages: 4

Premium Essay

Linux

...Review Questions Chapter 6: Host Hardening 1. To know how to install an operating system with secure configuration options, you would use a... a. security baseline b. standard c. security template d. wizard 2. A systems administrator’s main role is to… a. manage a network b. implement security baseline on servers c. None of the above 3. In a Windows network, which of the following could be used to implement security measures on multiple computers through a domain? a. Policy Maker b. GPO c. Domain ACL 4. LINUX distributions are standardized which makes them easier to manage a. True b. False 5. Which of the following is true? a. A particular version of UNIX will offer multiple user interfaces. b. All UNIX user interfaces are command line interfaces c. Both of the above. d. Neither a. nor b. 6. UNIX command-line interfaces are called _____. a. versions b. distributions c. GUIs d. shells e. windows 7. Routers are sometimes hosts. a. True. b. False 8. Cisco’s operating system for its routers and most of its managed switches is... a. IOS b. UNIX c. LINUX d. Windows 9. To apply patches in Windows 2000 and later versions of Windows, you choose an option on the _______ menu. a...

Words: 445 - Pages: 2

Premium Essay

Windown vs Linux

...CRITICAL COMPARISON: WINDOWS VS. LINUX This report is a critical comparison of the computer operating systems (OS), Windows and Linux. It is written for an average audience that uses a computer almost everyday and is now curious to know which operating system is better. The audience is assumed to have sufficient knowledge to understand the various aspects of an OS, but is not aware of the specific details of each OS. This report analyzes the different features of both operating systems in order to arrive at a conclusion on which OS is better for daily use. Both systems are evaluated on a wide range of criteria such as cost, installation process, software applications, hardware, user interface, security/stability, troubleshooting, and the implementation of the OS itself. These will help decide which of the two systems is better to use on a daily basis. Before I begin the comparison the reader needs to know that Windows is created, maintained, and updated by Microsoft. No one from outside can access the underlying code. However, Linux is created and updated by volunteers all over the world, which is why there are so many different variations of Linux like Red Hat, SuSE, MandrakeSoft and a few more. The important features of the operating systems are discussed below. COST The Windows operating system is significantly more expensive than the Linux operating system. In fact, the...

Words: 1216 - Pages: 5

Free Essay

Pfch Data Center Unification Project

...is a proprietary brand typically run in large organizational infrastructure. However, many of the UNIX variants are open source that allow users to customize their distribution as they see fit and making copies to install in an unlimited number of machines. UNIX offers a highly stable operating system (OS) that is ideal for full multitasking capabilities while protecting memory to prevent interference with other users. The stability provides greater uptime for increased productivity and less downtime for crash recovery and troubleshooting (Montpelier Open Source, n.d.). UNIX has been the baseline for Internet services and growth where machines on network can operate as clients and servers. Linux is a variant of UNIX and has established itself in the desktop, workstation, and increasingly in the server environments. A key benefit for Linux is the scope of freedom of distributions (distros) that provide many applications, freeware, and add-ons (Stanford University, 2004). Linux is extremely portability to a wide range of new and old machines. The majority of Linux variants are available free or at an economical price compared to Microsoft Windows. Linux is a very secure operating system and although it still can be prone to attacks, it inherently is more secure than Windows. Another huge benefit is the reliability of UNIX and Linux versions that can often run for months without the need to reboot. UNIX and Linux Disadvantages The learning curve for Command Line Interface (CLI)...

Words: 1984 - Pages: 8

Premium Essay

Windows vs Linus

...Windows VS Linux. Ronald Prasad When it comes to computers, majority of the users tend to prefer windows based systems rather than Linux. While Linux has its own qualities like been open source licensed, Windows on the other hand is more user friendly and also has great Hardware supporting compatibilities. Linux is an open source licensed operating system, which basically means that it’s free for everyone to download, free of cost, and modify it without any need of a licenses. Since it’s totally free there is no guarantee of its reliability or customer support to help deal with technically problems. Whereas compared to Windows, which costs about $99-$199 for Windows 8 version, although it does not come cheap, but it provides a guarantee of its reliability and customer support. Windows operating systems are much more user friendly, especially the Windows 8 version, which has excellent user interface, which allows users to navigate, explorer, trouble shoot with very little difficulty. Whereas Linux has a very complex look and puts more emphasis on usage commands in Terminal Window usage instead if using the interface, e.g. To install updates on Linux, sudo apt-get upgrade command must be type in the Terminal Window whereas is Windows getting updates is easily done with just few mouse clicks in the Control Panel. Windows supports most motherboards, mice, hard drives, keyboards, network cards, DVD drives, flash drives and monitors. Since these hardware’s mostly comes with only...

Words: 329 - Pages: 2

Premium Essay

Application Testing Checklist

...|Application Testing Checklist | |Tested By |Mark Tester |Date |8/11/12 | |Application Name |2008 SQL Management Studio | |Procedure |Expected Result Achieved |Pass/Fail |Actual Results/Comments | | | |(P/F) | | |Application Functionality | |Performs primary functionality and |Yes |P |Updating and maintaining databases with access | |maintains stability | | |to run commands as needed. | |Windows Fundamentals | |Installs under a user account |No |P |Does not install under student user account | |Installs under a power user account|Yes |P |Installs correctly | ...

Words: 17249 - Pages: 69

Premium Essay

Forensics

...paper was to analyze three anti-forensic techniques for potential methods of mitigating their impact on a forensic investigation. Existing research in digital forensics and anti-forensics was used to determine how altered metadata, encryption, and deletion impact the three most prominent operating systems. The common file systems for these operating systems were analyzed to determine if file system analysis could be used to mitigate the impact of the associated anti-forensic technique. The countermeasures identified in this research can be used by investigators to reduce the impact of anti-forensic techniques on an investigation. Also, the results could be used as a basis for additional research. File system analysis can be used to detect and mitigate the impact of the three methods of anti-forensics researched under the right circumstances. Some areas of anti-forensics and file systems have been relatively well-researched. However continued research is necessary to keep pace with changes in file systems as well as anti-forensic techniques. Keywords: Cybersecurity, Albert Orbinati, Windows, Linux, Macintosh, file table. MITIGATING THE IMPACT OF ANTI-FORENSIC TECHNIQUES THROUGH FILE SYSTEM ANALYSIS by Gabriel A. Flynn A Capstone Project Submitted to the Faculty of Utica College August 2012 in Partial Fulfillment of the Requirements for the Degree of Master of Science Cybersecurity – Intelligence & Forensics © Copyright 2012 by Gabriel Flynn All Rights Reserved ii ...

Words: 11835 - Pages: 48

Free Essay

Ext2Vsext3Vsext4

...TERMPAPER OF CSE316 Subject:-OPERATING SYSTEM Submitted To:- Faculty member : Amritpal Singh Submitted by:- Name of student : Omkar Kumar Section : K1108 Roll no : B26 Registration number : 11114390 INTRODUCTION FILE SYSTEM Ans. A file system (or filesystem) is a method to organize a data expected to return after a program terminates by providing procedure to store, retrieve and update data, as well as manage the available space on the device(s) which contain it. A file system organize data in an efficient manner and is tuned to the specific characteristics of the device. File systems can be used on many different kinds of storage devices. Each storage device uses a different kind of media. The most common storage device in use today is a hard drive whose media is a disc that has been coated with a magnetic film. The film has ones and zeros 'written' on it sending electrical pulses to a magnetic "read-write" head. Other media that are used are magnetic tape, optical disc, and flash memory. In some cases, the computer's main memory (RAM) is used to create a temporary file system for short term use. Some file system are used on local data storage devices; others provide file access via a network protocol (e.g. NFS,SMB, or 9P clients).Some file systems are “virtual”, in the “files” supplied are computed on request...

Words: 5740 - Pages: 23

Free Essay

Unix

...Carrier Objective: Obtaining a challenging career in the field of Information Technology as a Unix/Linux Systems Administrator to utilize the knowledge that I have gained through past years of experience in various industries such as Telecommunications, Banking, Medical, Insurrance and government establishments . Qualification Summary: 5 Years of Unix experience with overall 10+ years of experience in the field of Information technology. Master's Degree in Micro-Electronics & Diploma in Computer Sciences. Specialize in following: Unix Administration on Sun Solaris and Red Hat Linux environment. VERITAS Volume Manager and Cluster Server experience. Websphere Application Server experience Virtualization Technologies VMware ESXi 5 Large 24x7 mission-critical production environment experience. Unix Administration, maintainance providing support in an enterprise enviroment (Resolved, escalated and dispatched technical issues) Experience with EMC/Openfiler SAN,configured and Managed SAN storage for Vmware Vsphere enviroment . Communication skills in handling diversified activities like Customer Support, in various capacities from front-end field engineer to the present capacity working. Well versed with Incident resolution and Change Management process. Performing Datacenter administration ( HP/SUN Servers including C7000,M4000, M5000, T5220, T5240, V440, V480/V490, V880/V890, E4500, E6500) tasks such: Backups, restore, Tape Management, Installation, Upgradation & Decommission...

Words: 1089 - Pages: 5

Free Essay

Blah

...Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………. 29 Things to do after installing Ubuntu 10.04 …………………………………………………………………………………………. 37 Journal Post (9/21) …………………………………………………………………………………………………………………………….. 45 How to make Ubuntu look like a Mac ………………………………………………………………………………………………… 46 Journal Post (9/28) …………………………………………………………………………………………………………………………….. 50 Journal Post (10/6)...

Words: 17866 - Pages: 72

Premium Essay

Is/Pm 535 Assignment #1 Analysis of It Cost Structure

...IS/PM 535 Assignment #1 Analysis of IT Cost Structure This assignment requires you to apply your knowledge about responsibility centers, cost drivers, and cost structure (classification and behavior) in the context of four types of services provided by an information technology organization: 1. IT help desk service 2. E-Mail Service 3. Enterprise systems (e.g., financial, HR, DePaul’s student registration systems ) 4. Website development service. Follow these steps in your analysis: 1. Define the scope and the financial objective of each service. 2. Organize each IT service as a cost or profit center. You may provide some assumptions about the service in your explanation. 3. Identify typical cost drivers for each service. Choose one or two appropriate cost drivers. Remember: cost drivers cause variable costs to change. Among many potential cost drivers, which ones are most appropriate? 4. Identify 4 or more cost items for each service (cost object). Typical costs items are labor, material (equipment, etc.), overhead (electricity, etc.). You can use exercise #1 in worksheet #1 as a reference, although that example is more specific on focus group sessions. Be specific. 5. Identify the cost structure for resources required to deliver each identified service (Direct/Indirect and Fixed/Variable). 6. Provide a brief comment to explain any unique perspectives. Requirements **Present your analysis in the following order: Name of service (cost object) Definition:...

Words: 542 - Pages: 3

Free Essay

Help Desk Implementation

...Implementation of Packaged Software for Complaint Registration System Submitted by Arun Kabra Roll No: 11BM60046 Vinod Gupta School of Management IIT Kharagpur Problem statement: The main focus of any business is its customers. Any business issue raised by the customer needs to be addressed and resolved with the top most priority. The customer should be able to raise issues comfortably on the site. With this focus at hand the CEO of an online DVD rental organization wants to implement a complaint management system which can be used by both existing customers and new customers who would register on site before raising a ticket. These complaints needs to be created for different departments or business units and would be resolved by dedicated staff from each department. The staff should be able to create, update, track and close an issue based on privilege level granted. All the registered customers should be able to see announcements and messages regarding changes after they login to helpdesk. Along with these provide FAQ to generally asked question by customers so that they can refer to common issues and their resolution before raising a ticket. Evaluation of Software options: Following 3 software were considered for the above mentioned business problem 1) Exo PHP Desk 2) osTicket 3) Trellis Desk Features | ExoPHP Desk | osTicket | Tresllis desk | Web Hosting | | | | DB | MySQL | MySQL | Propriety | SSL security configuration | |...

Words: 570 - Pages: 3