Category: Law

criminal justice

Explain the concept of forensic science and its meaning in the criminal justice system.
What is anthropometry, and why did it fall short of its intended process?
What area of forensic science is Sir Francis Galton noted for advancing?
Why is Dr. Edmond Locard known as the Sherlock Holmes of France?
In 1903, a case of mistaken identity between Will West and William West in the Federal Penitentiary in Leavenworth, Kansas resulted in a switch from one method of inmate identification to a method that is still used today. What was it, and why did the switch occur?

criminal justice

Assignment Details

The appellate process is a cornerstone of a democratic criminal justice system. However, many people are unaware of the process that a case may undergo before it finds itself before the Supreme Court of the United States (SCOTUS). In fact, as you have read, not all cases reach the highest court in the land. In this activity, you are going to trace the path of a criminal case from the lower court by identifying the facts of the case, the ruling at the appellate court level, the key legal questions and how they relate to the Constitution, and the ruling in the case as made by the SCOTUS.

ECOL 100 Module 3 Discussion

For this discussion, read the following articles:

Hearts and minds: Stopping the slaughter of endangered species takes imagination. (2013). The Economist. Available in the Trident Online Library.
Illegal wildlife trade. (n.d.). World Wildlife Fund. Accessed August 16, 2016, at http://www.worldwildlife.org/threats/illegal-wildlife-trade.
What is the driving force behind the destruction of the elephant population? What other animal trades are mentioned on the World Wildlife site? Choose one to research further and describe the market demand for the product related to the animal at risk. Are any regulations in place? How are these regulations enforced? Do you think these regulations are effective at preserving biodiversity? Why or why not? Compare and contrast your findings with those of your classmates.

EDM402 Module 3 Discussion

Hurricanes and Tornados have a significant impact on both Public Safety Radio systems (Police, Fire, EMS, etc.) and Cellular Communications. What can be done to ensure communications do not fail following a severe wind event?

Remember to cite your sources and list your references.

bystander effect

Be sure to review the grading rubric and to include all of the required elements. For the Results section, briefly sum up, in words, what happened. Then refer the reader to your Table and Figure (i.e., “see Table 1”), and your field notes. The Table and Figure(s) go after the References section, one per page. After that come your field notes, which you will call “Appendix 1.” Everything should be copied and pasted into one Word document!  SEE Attachment for EXAMPLE.

Any topic (writer’s choice)

Instructions
The purpose of this assignment is to help you decide which scenario you want to address and to help you prepare for your research paper in Unit VII. Go ahead and choose one of the three scenarios (see Unit VII assignment and scenario list below) for your research, which must relate to how terrorism, genetic engineering, genocide operations, bio warfare, or cyber terrorism may affect our efforts to mitigate future attacks globally or internationally, as well as the moral and ethical implications of the use of such weapons of mass destruction in a terrorist attack of this magnitude. Additionally, the paper must address the capabilities and design of future attacks as well as the strategies we must develop to prevent or diminish the impact of such attacks. You are encouraged to truly think outside of the box instead of just repeating previous efforts from terrorist organizations.

From the reports of intelligence officers with the Central Region Command in Afghanistan, you can be assured that in addition to infrastructure attacks, terrorist organizations focus their attacks against educational and religious systems that they deem evil from their perspective.

Scenario One:

The election year is heating up with every new debate. You are the Police Chief of Atlanta. A debate has been scheduled in Chastain Park, which is the largest city park in Atlanta and consists of 268 acres of open terrain. The park is located near the northern edge of the city. The debate will be held at the Chastain Park Amphitheater, which has is designed to hold just under 7,000 people; not including the politicians and their personnel. You can search Google Maps (http://www.google.com/maps) for a map location of Chastain Park.

Your research must identify what federal and state agencies will be assisting you with the security for the event. You have been assigned the duty to provide a risk analysis of the physical facilities as well as provide your opinion of the probability of terrorist attacks against the politicians or the 7,000 participants within the amphitheater as well as those who will be in the park surrounding the amphitheater. You must ensure the safety of everyone attending the debate as well as those visiting the park. Your mitigation plan must address ingress and egress to and from the park and the amphitheater before, after, and during the event. Additionally, you must identify possible existing threats as well as the terrorist group responsible for those threats. You must identify all probable avenues of attack and develop a plan to prevent such attacks. Keep in mind, you must prepare for the worst-case scenario that can consist of any form of an attack including an attack from the ground or air, as well as long-distance attacks or pre-planted improvised explosive devices. Consider that thousands of people may die or be seriously injured if your plan fails to recognize all relevant scenarios or threats.

Scenario Two:

You are the head of a Homeland Security Investigative Task Force assigned to mitigate threats or possible terrorist attacks against the port area of San Diego. This includes numerous U.S. Navy vessels as well as a number of oceanic freighters, local fishing vessels, and pleasure yachts. You have received a threat from an unknown source stating that coordinated attacks are going to be launched against military and civilian targets in and around the San Diego area. The threat alludes to the use of nuclear missiles launched from vessels off the coast of San Diego. The source of the threats remains unknown, but intelligence points toward North Korea and Iran.

Your job is to identify the probable source of the threats as well as mitigate the numerous scenarios of attack that could stem from the Pacific Ocean, the Baja, the roadways entering San Diego from all directions, or from within San Diego. No specific terrorist group has given any notice of an attack.

You must identify all probable sources from which a nuclear missile could be launched. Since intelligence advises that neither North Korea nor Iran have long range capability, your search must be restricted to the immediate area. Additionally, all you know is that the attack is scheduled to occur sometime this month.

Identify all possible sources that could launch a nuclear missile and determine countermeasures that will empower your personnel to defeat the attack or attacks before they occur.

Your plan must include a worst-case scenario response plan to enable you to properly respond and deal with the blast effects from the attack should your personnel fail to stop the attack or attacks.

Scenario Three:

You are a senior officer in the U.S. Border Patrol and your intelligence group has received a warning that a terrorist cell is planning to launch an aerial biological attack across the southern borders of the United States, but the information you received does not identify a specific border area crossing point; therefore, you must create a plan to identify all probable entry points along the massive stretch of land that borders along Mexico and the United States. Additionally, you must plan to mitigate any attacks that could occur. Numerous scenarios can be identified, which include attacks by air, land, or by pre-planted improvised explosive devices, as well by other methods designed to release the biological hazard into the air or the local water supply system.

Your job is to identify all possible situations and provide a plan that will efficiently inspect and monitor each threatened area as well as possible sources of attack. Can you simply shut down all small plane traffic in the area? Could the biological hazard already be in place? Could the biological hazard be transported across the border through tunnels? What cities are probable targets for such attacks? What plans can you develop to ensure protection for all these cities? How far north can such attacks penetrate?

Your plan must include identification of all possible scenarios as well as your response plan based on the worst-case scenario providing proper response to the area or areas suffering from the attack as well as how you plan to protect first responders and healthcare facilities during and after the attack.

Also, for this assignment, you must include three sources that will be used for researching the Unit VII Research Paper. You are required to submit the scenario topic for your Unit VII Research Paper for approval. Provide a description of your topic and focus of your paper in the form of an abstract (at least 150 words) and provide a list of references you intend to use in your research. This may be subject to change since your topic and references will need approval by your instructor. Please contact your instructor if you have any questions or concerns.

The research paper topic assignment should be at least one page. Please forward your research scenario choice, abstract, and reference section to instructor as a single document.

Any topic (writer’s choice)

Instructions
Visit the following URL for additional information on the Federal Emergency Management Agency (FEMA), the National Incident Management System (NIMS), and the Incident Command System (ICS):

https://www.fema.gov/pdf/emergency/nims/nimsfaqs.pdf

NIMS and ICS play vital roles in emergency management response and resiliency and reactionary-based planning at the local, state, and federal levels. Further, in a chemical, biological, radiological, nuclear, explosive (CBRNE) event, both NIMS and ICS must be utilized.

In a two-page reflection paper, complete the following sections:

Part I: Explain the role and purpose of NIMS and ICS. Further, NIMS and ICS can be applied to most emergency incidents that occur to include weapons of mass destruction scenarios involving chemical, biological, radiological, nuclear, and explosive occurrences.

Part II: Create a table-top exercise incident involving a weapons of mass destruction event that can be administered at a law enforcement agency. Include the following: type of incident, agencies involved, location of incident, roles of agencies, how response should take place, and the role of NIMS and ICS. How is interoperability and resource management applied to your scenario? Finally, reflect on why table-top exercises are important to complete in the criminal justice and homeland security sectors.

Adhere to APA Style when creating citations and references for this assignment. APA formatting, however, is not necessary.

RESEARCH PAPER ON CORRECTIONS OR ALTERNATIVES TO INCARCERATION

RESEARCH PAPER ON CORRECTIONS OR ALTERNATIVES TO INCARCERATION

I would like to voice against incarceration.
You will complete an 8- to 10-page paper.
You will be asked to make an argument in favor of an alternative to incarceration, or a critique of some aspect of corrections, grounded in theories of corrections, and you will develop a thesis, an outline, conduct library research for sources.
 
4-5 scholarly sources.
MLA formatting
(12 times new roman font)

Any topic (writer’s choice)

Instructions
Part one of the research paper requires you to submit your topic for review and approval by your instructor. You must identify a domestic pre-9/11 terrorist event and a domestic post-9/11 terrorist event that will be the focus of your research paper.

Note: The two terrorist events that are selected must have occurred at least five years apart. In addition to identifying the two terrorist events that will serve as the basis for the research paper, you must provide a brief description that explains why you believe the selected events will serve as a good comparison for evaluating how terrorist activities have evolved over time.

Your research paper topic must be at least one page in length, using Times New Roman 12-point font, double-spaced. You are not required to cite resources for this assignment, and a reference page is not required; however, you should keep notes on interesting resources and their locations as you find them for the Annotated Bibliography in Unit V and Research Paper in Unit VII.

TERRORISM AND DOMESTIC TERRORISM TACTICS AND VULNERABILITIES S

This module has introduced you to terrorist tactics and targeting. Recommend you read Maos book and the Al Qaeda manual. These two sources along with many others available for free on the internet invite persons and groups to imitate, motivate, plan, and act in accordance with their motivations. Understanding this capability and resource, this SLP will be historical in intent. The student will research one of the key domestic terror events or identified person who was charged with the perpetuation of the event. And then answer the basic questions outlined in this module.

Select one of the following events/person: the 1993 World Trade Center Bombing, the Oklahoma City Bombing, the Unabomber, the Centennial Olympic Park Bombing, 2001 Anthrax Attacks, or the Fort Hood Attack.

Project

Explain the following:

What was the target/s?
Why was it selected?
What tactics were used?
What tools were used?
What were the expectations?
What were the outcomes of the events; e.g., media coverage, public acceptance, goals achieved?
What vulnerabilities were recognized and mitigated after the event? Or, were they?
The following items will be assessed in particular:

Your ability to comprehend the historical (past, present and future) significance of the event you selected in the overall U.S. Domestic Terrorism paradigm and the potential differences in response and acceptance for and from this group/individual compared to others in the spectrum.
Some in-text references to modular background readings (APA formatting requested) and a reference page.

*Assignment Expectations
Length: This assignment should be at least 3 pages, not counting the title page and references.  Paper format: (a) Cover page, (b) Header, (c) Body. Including an Abstract page/opening. The abstract begins on a new page and includes the page header. The word Abstract (no bold, italics, underlining) is centered on the first line of the page.
On the next line begins a brief yet succinct summary (abstract) of the main points of the paper. The summary is a single double-spaced paragraph and is not indented. It is typically between 150 and 250 words and includes the research topic, research questions, participants, methods, results, data analysis, and conclusions. Please ensure to incorporate an introductory (different from abstract) and concluding paragraph

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking). Use your own words and build on the ideas of others. When material is copied verbatim from external sources, it MUST be enclosed in quotes. The references should be cited within the text and also listed at the end of the assignment in the References section (preferably in APA format).

Organization: Subheadings should be used to organize your paper according to question.

Grammar and Spelling: While no points are deducted for minor errors, assignments are expected to adhere to standard guidelines of grammar, spelling, punctuation, and sentence syntax. Points may be deducted if grammar and spelling impact clarity.

The following items will be assessed in particular:

Relevance: All content is connected to the question.
Precision: Specific question is addressed. Statements, facts, and statistics are specific and accurate.
Depth of discussion: Present and integrate points that lead to deeper issues.
Breadth: Multiple perspectives and references, multiple issues and factors considered.
Evidence: Points are well-supported with facts, statistics and references.
Logic: Presented discussion makes sense, conclusions are logically supported by premises, statements, or factual information.
Clarity: Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity: Avoid use of first person and subjective bias.

***Required Reading

Boyd, J. (2011). Information warfare: OODA loop. Retrieved from http://www.valuebasedmanagement.net/methods_boyd_ooda_loop.html

Brandt, P. T. and Sandler, T. (2009). What do transnational terrorists target? Has it changed? Are we safer? Journal of Conflict Resolution. Retrieved from http://www.utdallas.edu/~tms063000/website/TargetSubstitution-20091003.pdf

Cilluffo, F. J., Cozzens, J. B., and Ranstorp, M. (2010). Foreign fighters: Trends, trajectories, and conflict zones. The George Washington University, Homeland Security Policy Institute. Retrieved from https://pdfs.semanticscholar.org/5609/d7acd4ded412e2d8ec54d31ac5a36ef74490.pdf

Silber, M. D., & Bhatt A. (2007). Radicalization in the West: The homegrown threat. New York City Police Department. Retrieved from https://sethgodin.typepad.com/seths_blog/files/NYPD_Report-Radicalization_in_the_West.pdf

Libicki, M.C., Chalk, P., & Sisson, M. (2007). Exploring terrorist targeting preferences. RAND Corporation. Retrieved from http://www.rand.org/content/dam/rand/pubs/monographs/2007/RAND_MG483.pdf

Mao, Tse-Tung (1937). On guerrilla warfare. Retrieved from http://www.marxists.org/reference/archive/mao/works/1937/guerrilla-warfare/ [classic]

Mostaghni, M. (2010). OODA loop. Infantry, 99(1), 49-50. Retrieved from ProQuest in the Trident Online Library.

The Al Qaeda Manual (2002). Department of Justice. Retrieved from https://www.justice.gov/sites/default/files/ag/legacy/2002/10/08/manualpart1_1.pdf