Category: Law

homeland Security

Complete a briefing paper of 3-5 pages (double-spaced not including the title page, abstract, references or appendixes) on the following:

Should the U.S. Department of Homeland Security (DHS) recommend to the President and Congress to remove the Federal Emergency Management Agency (FEMA) from the DHS structure and make it an independent agency of the US Executive Branch? Discuss challenges facing FEMA responding to disasters. What strategies should be taken to lessen these challenges? 

Provide a short legal brief you might submit to your superiors.  The writing assignment should provide a balanced analysis of the issue assigned based on pertinent legal and other materials. The material for each assignment will come both from the required readings and outside research in order to fully assess the issues.

Technical Requirements:

Length: 3-5 pages, double spaced, 1″ margins, 12 pitch type in Times New Roman font

Citations/References:  You must use the APA style for this assignment.

TERRORISM AND DOMESTIC TERRORISM TACTICS AND VULNERABILITIES

Assignment Overview
The issue of homegrown terrorism and the recruitment and radicalization of local nationals to fight for others causes is major topic throughout the world. Supposed foreign fighters have fought for the current al Qaeda throughout the world. This is well documented on their information web sites and used as propaganda tools for financing, recruitment, and establishment of their credibility. Many of these recruits return to their homeland and perpetuate attacks against the establishment there.

Assignment
Cilluffo, Cozzens, and Ranstorp (2010) outline potential problems areas associated with the trend of western nationals going into troubled areas and becoming radicalized. Read this paper and using it with the many sources contained within, answer the following questions:

What tools and techniques do terrorist recruiters use to attract, interact with, and evaluate recruits?
Based on your research, how vulnerable does the U.S and Western Europe remain today to this type of recruitment and utilization? Explain your position.
How do terrorists use value analysis and vulnerability assessment in selecting their targets for an attack (for example, why would a terrorist choose to detonate a bomb at a crowded night club)?
Explain the Boyd loop and discuss its utility to counterterrorism officials seeking to interdict terrorists before they act to conduct a terrorist attack.

*Assignment Expectations
Length: This assignment should be at least 3 pages, not counting the title page and references.  Paper format: (a) Cover page, (b) Header, (c) Body. Including an Abstract page/opening. The abstract begins on a new page and includes the page header. The word Abstract (no bold, italics, underlining) is centered on the first line of the page.
On the next line begins a brief yet succinct summary (abstract) of the main points of the paper. The summary is a single double-spaced paragraph and is not indented. It is typically between 150 and 250 words and includes the research topic, research questions, participants, methods, results, data analysis, and conclusions. Please ensure to incorporate an introductory (different from abstract) and concluding paragraph.

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking). Use your own words and build on the ideas of others. When material is copied verbatim from external sources, it MUST be enclosed in quotes. The references should be cited within the text and also listed at the end of the assignment in the References section (preferably in APA format).

Organization: Subheadings should be used to organize your paper according to question.

Grammar and Spelling: While no points are deducted for minor errors, assignments are expected to adhere to standards guidelines of grammar, spelling, punctuation, and sentence syntax. Points may be deducted if grammar and spelling impact clarity.

The following items will be assessed in particular:

Relevance: All content is connected to the question.
Precision: Specific question is addressed. Statements, facts, and statistics are specific and accurate.
Depth of discussion: Present and integrate points that lead to deeper issues.
Breadth: Multiple perspectives and references, multiple issues and factors considered.
Evidence: Points are well-supported with facts, statistics and references.
Logic: Presented discussion makes sense, conclusions are logically supported by premises, statements, or factual information.
Clarity: Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity: Avoid use of first person and subjective bias.

***Required Reading

Boyd, J. (2011). Information warfare: OODA loop. Retrieved from http://www.valuebasedmanagement.net/methods_boyd_ooda_loop.html

Brandt, P. T. and Sandler, T. (2009). What do transnational terrorists target? Has it changed? Are we safer? Journal of Conflict Resolution. Retrieved from http://www.utdallas.edu/~tms063000/website/TargetSubstitution-20091003.pdf

Cilluffo, F. J., Cozzens, J. B., and Ranstorp, M. (2010). Foreign fighters: Trends, trajectories, and conflict zones. The George Washington University, Homeland Security Policy Institute. Retrieved from https://pdfs.semanticscholar.org/5609/d7acd4ded412e2d8ec54d31ac5a36ef74490.pdf

Silber, M. D., & Bhatt A. (2007). Radicalization in the West: The homegrown threat. New York City Police Department. Retrieved from https://sethgodin.typepad.com/seths_blog/files/NYPD_Report-Radicalization_in_the_West.pdf

Libicki, M.C., Chalk, P., & Sisson, M. (2007). Exploring terrorist targeting preferences. RAND Corporation. Retrieved from http://www.rand.org/content/dam/rand/pubs/monographs/2007/RAND_MG483.pdf

Mao, Tse-Tung (1937). On guerrilla warfare. Retrieved from http://www.marxists.org/reference/archive/mao/works/1937/guerrilla-warfare/ [classic]

Mostaghni, M. (2010). OODA loop. Infantry, 99(1), 49-50. Retrieved from ProQuest in the Trident Online Library.

The Al Qaeda Manual (2002). Department of Justice. Retrieved from https://www.justice.gov/sites/default/files/ag/legacy/2002/10/08/manualpart1_1.pdf

Privacy Policy | Contact

Business Law and Ethics

Please kindly go through the two presentations and then write the peer review.

Please avoid using “In this presentation” type of phrase in the comment. Instead, using “I agree…”, “You made a good point…” et al.

Need at least 1 source for each peer review response (must be the Journal Article published within 5 years)

International Investments in Saudi Arabia and Companies Law

please write me a literature review based on the text i will attach.

i will also attach literature review questions , references , rubric, and a sample literature review that has the same topic as mine .

Note: i already did the literature review someone else because i did not have time and he did it in a wrong way which got me a 37/100 as grade , so i will attach the comments that i got just to make sure that its fulfilled in the new literature review.

Any topic (writer’s choice)

First, the overall content of the paper is up to you.  You will have to complete part b, but I am much looser on how you decide to present your topic.  I provided part “a” as an example of what the typical paper structure is.  Keep in mind that it can not only be race/ethnicity and CJ. system, but also the: a) racial/ethnic analysis of a CJ-based law, policy, or punishment, b) the role of politics, media, public opinion, etc., or c) a more general topic such as the IAT testing, privilege, etc. — as it relates to the CJ system. 

a) choose one “race” or ethnicity and present it with regards to one aspect of the criminal justice system — providing the background of the relationship (statistics, journal article research, etc.).  For example, the police, the courts, juries, sentencing, the death penalty, juveniles, or any “race” or ethnic specific phenomenon (e.g. the semi-sovereignty of Native Americans).  You can also choose a particular crime or criminal phenomenon.  Also, do not hesitate to include “Whiteness” as your group.  The most important suggestion that can be made is to be specific — for example, do not just choose sentencing — choose one type of sentencing. The paper should be “researched” — including traditional and non-traditional resources with a background on the subject, statistics and other documentation to support your topic, and a social/policy suggestion for your topic.

b) Present a policy that you believe would improve the “problem” that is presented in section one (when I use the term “policy”, it does not necessarily have to be a formal, legal policy.  It can certainly be a social, cultural, or even “revolutionary” change).  Make sure it is specific and realistic. In this section, you have to have at least one scholarly journal citation that demonstrates that your policy is in line with someone’s research.  Also, present the (basic) steps that you would take in order to implement the policy suggestion.  In addition, present one major flaw or critique of your policy.
Your paper must be:

1. Typed
2. Double-Spaced, with numbered pages and traditional margins
3. Sizes 12 font (with the exception of courier font)
4. 8-10 pages
5. Late papers will receive a full grade deduction.  No papers are going to be accepted after May 10th @ midnight.
6. You may turn in your paper early with NO penalty.
7. You must have at least eight traditional sources (you can have more) that come from books, journals, etc. You must also have more traditional sources than non-traditional sources.  NO WIKIPEDIA, ABOUT.com, etc!!!! The Color of Justice book can count as one of the sources, if necessary.
8. YOU MUST CITE YOUR SOURCES– BOTH IN-TEXT AND IN A REFERENCE PAGE!!!!! (APA/MLA format)
9. You must have a title page that includes:

Your Name
Course
Instructors Name
Due Date
Title of the Paper
(in no specific order)

Answer the Following Questions Pt. 2

Answer the questions in the attachment titled “The Questions” in complete sentences. The due date for the assignment is still the same as the first one.

Powerpoints are attached to help you.

Be comprehensive and detailed in your approach.

Ensure the work is devoid of grammar and punctual mistakes and adheres to university or post-grad readability. Your tone of language should be sophisticated. If you do have any questions or concerns regarding the order, feel free to let me know, and I will respond to you as soon as possible.

db

Assignment Details

Security and loss prevention are other aspects of safeguarding property and taking action on those who participate in varying types of fraud.

Select only 2 of the following terms, and define each term:
Private security
Fraud
Identity theft
Fraudulent acts
Corporate loss
Loss prevention
Once defined, discuss your selected terms’ impact on the world of individual, retail, corporate, or business loss:

The Threat of Fraud

Assignment Details

You are an intern in the office of the director of Worldwide Security for a Fortune 500 credit agency, a Certified Fraud Examiner (CFE), and an active member of the Association of Certified Fraud Examiners (ACFE), who has in excess of 20 fraud investigators. You assist the director, as she makes presentations to universities throughout the country, as well as at professional conferences, about the dangers and true occurrences of fraud. You were just asked to review a case of identity theft of university professors, which started out as a couple of professors receiving unexplained bills. Within 1 month, 15 professors from all of the different departments started noticing unexplained charges and credit accounts on their credit reports. The new accounts took the form of credit cards, revolving credit accounts, car loans, school loans, and so forth. You were asked to help because you are an expert in the field.

In 34 pages, answer 5 of the following 7 questions. Support your answers with academic or real-life criminal justice examples to accentuate your point.

In your opinion, what would be your plan to review the case of identity theft toward the university professors? Why?
Do you think identity theft can be controlled? How would you propose to control it or at least slow it down?
How would you protect the college professors from any fraudulent acts against them after the identity theft has been discovered?
How would you identify all of the victims of identity theft? How would identifying all of the victims help you in your investigation?
What are some of the investigative methods that you would use to identify the perpetrators of the identity theft crimes?
If you were requested by the president of the college to create a loss prevention education workshop for the staff and professors, what would you include in the workshop? How would you evaluate the success of the lessons being presented in the workshop?
What punishment do you think the perpetrator should receive for his or her crime?

Historical and Political Overview

Select a country different from your own and prepare a paper for your colleagues to familiarize them with that countrys criminal justice system. Using scholarly journal articles, peer-reviewed sources, newspapers, magazines, or the Internet, write a 34page paper answering the following questions:

How is the system in the country you have chosen different from that of the U.S. system?
What are the similarities and/or differences historically and politically?
How do the cultural aspects of that country influence its system?

politics

Imagine you have been hired as a consultant for a client of your choice, and tasked with preparing a strategy report for a policy initiative important to your clients interests. Identify a current U.S. policy issue about which you would like to learn more, and a client with a stake in this issue on whose behalf you can research the issue. Prepare a report that explains contemporary debates around this issue and a range of potential policy solutions, and recommend a specific policy action your client can take to address this challenge.