What are some unwanted outcomes of hardline policies on the evolution of drug trafficking, organized crime and gangs in Latin or Central America (e.g. Mexico, Colombia, El Salvador)?

ASSIGNMENT

Conduct research on deterrence research and crime opportunity theories (pros/cons of various hardline strategies). Prepare a power point presentation, summarizing your main findings (6 to 10 slides). Always cite sources in slides. Choose one of the topics below, and applying theoretical concepts covered in class.

Suggested debate topics:

  1. What does empirical research tell us about the following statement: Better security screening at airports and building a border wall is an effective mechanism to deter transnational crime (e.g., drugs, arms, humans) because it is hardening the target and increasing the risks for the offenders. It is cost-beneficial to invest in such policies because they deter offenders and lead to decrease in various types of transnational crimes (potentially also terrorism). People are rational offenders that calculate costs and benefits. Walls and airport security increase the risks of offending and harden the targets and therefore deter offenders from committing serious crimes. Provide various examples and refer to empirical studies on this topic. Discuss both sides of the argument.
  2. What are some unwanted outcomes of hardline policies on the evolution of drug trafficking, organized crime and gangs in Latin/Central America (e.g. Mexico, Colombia, El Salvador)? Discuss some hardline (zero tolerance) approaches implemented in the region to reduce/control drug trafficking and discuss the pros and cons of such tough on crime strategies. Explain your position and provide various Are such strategies effective? What are the weaknesses? Discuss both sides of the argument.
  3. Discuss the debate on Singapore’s new discretionary death penalty for drug couriers. Are tough on crime policies for drug traffickers – including severe punishments, long term prison sentences and even the death penalty effective and lead to reduction of drug trafficking/drug use. Discuss the effects of zero tolerance policies on drug use and drug trafficking. Provide various examples and refer to empirical studies. Discuss both sides of the argument.
  4. Elaborate on the focused deterrence approach (e.g., Kennedy, etc.) to gang violence, the strategies associated with it, and then present some results that this strategy has achieved in the past decade. Elaborate on the long-term success/feasibility of such strategies. Provide examples and refer to empirical studies. Provide various examples and refer to empirical studies. Discuss both sides of the argument (pros/cons of focused deterrence strategies).
  5. Does the arms trade do more to harm Human Rights than it does to defend National Security? Should US implement stricter gun control laws and how will (and if) that affect arms trafficking in the US (and/or other regions affected by the US trade)? What are the consequences of such policies? Provide various examples and refer to empirical studies. Discuss both sides of the argument.
  6. Are severe punishments (e.g. forms of torture, death penalty, life terms prison sentences, etc.) effective in obtaining useful information from terrorists and thus effective methods in the fight against terrorism. Can we reduce terrorism with hardline policies? What are some unwanted consequences of such approaches? Provide various examples and refer to empirical studies. Discuss both sides of the argument.
  7. Can we reduce serious violations of human rights (including genocide and crimes against humanity) by introducing hardline policies targeting heads of states? Will long term prison sentences for example reduce such future violations (and also the fact that we now have International Criminal Court to prosecute such crimes)? Provide various examples and refer to empirical studies. Discuss both sides of the argument.

Format

  1. Introduction: state your main argument (purpose statement).
    2. Background: Information necessary for the reader to understand what you are talking about.
    3. Lines of Argument: Present evidence in support of your argument (views/research in support of specific policies). List the evidence in order of importance—closely following the evidence that you find to exist.
  2. Refutation of Opposing Arguments: Consider and address opposing points view and some arguments in favor of other policies
  3. Discussion: Discuss the pro and against arguments related to specific policies/arguments and state your opinions.
  4. Conclusion: summarize your argument and its implications.

 

When completing an initial assessment for a client with suicidal ideation, what are the most important pieces of information that should be captured?

Video on YouTube: I Jumped off the Golden Gate Bridge

Please watch the video and answer the following questions:

  • Did this video change your opinion on suicide?
  • What did the video teach you about suicide?
  • When completing an initial assessment for a client with suicidal ideation, what are the most important pieces of information that should be captured?

 

Describe the symptoms you observed that led you to believe the inmate was under the influence of a drug.

Imagine you are a corrections professional working in a prison. You come across an inmate who appears to be under the influence of a drug. You take action against the inmate and immediately remove him from the rest of the population. You must now justify your actions through a presentation to your immediate supervisor.

Obtain an instructor-assigned drug from the following list:

HeroinCreate an 6- to 10-slide Microsoft® PowerPoint® presentation explaining the situation and justifying your actions to your supervisor. Include the following:

Describe the symptoms you observed that led you to believe the inmate was under the influence of a drug.
Describe the physiological effects of the drug you believe the inmate used.
Describe the possible consequences of leaving the inmate with the general population.
Explain why you do or do not believe other inmates are using the substance, as well.
Propose a plan for determining if the substance is being sold within the prison.

Include detailed speaker notes.

Include a minimum of two sources.

Format any citations in your presentation consistent with APA guidelines.

Name and describe 5 likely sources of DNA evidence.

Physical evidence may be comprised of solid, liquid, and in some cases, gas whose presence or lack of presence is evidence of the actions occurring during the commission of a crime. Crime Scene Investigators (CSIs) must have the training and experience to recognize items of potential evidence at the scene to preclude collecting materials that have no significant meaning concerning the investigation. Training should include the knowledge of what abilities the crime laboratory has and what potential information may be gleaned from identified evidence. CSI personnel must be able to identify items of evidence that they may not have the expertise to interpret and at the same time, they must have the knowledge on who has that expertise so that they can be called in to assist in the crime scene processing.

Discuss the following in your main post:

Name and describe 5 likely sources of DNA evidence.
In terms of seizing and processing items of physical evidence at the scene, what critical aspects should be priority?
When may evidence be removed from a crime scene?

Explain why comments made on social media are so impactful on the emotions of the victim. Identify the types of cyber-crimes that may ultimately lead to a physical crime against the victim

Computer technology has provided the criminal justice system with a number of benefits such as program algorithms that identify scanned fingerprints and facial recognition. It has increased intelligence and record keeping capabilities. However, it has provided literally millions of potential victims of crime. It started out with financial crimes (such as fraud and ransom software), and it progressed to coaxing victims to locations for murder, rape, and kidnapping. Victims of computer crimes include the criminal using social media as a weapon.

The commander of a newly formed cyber-crime unit is very knowledgeable about fraud and various financially motivated viruses. The one thing he is not that familiar with is the impact that social media has on victims of crimes such as cyber bullying and cyber stalking.

The commander has you temporarily attached from the human trafficking and sex crimes unit to bring his cyber teams up to date on how to understand what cyber victims of stalking and bullying are going through and how best to approach them for maximum effective investigation.

Devise a plan on explaining the aspects of cyber bullying and cyber stalking to the cyber-crime unit.

Focus your discussion on the following:
Explain why comments made on social media are so impactful on the emotions of the victim.
Identify the types of cyber-crimes that may ultimately lead to a physical crime against the victim
Advise the cyber-crime unit team members on what types of assurances should they provide the victim to obtain his or her cooperation in the investigation and to ultimately keep him or her safe.

List and explain the two aspects of the definition of a gang member.Detail Miller’s six characteristics of a gang.Discuss and explain how secondary and tertiary gang prevention works.

List and explain the goals of school that affect delinquency.

List the issues associated with juvenile delinquency, according to your text.

Describe some ways in which bullying is implemented within the school system.

Discuss some of the reasons youths have for dropping out of school.

Explain why a school might be unable to meet the needs of all its students.

List and explain the two aspects of the definition of a gang member.

Detail Miller’s six characteristics of a gang.

Discuss and explain how secondary and tertiary gang prevention works.

Explain how gangs vary and discuss some of the prominent gangs throughout the United States.

Explain why and how females join gangs.

Explain why males join gangs.

Discuss the history of organized crime in America. Include in your discussion a definition of organized crime; a detailed, thorough example of a criminal organization currently operating in the United States.

Should the American government focus the bulk of its law enforcement resources on fighting organized crime, or counter-terrorism?

Research and develop and addresses the following:

Discuss the history of organized crime in America. Include in your discussion a definition of organized crime; a detailed, thorough example of a criminal organization currently operating in the United States; the types of crimes it engages in; and (if possible) who its leadership is. Include a discussion of rival criminal organizations.
Discuss the history of terrorism in America, and make sure to include domestic terrorism in your history (do not forget that prior to 9/11, the most devastating terrorist attack on U.S. territory was perpetrated by a fellow American). Detail the various terrorist activities and the organizations behind them that have taken place on U.S. soil.

Additional Resources:
https://fas.org/sgp/crs/row/R41576.pdf

Transnational Organized Crime: What the FBI investigates.

The FBI is dedicated to eliminating transnational organized crime groups that pose the greatest threat to the national and economic security of the United States. The Bureau has found that even if key individuals in an organization are removed, the depth and financial strength of the organization often allow it to continue, so the FBI targets entire organizations responsible for a variety of criminal activities. The Bureau draws upon the experience, training, and proficiency of its agents; its partnerships within the intelligence and law enforcement communities; and its worldwide presence, using sustained, coordinated investigations and the criminal and civil provisions of the Racketeer Influenced and Corrupt Organizations Act (RICO).

What are some of the specific sort of crimes that cyber criminals commit? Research the personality profile of a typical cybercriminal.

Research the personality profile of a typical cybercriminal. Then, respond to the following in discussion:

Provide some details about your findings.
What are some of the specific sort of crimes that cyber criminals commit?

Formulate a policy over what society should do about cyber criminals who operate from foreign countries with whom the United States either lacks an extradition treaty, or from countries that are hostile to the United States.

Additional Resources

Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation
The Government Accountability Office (GAO) has identified four major cybersecurity challenges and 10 critical actions that the federal government and other entities need to take to address them. GAO continues to designate information security as a government-wide high-risk area due to increasing cyber-based threats and the persistent nature of security vulnerabilities.
Cybercrime: What the FBI Investigates
The FBI is the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists. The threat is incredibly serious—and growing. Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated. Our nation’s critical infrastructure, including both private and public sector networks, are targeted by adversaries. American companies are targeted for trade secrets and other sensitive corporate data, and universities for their cutting-edge research and development. Citizens are targeted by fraudsters and identity thieves, and children are targeted by online predators. Just as the FBI transformed itself to better address the terrorist threat after the 9/11 attacks, it is undertaking a similar transformation to address the pervasive and evolving cyber threat. This means enhancing the Cyber Division’s investigative capacity to sharpen its focus on intrusions into government and private computer networks.

What roles did the FDIC and RTC play in trying to resolve the savings and loan problem? How successful were they?

  1. Research the savings and loan scandal in Arkansas and the involvement of friends/associates/acquaintances of the Clintons. How were the perpetrators in these situations treated? How did the punishment compare with the cases in the text?
  2. What are economic citizenships? why do individuals obtain these items? Why do countries issue them? What is the negative side of economic citizenships?
  3. What roles did the FDIC and RTC play in trying to resolve the savings and loan problem? How successful were they?

Research and compare security tools that claim to protect home and enterprise internet operations. Which were most effective and least effective?

  1. Why is it appropriate to criminally prosecute hackers for simply breaking into government computers? Should we prosecute those who break into private corporation computers if no other criminal activity occurs? Explain your answer in detail.
  2. Investigate Web sites that give advice on avoiding identity theft. What advice do they give on how to avoid being a victim?
  3. Research and compare security tools that claim to protect home and enterprise internet operations. Which were most effective and least effective?