Category: Criminology

  • Title: Challenges in Interdicting Transnational Crime and Illicit Trafficking in User States: The Role of Crime-Terror Cooperation

    Name the key impediments to successfully interdicting transnational crime and illicit trafficking in user states – especially when crime and terror cooperate? Provide examples.

  • “Classifying Crimes: Examining Case Studies and Determining Mala In Se vs. Mala Prohibita”

    Instructions:
    Read and pick at least (2) two of the below question to respond too (you can chose to answer as many as you would like, but you must at least answer two).
    Then, reply to at least one of your fellow students post with at least a 50 word response.
    Please write in complete sentences, in APA format/style in text, in paragraph form, double spaced, 12-point font.
    Your initial response should be 100 words in length total (150 word maximum length), reflecting on the prompt above.
    Instructions: Let’s examine some case studies. Read the scenarios carefully. Determine what crime or crimes have been committed. Classify each as either mala in se or mala prohibita. Explain your classification.
    You are a police officer and you are buying a cup of coffee at the local “Stop and Rob” convenience store. You see a juvenile male place a quart of milk inside his jacket. You approach the person and tell him to open his jacket. He complies. He apologizes for his actions. He explains that he could not afford to buy the milk, but he needs it for his child. He promises not to do it again and asks you to let him go.
    A major pharmaceutical company introduces a new weight-loss drug. Although the pharmaceutical company knows that the drug may increase the chances of heart attacks and strokes, the company’s warning label states that, “Product X has no known side effects.” After the drug is linked to hundreds of heart attacks and strokes and dozens of deaths, the company pulls the drug off the market.
    Laura has had a hard day at work. Before going home, she decides to stop at a local bar and have a couple of drinks. After consuming several drinks, she decides to drive home. She runs a red light and crashes head-on into another vehicle. The two occupants of the other vehicle are killed. One of the occupants of the car was 6 months pregnant at the time of the crash. Laura’s blood alcohol content was .18. She has a previous conviction for Driving Under the Influence (DUI).
    John and Amy have been in a relationship for 10 years. Amy has grown tired of the relationship and has been having an affair with another man for the last 6 months. Amy and her lover make a plan to kill her husband. Amy takes out a $500,000 life insurance policy on her husband. Several weeks later, her lover breaks into Amy’s house and shoots and kills her husband. He takes a few valuables from the house to make it look like a burglary.
    You and your partner are dispatched to a domestic dispute. When you arrive, you hear loud voices inside the house. You knock on the door and announce that you are with the police department. A small-framed male answers the door. You advise him that you’ve received a call about a domestic dispute. You notice that the man has a small amount of blood dripping from his lower lip, which also appears to be bruised. You ask the man if he is okay or in need of medical attention. He advises you that he and his “roommate” have had a little fight that “got out of hand.” A larger male is standing in the kitchen and he seems irritated that you are there. He speaks up and says “We were arguing and I lost my temper a little.” The smaller male advises you that he does not need medical attention and that he does not want to press charges.

  • Title: The Refugee Crisis and its Implications on Crime, Harm, and the State: A Critical Analysis of Power, Discourse, and Resistance.

    A critical analysis of the relationship of Refugee Crisis to crime, harm and the state’.
    ·       critically analyse the refugee crisis with crime, harm and the state, by drawing on one or more of the themes of power, discourse and resistance.
    ·       use at least five sources, need to be a peer review journal article
    ·       use please information from the attached document. 

  • Title: The Sin Nature and Its Impact on Human Behavior

    Describe the sin nature, 
    describe how we get the sin nature
    describe how we overcome the sin nature
    derscibe the effects of the sin nature
    describe how the sin nature plays or does not play a role in criminal behavior.
    The full instruction sheet is attached below.
    The Bible should be the only source used for the paper.

  • “Exploring the Aims and Functions of Correctional Systems” Correctional systems play a crucial role in the criminal justice system by providing a means of punishment, rehabilitation, and supervision for individuals who have been convicted of a crime. However, there are

    Prior to beginning work on this discussion, read Chapter 1 Correctional Aims and Correctional Systems from the textbook. Your initial post should be at least 250 words in length. Support your claims with examples from any required material or other scholarly resources and properly cite any references.
    In this discussion,
    Examine the pros and cons from four of six major correctional aims or goals of sentencing from your Stojkovic and Lovell (2019) textbook.
    Compare and contrast at least one function of a historical correctional system with at least one function of a contemporary correctional system.
    Describe correctional system functions that relate to (select at least one)
    punishment,
    rehabilitation, treatment, or
    supervision

  • “Navigating Legal Regimes in Digital Crime Investigations: A Case Study of United States v. Steven C. Perrine” Investigating Child Sexual Exploitation: Using Digital Evidence to Identify and Prosecute Offenders “Uncovering the Truth: The Investigation of Steven Perrine’s Child Pornography Possession”

    Instructions: The
    student must then post 2 replies of at least 250 words. Each reply must
    incorporate at least 1 scholarly citation in APA format. Any sources cited must
    have been published within the last five years. Acceptable sources include peer
    reviewed journal articles, textbooks, the Bible, etc.
    Original Question (DO NOT ANSWER): United States v. Steven C. Perrine
    518 F.3d 1196 (10th Cir. 2008)
    The Perrine case illustrates how law enforcement must utilize the statutory framework to trace the source of criminal activity and then operate within the Fourth Amendment framework to seize evidence on the digital device that was the source of the activity. Some aspects of an investigation do not implicate any regulatory regime and law enforcement may, just like any private citizen, utilize the numerous ways that the Internet now offers to learn something to facilitate the investigation. Hence, an investigator passes in and out of three frameworks to obtain digital evidence: 1) statutes; 2) the Fourth Amendment; and, 3) non-regulated cyber-space. The point here is not to gain an understanding of the doctrines but to understand the complexity of such investigations, including passing in and out of various legal regimes during the course of the investigation. Picture yourself as the investigator in this case. 
    Question 1: What evidence of crime is there? (recount the facts of the case). 
    Question 2: Who is the criminal; how do the police find him? 
    Question 3: What do you do next? (Discuss the various legal regimes that the police must confront and how they must comply with those regimes. For example, search engines such as Google, public websites, and chat rooms offer a host of information to anyone who chooses to use them. Perhaps you could use a free IP locater service and enter the IP address in Perrine to show how easy it is to find who is assigned the IP address. Discuss all the steps you would take until you have seized Vanlandingham’s computer and why each step is important.
    Reply 1: Taylor Huff
    On September
    2, 2005, a man contacted police and reported that he had been in an online
    chatroom with someone who was sharing videos depicting violent sexual acts with
    underage children (Clancy, 2023).  This case is now known as United States v. Steven C. Perrine. 
    After receiving this call, the police spoke to the complainant,
    who recounted his experience. Following this contact with the complainant,
    police requested that the chatroom host provide the subscriber information for
    the user that interacted with the complainant (Clancy, 2023). The information
    for this account came back to Steven Perrine and provided an address for him in
    Witchita, Kansas (Clancy, 2023). 
    Steven Perrine had a prior conviction “for sexual
    exploitation of a chid” and was even still on probation for this crime at
    the time of this complaint (Clancy, 2023). Three months following the initial
    chatroom report, police in Kanas executed a search warrant for Mr. Perrine’s
    residence and collected his computer in addition to other illegal items
    (Clancy, 2023). It was later discovered that Mr. Perrine’s computer contained
    “thousands of images of child pornography” (Clancy, 2023). Mr.
    Perrine did admit to using the screen name associated with the pornography
    depicted in the chatroom (Clancy, 2023). Additionally, he shared that he had
    been using a peer-to-peer file sharing platform which allowed others, even
    strangers, to access his computer and view his files (Clancy, 2023).
    Furthermore, the chatroom host testified that Mr. Perrine’s internet protocol
    (IP) address traced back to the username he claimed to use and his internet
    provider testified that the IP address was connected to his address (Clancy, 2023). 
    As an investigator in this case, there are a few options
    available on the search for additional evidence. As mentioned, there are free
    IP-locators online with the ability to trace IP information to individuals.
    Other available resources include teams such as the International Crimes
    Against Children (ICAC). Since this case involves the endangerment of children,
    the ICAC could be available to assist with the case to ensure information is
    collected and protected for prosecution. Additionally, search engines such as
    google and even social media sites could be helpful in searching for more
    information about the offender even without a proper name. Searching for the
    username associated with the offender may prove to be fruitful as oftentimes,
    people reuse usernames and this could lead to the identification of an offender
    before a commercial provider can find and release information. As a last ditch
    effort, communication could be continued with the offender in an attempt to
    gather additional trust, information, and evidence. These efforts could provide
    supplemental information while the complainants computer is searched for more
    information to identify the offender. 
    In
    today’s digital world, investigators must be creative and operate within the
    bounds of the law. A more detailed investigation could include steps to
    identify the children in an effort to identify the offender. “In contact
    tracing, the origination vector (including the time and method of contact) is
    identified, as are any potential additional propagation vectors. For child sec
    exploitation material (CSEM) offenses, this aligns with current United States
    laws in that identifying when and how the content was obtained is one of the
    most effective methods of proving receipt charges. Further, identifying any
    propagation of the content after it is received can be used for proving
    distribution. Additionally, by working backward and referring information as
    needed to other jurisdictions where the content originated, the original
    ‘patient zero’ may be identified which would directly support victim
    identification and rescue” (Steel et al, 2024).
    Situations
    like these cause a significant amount of anger because the victims are helpless
    and innocent. We must believe in the power of the justice system and as the
    Bible tells us in Ecclesiastes 3:17, “I said to myself, ‘God will bring
    into judgement both the righteous and the wicked, for there will be a time for
    every activity, a time to judge every deed” (King James Bible, 1769/2017).
    References
    Clancy,
    T.K. (2023). Cyber crime and digital
    evidence: Materials and cases (4th ed.). Carolina Academic
    Press. 
    King James Bible. (2017). Cambridge University Press. (Original work
    published 1769)
    Steele, C.M.S., Newman, E., O’Rourke, S., and Quayle, E.
    (2024, March). Improving child sexual exploitation material investigations:
    Recommendations based on a review of recent research findings. The Police Journal, 97(1). https://journals.sagepub.com/doi/10.1177/0032258X221142525Links to an external site. 
    Reply 2: Kelsey
    Nesnick
    James Vanlandingham (username “dana_hotlips05”)
    received an invitation from Steven Perrine, who goes by
    “stevedragonslayer,” to view a webcam video featuring two nude
    6–9-year-old females. Vanlandingham informed his neighborhood police agency of
    this. Vanlandingham carried on talking to Perrine and informed her he
    appreciated the kind of stuff that was being aired while they waited for the
    police to show up. Perrine then proceeded to play a number of more recordings
    of young females engaging in various explicit sexual actions. Perrine ceased
    providing video clips prior to the police showing up, but Vanlandingham was
    able to record their chat. After looking into the situation, Pennsylvanian
    authorities were able to get a disclosure order requiring Yahoo to give them
    any material related to the account “stevedragonslayer.” The IP
    address of the username, which was kept up to date by Cox Communication Inc.,
    was discovered by Yahoo. Then, Pennsylvania officials got an additional
    disclosure order requiring Cox to give more details about the IP address that
    Yahoo had provided. Steve Perrine of Wichita, Kansas, was the account holder of
    the IP address that was provided. It was found via additional investigation
    that Perrine was on probation due to a previous state conviction for child sex
    abuse. The Wichita police department obtained all the information and then
    issued a search warrant for Perrine’s home. They were able to obtain evidence
    that proved he was guilty of possessing child pornography when they confiscated
    his computer.
    In this instance, Steven Perrine is portrayed as the criminal.
    According to USDOJ (2020), child pornography is defined as any visual
    representation of sexually explicit behavior involving an adolescent (someone
    under the age of 18) and includes photographs, films, videos, computers, and
    computer-generated images. Additionally, it is illegal against federal law to
    produce, distribute, receive, or possess images of child pornography (USDOJ,
    2020). Perrine not only had illicit material in his possession, but he also
    shared it by disseminating child pornography online and on his computer.
    Information on the user “stevedragonslayer” posting obscene videos of
    minors in a Yahoo chat room was provided to the police by someone who reported
    the user.Fortunately, the person who brought this to our attention was
    perceptive enough to preserve their dialogue. Local law enforcement obtained a
    disclosure order from Yahoo and Cox to release information about Perrine when
    they were able to conduct more investigation. Because of The Stored
    Communication Act, which protects the privacy of electronic data, law
    enforcement agents were able to obtain information. Protecting novel forms of
    communication against unauthorized eavesdropping and assisting law enforcement
    by offering investigative methods for communication interception were the
    primary objectives of this legislation. According to Crowell (2018). If the
    government has good reason to do so during an investigation, it may request
    transaction records and saved communications from third-party service providers
    under Section 2703 of the ECPA. (Clancy, 2019).
    The law enforcement organizations who conducted the
    investigation in this case followed all the proper procedures. There was
    sufficient probable cause for the police to look into the matter once
    Vanlandingham reported his chat with Perrine to the local authorities. Probable
    cause was required in order to get a disclosure order from Cox and Yahoo. After
    Perrine’s identity was established, officials obtained a search warrant for his
    computer. Perrine possessed more than 16,000 child pornographic photos, according
    to the search. Reporting the interaction with “stevedragonslayer” by
    Vanlandingham was the most crucial step in our research. As a result, the
    police were able to look into the case more deeply and without going against
    Perrine’s Fourth Amendment rights. According to Cordova, Alvarez, Ferrandiz,
    and Perez-Bravo (2018), handling crimes using cyber devices necessitates the
    use of skilled professionals during the investigative stage, during
    prosecution, and in court.
    Cordova,
    J.G.L., Álvarez, P.F.C., De Jesús Echerri Ferrandiz, F., Pérez-Bravo, J.C.: Law
    versus cybercrime. Glob. Jurist 18(1), 1–9 (2018).
    https://doi.org/10.1515/gj-2017-0024
    https://doi.org/10.1515/gj-2017-0024
    Crowell,
    Donald L. III. (2018). The privacy of things: how the stored communications act
    has been outsmarted by smart technology. Federal Communications Law
    Journal, 70(2), 211-236.
    Thomas K Clancy. Cyber Crime and Digital Evidence. Durham, North
    Carolina: (Caroline Academy Press), 2019.

  • Title: Budget Process Memo for the Los Angeles Police Department

    Budget Process Memo 
    Financial analysts guide governments and security entities in decisions about the budgeting process. Imagine being a financial analyst for the Los Angeles Police Department
    STEP 1: Write a 200 word MEMORANDM to a new incoming group of legislators to describe the budget process. If you are unfamiliar with the MEMORANDUM template- please review this site: Sample Memorandum.
    (https://owl.purdue.edu/owl/subject_specific_writing/professional_technical_writing/memos/sample_memo.html)
    STEP 2: Include the following in your memo:
    An opening statement indicating your position and the purpose of this memorandum
    A description of the steps of the budget process, including when the fiscal year begins and ends
    The timeline and key milestones of the budget process, from budget submission by agencies/departments to the final budget
    A closing statement with any follow-up or contact information for the new legislators. 
    ***Please remember that this is not a formal paper but a Memorandum

  • “The Importance of Citing Sources in Academic Writing” The Importance of Citing Sources in Academic Writing Citing sources is an essential aspect of academic writing. It involves acknowledging and giving credit to the original sources of information used in a paper or assignment

    Great start – you need to review my comments and to  cite more often.  At the beginning of a paragraph is good but when you make statements you should do it at the end as well so you make sure that you have given full credit to the author
    References need to be formatted in APA 7th edition

  • “The Impact of War on Families: A Historical Analysis of Lydia Bixby’s Tragic Loss” “Remembering Our Fallen Heroes: A Letter from Lincoln”

    Final Paper
    Topic: Your choice but it must relate to topics discussed and covered in class.
    Paper must be structured in the APA format.
    Font collection is Times Roman
    Font size is 12
    The paper shall be double spaced
    There must be a Title page and a Works Cited page; these two pages DO NOT COUNT towards the 10-page total.
    There is no upper page limit; if you want to write more than 10 pages you are welcome to.
    Your paper must demonstrate a critical thought process; it cannot consist of strictly opinion. Positions must be supported.
    Your paper must contain a conclusion.
    Note: If you want to discuss your topic of choice, please reach out to me.
    The below links are great sources to learn how to format your title page and your paper.  Please make use of them.  Do not “make up” a format; the below links provide all the information you need to properly format your paper.
    Title Page
    https://apastyle.apa.org/style-grammar-guidelines/paper-format/title-page


    The paper must be structured correctly. https://www.canadacollege.edu/htpcommittee/docs/GUIDELINES%20FOR%20RESEARCH%20PAPER%20S14.pdf(great reference).
    Note: I am not requiring an abstract.  If you want to include one you may but it does not count towards the 10-page minimum.
    You must cite (in APA format) your sources. Your paper must have at a minimum five different  Use the “References” tab to help you construct your citations and your Works Cited page.  If you need help with the “References” tab, please reach out and I will help you.
    How to use the “References” tap in Word
    Select the “References” tap
    In the “Reference” tap you will see a drop-down menu. Select the down arrow and it will open the drop-down box and provide options to select from.  Select APA.  Now you are ready to begin citing resources in APA style.
    So, if you want to cite APA style “in sentence” simply place the cursor where you want the citation to appear and select “Insert Citation.” When you do this a “Create Source” box will appear.  This box will do the work for you.
    There is a drop-down menu that will allow you to select your source. Once you have selected your source, you will be prompted to enter the required information to cite in APA style.  What is great about using this is the citation will be stored for future reference, whether for this class our future classes.
    Once you have entered the information, select “Ok.” When you select “Ok”, the citation will be added WHEREVER YOUR CURSOR IS.  Do this for all of your citations.
    When you are done with your paper, place the cursor at the end of the last word after the period and select “Insert” and then “Page Break.” This will create a new page.
    Go back to the “References” page and select “Bibliography” and then “Works Cited.”
    Once you select “Works Cited”, your reference material will be added in APA format.
    Here is an example:
    War is tragic and deadly, and some have lost more than others.  In 1864, Massachusetts Governor John A. Andrew had been informed that Mrs. Lydia Bixby had lost five of her sons in the Civil War.  Andrew wrote a letter to President Lincoln asking him to draft a correspondence expressing condolences to Mrs. Lydia Bixby.  The letter was later published in the Boston Evening Transcriptand later read in the movie Saving Private Ryan(Basier, 2006) – in sentence citation.  Below is the complete letter:
    Dear Madam, —
    I have been shown in the files of the War Department a statement of the Adjutant General of Massachusetts that you are the mother of five sons who have died gloriously on the field of battle.
    I feel how weak and fruitless must be any word of mine which should attempt to beguile you from the grief of a loss so overwhelming. But I cannot refrain from tendering you the consolation that may be found in the thanks of the Republic they died to save.
    I pray that our Heavenly Father may assuage the anguish of your bereavement and leave you only the cherished memory of the loved and lost, and the solemn pride that must be yours to have laid so costly a sacrifice upon the altar of freedom.
    Yours, very sincerely and respectfully,
    Lincoln

  • Issues and Constitutional Rights in Corrections: Examining Supreme Court Cases and Cultural Diversity “Exploring the Impact of Social Media on Mental Health: A Review of Current Research”

    Prior to beginning work on this assignment, read Chapters 1 and 2 from your textbook, watch the video Overcrowded: The Messy Politics of CA’s Prison CrisisLinks to an external site., and review pages 2513-2533 only from the article Whom Should We Punish, and How? Rational Incentives and Criminal Justice ReformLinks to an external site.. This assignment includes an outline described below. The outline’s purpose is for you to prepare a foundation for your approach to your Week 2 assignment.
    Including a minimum of two scholarly and/or credible resources, please prepare an outline of issues in corrections that briefly addresses, in approximately one paragraph each, the following:
    Explain the issue(s) in at least one U.S. Supreme Court Case published within the past 10 years that addresses the balance between constitutional rights of incarcerated persons and administrative functions in corrections. (Approximately one paragraph)
    To assist you with this part, note that the issue(s) in a U.S. Supreme Court case typically refers to the main challenge or claim that the court ultimately addresses in its ruling. For example, in Brown v. Plata (2011) (discussed in your textbook), a major issue was whether overcrowded conditions for correctional populations violates the Eighth Amendment of the U. S. Constitution. Although you may choose any relevant U.S. Supreme Court case published within the past 10 years, you may find it helpful to select a case from Table 5.1 of Chapter 5 in your textbook.
    Determine how the constitutional rights of incarcerated persons have been addressed by the U.S. Supreme Court in a case published within the past 10 years (for your selected case above). (Approximately one paragraph)
    To assist you with this part, consider how the decision addresses the balance between constitutional rights of incarcerated persons and administrative functions, drawing on factors considered by the U.S. Supreme Court in your selected case.
    Examine at least one cultural sensitivity issue and at least one diversity issue in corrections. (Approximately one paragraph)
    To assist you with this part, you may explore articles or state or federal websites that address cultural sensitivity and diversity in corrections. Use at least one scholarly or credible source.
    *Note: You are encouraged to integrate any feedback from your instructor and upload the assignment to your ePortfolioLinks to an external site..
    The Issues and Constitutional Rights in Corrections paper
    Must be one to two double-spaced pages in length (not including title and references pages) and formatted according to APA StyleLinks to an external site. as outlined in the Writing Center’s APA Formatting for Microsoft WordLinks to an external site. and OutliningLinks to an external site. resources.
    Must include a separate title page with the following:
    Title of paper in bold font
    Space should appear between the title and the rest of the information on the title page.
    Student’s name
    Name of institution (University of Arizona Global Campus)
    Course name and number
    Instructor’s name
    Due date
    Must utilize academic voice. See the Academic VoiceLinks to an external site. resource for additional guidance.
    Must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
    For assistance on writing Introductions & ConclusionsLinks to an external site. as well as Writing a Thesis StatementLinks to an external site., refer to the Writing Center resources.
    Must use at least two scholarly or credible sources in addition to the course text.
    The Scholarly, Peer-Reviewed, and Other Credible SourcesLinks to an external site. table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
    Must document any information used from sources in APA Style as outlined in the Writing Center’s APA: Citing Within Your PaperLinks to an external site. guide.
    Must include a separate references page that is formatted according to APA Style as outlined in the Writing Center. See the APA: Formatting Your References ListLinks to an external site. resource in the Writing Center for specifications.