Name the key impediments to successfully interdicting transnational crime and illicit trafficking in user states – especially when crime and terror cooperate? Provide examples.
Category: Criminology
-
“Classifying Crimes: Examining Case Studies and Determining Mala In Se vs. Mala Prohibita”
Instructions:
Read and pick at least (2) two of the below question to respond too (you can chose to answer as many as you would like, but you must at least answer two).
Then, reply to at least one of your fellow students post with at least a 50 word response.
Please write in complete sentences, in APA format/style in text, in paragraph form, double spaced, 12-point font.
Your initial response should be 100 words in length total (150 word maximum length), reflecting on the prompt above.
Instructions: Let’s examine some case studies. Read the scenarios carefully. Determine what crime or crimes have been committed. Classify each as either mala in se or mala prohibita. Explain your classification.
You are a police officer and you are buying a cup of coffee at the local “Stop and Rob” convenience store. You see a juvenile male place a quart of milk inside his jacket. You approach the person and tell him to open his jacket. He complies. He apologizes for his actions. He explains that he could not afford to buy the milk, but he needs it for his child. He promises not to do it again and asks you to let him go.
A major pharmaceutical company introduces a new weight-loss drug. Although the pharmaceutical company knows that the drug may increase the chances of heart attacks and strokes, the company’s warning label states that, “Product X has no known side effects.” After the drug is linked to hundreds of heart attacks and strokes and dozens of deaths, the company pulls the drug off the market.
Laura has had a hard day at work. Before going home, she decides to stop at a local bar and have a couple of drinks. After consuming several drinks, she decides to drive home. She runs a red light and crashes head-on into another vehicle. The two occupants of the other vehicle are killed. One of the occupants of the car was 6 months pregnant at the time of the crash. Laura’s blood alcohol content was .18. She has a previous conviction for Driving Under the Influence (DUI).
John and Amy have been in a relationship for 10 years. Amy has grown tired of the relationship and has been having an affair with another man for the last 6 months. Amy and her lover make a plan to kill her husband. Amy takes out a $500,000 life insurance policy on her husband. Several weeks later, her lover breaks into Amy’s house and shoots and kills her husband. He takes a few valuables from the house to make it look like a burglary.
You and your partner are dispatched to a domestic dispute. When you arrive, you hear loud voices inside the house. You knock on the door and announce that you are with the police department. A small-framed male answers the door. You advise him that you’ve received a call about a domestic dispute. You notice that the man has a small amount of blood dripping from his lower lip, which also appears to be bruised. You ask the man if he is okay or in need of medical attention. He advises you that he and his “roommate” have had a little fight that “got out of hand.” A larger male is standing in the kitchen and he seems irritated that you are there. He speaks up and says “We were arguing and I lost my temper a little.” The smaller male advises you that he does not need medical attention and that he does not want to press charges. -
Title: The Refugee Crisis and its Implications on Crime, Harm, and the State: A Critical Analysis of Power, Discourse, and Resistance.
A critical analysis of the relationship of Refugee Crisis to crime, harm and the state’.
· critically analyse the refugee crisis with crime, harm and the state, by drawing on one or more of the themes of power, discourse and resistance.
· use at least five sources, need to be a peer review journal article
· use please information from the attached document. -
Title: The Sin Nature and Its Impact on Human Behavior
Describe the sin nature,
describe how we get the sin nature
describe how we overcome the sin nature
derscibe the effects of the sin nature
describe how the sin nature plays or does not play a role in criminal behavior.
The full instruction sheet is attached below.
The Bible should be the only source used for the paper. -
“Exploring the Aims and Functions of Correctional Systems” Correctional systems play a crucial role in the criminal justice system by providing a means of punishment, rehabilitation, and supervision for individuals who have been convicted of a crime. However, there are
Prior to beginning work on this discussion, read Chapter 1 Correctional Aims and Correctional Systems from the textbook. Your initial post should be at least 250 words in length. Support your claims with examples from any required material or other scholarly resources and properly cite any references.
In this discussion,
Examine the pros and cons from four of six major correctional aims or goals of sentencing from your Stojkovic and Lovell (2019) textbook.
Compare and contrast at least one function of a historical correctional system with at least one function of a contemporary correctional system.
Describe correctional system functions that relate to (select at least one)
punishment,
rehabilitation, treatment, or
supervision -
“Navigating Legal Regimes in Digital Crime Investigations: A Case Study of United States v. Steven C. Perrine” Investigating Child Sexual Exploitation: Using Digital Evidence to Identify and Prosecute Offenders “Uncovering the Truth: The Investigation of Steven Perrine’s Child Pornography Possession”
Instructions: The
student must then post 2 replies of at least 250 words. Each reply must
incorporate at least 1 scholarly citation in APA format. Any sources cited must
have been published within the last five years. Acceptable sources include peer
reviewed journal articles, textbooks, the Bible, etc.
Original Question (DO NOT ANSWER): United States v. Steven C. Perrine
518 F.3d 1196 (10th Cir. 2008)
The Perrine case illustrates how law enforcement must utilize the statutory framework to trace the source of criminal activity and then operate within the Fourth Amendment framework to seize evidence on the digital device that was the source of the activity. Some aspects of an investigation do not implicate any regulatory regime and law enforcement may, just like any private citizen, utilize the numerous ways that the Internet now offers to learn something to facilitate the investigation. Hence, an investigator passes in and out of three frameworks to obtain digital evidence: 1) statutes; 2) the Fourth Amendment; and, 3) non-regulated cyber-space. The point here is not to gain an understanding of the doctrines but to understand the complexity of such investigations, including passing in and out of various legal regimes during the course of the investigation. Picture yourself as the investigator in this case.
Question 1: What evidence of crime is there? (recount the facts of the case).
Question 2: Who is the criminal; how do the police find him?
Question 3: What do you do next? (Discuss the various legal regimes that the police must confront and how they must comply with those regimes. For example, search engines such as Google, public websites, and chat rooms offer a host of information to anyone who chooses to use them. Perhaps you could use a free IP locater service and enter the IP address in Perrine to show how easy it is to find who is assigned the IP address. Discuss all the steps you would take until you have seized Vanlandingham’s computer and why each step is important.
Reply 1: Taylor Huff
On September
2, 2005, a man contacted police and reported that he had been in an online
chatroom with someone who was sharing videos depicting violent sexual acts with
underage children (Clancy, 2023). This case is now known as United States v. Steven C. Perrine.
After receiving this call, the police spoke to the complainant,
who recounted his experience. Following this contact with the complainant,
police requested that the chatroom host provide the subscriber information for
the user that interacted with the complainant (Clancy, 2023). The information
for this account came back to Steven Perrine and provided an address for him in
Witchita, Kansas (Clancy, 2023).
Steven Perrine had a prior conviction “for sexual
exploitation of a chid” and was even still on probation for this crime at
the time of this complaint (Clancy, 2023). Three months following the initial
chatroom report, police in Kanas executed a search warrant for Mr. Perrine’s
residence and collected his computer in addition to other illegal items
(Clancy, 2023). It was later discovered that Mr. Perrine’s computer contained
“thousands of images of child pornography” (Clancy, 2023). Mr.
Perrine did admit to using the screen name associated with the pornography
depicted in the chatroom (Clancy, 2023). Additionally, he shared that he had
been using a peer-to-peer file sharing platform which allowed others, even
strangers, to access his computer and view his files (Clancy, 2023).
Furthermore, the chatroom host testified that Mr. Perrine’s internet protocol
(IP) address traced back to the username he claimed to use and his internet
provider testified that the IP address was connected to his address (Clancy, 2023).
As an investigator in this case, there are a few options
available on the search for additional evidence. As mentioned, there are free
IP-locators online with the ability to trace IP information to individuals.
Other available resources include teams such as the International Crimes
Against Children (ICAC). Since this case involves the endangerment of children,
the ICAC could be available to assist with the case to ensure information is
collected and protected for prosecution. Additionally, search engines such as
google and even social media sites could be helpful in searching for more
information about the offender even without a proper name. Searching for the
username associated with the offender may prove to be fruitful as oftentimes,
people reuse usernames and this could lead to the identification of an offender
before a commercial provider can find and release information. As a last ditch
effort, communication could be continued with the offender in an attempt to
gather additional trust, information, and evidence. These efforts could provide
supplemental information while the complainants computer is searched for more
information to identify the offender.
In
today’s digital world, investigators must be creative and operate within the
bounds of the law. A more detailed investigation could include steps to
identify the children in an effort to identify the offender. “In contact
tracing, the origination vector (including the time and method of contact) is
identified, as are any potential additional propagation vectors. For child sec
exploitation material (CSEM) offenses, this aligns with current United States
laws in that identifying when and how the content was obtained is one of the
most effective methods of proving receipt charges. Further, identifying any
propagation of the content after it is received can be used for proving
distribution. Additionally, by working backward and referring information as
needed to other jurisdictions where the content originated, the original
‘patient zero’ may be identified which would directly support victim
identification and rescue” (Steel et al, 2024).
Situations
like these cause a significant amount of anger because the victims are helpless
and innocent. We must believe in the power of the justice system and as the
Bible tells us in Ecclesiastes 3:17, “I said to myself, ‘God will bring
into judgement both the righteous and the wicked, for there will be a time for
every activity, a time to judge every deed” (King James Bible, 1769/2017).
References
Clancy,
T.K. (2023). Cyber crime and digital
evidence: Materials and cases (4th ed.). Carolina Academic
Press.
King James Bible. (2017). Cambridge University Press. (Original work
published 1769)
Steele, C.M.S., Newman, E., O’Rourke, S., and Quayle, E.
(2024, March). Improving child sexual exploitation material investigations:
Recommendations based on a review of recent research findings. The Police Journal, 97(1). https://journals.sagepub.com/doi/10.1177/0032258X221142525Links to an external site.
Reply 2: Kelsey
Nesnick
James Vanlandingham (username “dana_hotlips05”)
received an invitation from Steven Perrine, who goes by
“stevedragonslayer,” to view a webcam video featuring two nude
6–9-year-old females. Vanlandingham informed his neighborhood police agency of
this. Vanlandingham carried on talking to Perrine and informed her he
appreciated the kind of stuff that was being aired while they waited for the
police to show up. Perrine then proceeded to play a number of more recordings
of young females engaging in various explicit sexual actions. Perrine ceased
providing video clips prior to the police showing up, but Vanlandingham was
able to record their chat. After looking into the situation, Pennsylvanian
authorities were able to get a disclosure order requiring Yahoo to give them
any material related to the account “stevedragonslayer.” The IP
address of the username, which was kept up to date by Cox Communication Inc.,
was discovered by Yahoo. Then, Pennsylvania officials got an additional
disclosure order requiring Cox to give more details about the IP address that
Yahoo had provided. Steve Perrine of Wichita, Kansas, was the account holder of
the IP address that was provided. It was found via additional investigation
that Perrine was on probation due to a previous state conviction for child sex
abuse. The Wichita police department obtained all the information and then
issued a search warrant for Perrine’s home. They were able to obtain evidence
that proved he was guilty of possessing child pornography when they confiscated
his computer.
In this instance, Steven Perrine is portrayed as the criminal.
According to USDOJ (2020), child pornography is defined as any visual
representation of sexually explicit behavior involving an adolescent (someone
under the age of 18) and includes photographs, films, videos, computers, and
computer-generated images. Additionally, it is illegal against federal law to
produce, distribute, receive, or possess images of child pornography (USDOJ,
2020). Perrine not only had illicit material in his possession, but he also
shared it by disseminating child pornography online and on his computer.
Information on the user “stevedragonslayer” posting obscene videos of
minors in a Yahoo chat room was provided to the police by someone who reported
the user.Fortunately, the person who brought this to our attention was
perceptive enough to preserve their dialogue. Local law enforcement obtained a
disclosure order from Yahoo and Cox to release information about Perrine when
they were able to conduct more investigation. Because of The Stored
Communication Act, which protects the privacy of electronic data, law
enforcement agents were able to obtain information. Protecting novel forms of
communication against unauthorized eavesdropping and assisting law enforcement
by offering investigative methods for communication interception were the
primary objectives of this legislation. According to Crowell (2018). If the
government has good reason to do so during an investigation, it may request
transaction records and saved communications from third-party service providers
under Section 2703 of the ECPA. (Clancy, 2019).
The law enforcement organizations who conducted the
investigation in this case followed all the proper procedures. There was
sufficient probable cause for the police to look into the matter once
Vanlandingham reported his chat with Perrine to the local authorities. Probable
cause was required in order to get a disclosure order from Cox and Yahoo. After
Perrine’s identity was established, officials obtained a search warrant for his
computer. Perrine possessed more than 16,000 child pornographic photos, according
to the search. Reporting the interaction with “stevedragonslayer” by
Vanlandingham was the most crucial step in our research. As a result, the
police were able to look into the case more deeply and without going against
Perrine’s Fourth Amendment rights. According to Cordova, Alvarez, Ferrandiz,
and Perez-Bravo (2018), handling crimes using cyber devices necessitates the
use of skilled professionals during the investigative stage, during
prosecution, and in court.
Cordova,
J.G.L., Álvarez, P.F.C., De Jesús Echerri Ferrandiz, F., Pérez-Bravo, J.C.: Law
versus cybercrime. Glob. Jurist 18(1), 1–9 (2018).
https://doi.org/10.1515/gj-2017-0024
https://doi.org/10.1515/gj-2017-0024
Crowell,
Donald L. III. (2018). The privacy of things: how the stored communications act
has been outsmarted by smart technology. Federal Communications Law
Journal, 70(2), 211-236.
Thomas K Clancy. Cyber Crime and Digital Evidence. Durham, North
Carolina: (Caroline Academy Press), 2019. -
Title: Budget Process Memo for the Los Angeles Police Department
Budget Process Memo
Financial analysts guide governments and security entities in decisions about the budgeting process. Imagine being a financial analyst for the Los Angeles Police Department
STEP 1: Write a 200 word MEMORANDM to a new incoming group of legislators to describe the budget process. If you are unfamiliar with the MEMORANDUM template- please review this site: Sample Memorandum.
(https://owl.purdue.edu/owl/subject_specific_writing/professional_technical_writing/memos/sample_memo.html)
STEP 2: Include the following in your memo:
An opening statement indicating your position and the purpose of this memorandum
A description of the steps of the budget process, including when the fiscal year begins and ends
The timeline and key milestones of the budget process, from budget submission by agencies/departments to the final budget
A closing statement with any follow-up or contact information for the new legislators.
***Please remember that this is not a formal paper but a Memorandum -
“The Importance of Citing Sources in Academic Writing” The Importance of Citing Sources in Academic Writing Citing sources is an essential aspect of academic writing. It involves acknowledging and giving credit to the original sources of information used in a paper or assignment
Great start – you need to review my comments and to cite more often. At the beginning of a paragraph is good but when you make statements you should do it at the end as well so you make sure that you have given full credit to the author
References need to be formatted in APA 7th edition -
“The Impact of War on Families: A Historical Analysis of Lydia Bixby’s Tragic Loss” “Remembering Our Fallen Heroes: A Letter from Lincoln”
Final Paper
Topic: Your choice but it must relate to topics discussed and covered in class.
Paper must be structured in the APA format.
Font collection is Times Roman
Font size is 12
The paper shall be double spaced
There must be a Title page and a Works Cited page; these two pages DO NOT COUNT towards the 10-page total.
There is no upper page limit; if you want to write more than 10 pages you are welcome to.
Your paper must demonstrate a critical thought process; it cannot consist of strictly opinion. Positions must be supported.
Your paper must contain a conclusion.
Note: If you want to discuss your topic of choice, please reach out to me.
The below links are great sources to learn how to format your title page and your paper. Please make use of them. Do not “make up” a format; the below links provide all the information you need to properly format your paper.
Title Page
https://apastyle.apa.org/style-grammar-guidelines/paper-format/title-page
The paper must be structured correctly. https://www.canadacollege.edu/htpcommittee/docs/GUIDELINES%20FOR%20RESEARCH%20PAPER%20S14.pdf(great reference).
Note: I am not requiring an abstract. If you want to include one you may but it does not count towards the 10-page minimum.
You must cite (in APA format) your sources. Your paper must have at a minimum five different Use the “References” tab to help you construct your citations and your Works Cited page. If you need help with the “References” tab, please reach out and I will help you.
How to use the “References” tap in Word
Select the “References” tap
In the “Reference” tap you will see a drop-down menu. Select the down arrow and it will open the drop-down box and provide options to select from. Select APA. Now you are ready to begin citing resources in APA style.
So, if you want to cite APA style “in sentence” simply place the cursor where you want the citation to appear and select “Insert Citation.” When you do this a “Create Source” box will appear. This box will do the work for you.
There is a drop-down menu that will allow you to select your source. Once you have selected your source, you will be prompted to enter the required information to cite in APA style. What is great about using this is the citation will be stored for future reference, whether for this class our future classes.
Once you have entered the information, select “Ok.” When you select “Ok”, the citation will be added WHEREVER YOUR CURSOR IS. Do this for all of your citations.
When you are done with your paper, place the cursor at the end of the last word after the period and select “Insert” and then “Page Break.” This will create a new page.
Go back to the “References” page and select “Bibliography” and then “Works Cited.”
Once you select “Works Cited”, your reference material will be added in APA format.
Here is an example:
War is tragic and deadly, and some have lost more than others. In 1864, Massachusetts Governor John A. Andrew had been informed that Mrs. Lydia Bixby had lost five of her sons in the Civil War. Andrew wrote a letter to President Lincoln asking him to draft a correspondence expressing condolences to Mrs. Lydia Bixby. The letter was later published in the Boston Evening Transcriptand later read in the movie Saving Private Ryan(Basier, 2006) – in sentence citation. Below is the complete letter:
Dear Madam, —
I have been shown in the files of the War Department a statement of the Adjutant General of Massachusetts that you are the mother of five sons who have died gloriously on the field of battle.
I feel how weak and fruitless must be any word of mine which should attempt to beguile you from the grief of a loss so overwhelming. But I cannot refrain from tendering you the consolation that may be found in the thanks of the Republic they died to save.
I pray that our Heavenly Father may assuage the anguish of your bereavement and leave you only the cherished memory of the loved and lost, and the solemn pride that must be yours to have laid so costly a sacrifice upon the altar of freedom.
Yours, very sincerely and respectfully,
Lincoln -
Issues and Constitutional Rights in Corrections: Examining Supreme Court Cases and Cultural Diversity “Exploring the Impact of Social Media on Mental Health: A Review of Current Research”
Prior to beginning work on this assignment, read Chapters 1 and 2 from your textbook, watch the video Overcrowded: The Messy Politics of CA’s Prison CrisisLinks to an external site., and review pages 2513-2533 only from the article Whom Should We Punish, and How? Rational Incentives and Criminal Justice ReformLinks to an external site.. This assignment includes an outline described below. The outline’s purpose is for you to prepare a foundation for your approach to your Week 2 assignment.
Including a minimum of two scholarly and/or credible resources, please prepare an outline of issues in corrections that briefly addresses, in approximately one paragraph each, the following:
Explain the issue(s) in at least one U.S. Supreme Court Case published within the past 10 years that addresses the balance between constitutional rights of incarcerated persons and administrative functions in corrections. (Approximately one paragraph)
To assist you with this part, note that the issue(s) in a U.S. Supreme Court case typically refers to the main challenge or claim that the court ultimately addresses in its ruling. For example, in Brown v. Plata (2011) (discussed in your textbook), a major issue was whether overcrowded conditions for correctional populations violates the Eighth Amendment of the U. S. Constitution. Although you may choose any relevant U.S. Supreme Court case published within the past 10 years, you may find it helpful to select a case from Table 5.1 of Chapter 5 in your textbook.
Determine how the constitutional rights of incarcerated persons have been addressed by the U.S. Supreme Court in a case published within the past 10 years (for your selected case above). (Approximately one paragraph)
To assist you with this part, consider how the decision addresses the balance between constitutional rights of incarcerated persons and administrative functions, drawing on factors considered by the U.S. Supreme Court in your selected case.
Examine at least one cultural sensitivity issue and at least one diversity issue in corrections. (Approximately one paragraph)
To assist you with this part, you may explore articles or state or federal websites that address cultural sensitivity and diversity in corrections. Use at least one scholarly or credible source.
*Note: You are encouraged to integrate any feedback from your instructor and upload the assignment to your ePortfolioLinks to an external site..
The Issues and Constitutional Rights in Corrections paper
Must be one to two double-spaced pages in length (not including title and references pages) and formatted according to APA StyleLinks to an external site. as outlined in the Writing Center’s APA Formatting for Microsoft WordLinks to an external site. and OutliningLinks to an external site. resources.
Must include a separate title page with the following:
Title of paper in bold font
Space should appear between the title and the rest of the information on the title page.
Student’s name
Name of institution (University of Arizona Global Campus)
Course name and number
Instructor’s name
Due date
Must utilize academic voice. See the Academic VoiceLinks to an external site. resource for additional guidance.
Must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
For assistance on writing Introductions & ConclusionsLinks to an external site. as well as Writing a Thesis StatementLinks to an external site., refer to the Writing Center resources.
Must use at least two scholarly or credible sources in addition to the course text.
The Scholarly, Peer-Reviewed, and Other Credible SourcesLinks to an external site. table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
Must document any information used from sources in APA Style as outlined in the Writing Center’s APA: Citing Within Your PaperLinks to an external site. guide.
Must include a separate references page that is formatted according to APA Style as outlined in the Writing Center. See the APA: Formatting Your References ListLinks to an external site. resource in the Writing Center for specifications.