Categories
Criminology

“The Impact of Artificial Intelligence on Homeland Security: Exploring Opportunities and Challenges”

Instructions
Unlike the Reflection Papers, for your Analyst’s Paper
choose a topic that relates to the materials covered during your studies of the
Homeland Security world. This topic cannot be one that you wrote about in any
of your courses at APUS or any other institute of higher learning. This is your
opportunity to explore in-depth a topic that you have a greater interest in
than what you covered during the other courses at APUS. Feel free to explore
the world of Homeland Security and write about something that really interests
you. Be brave and write about something that others are not going to write
about, not just a typical paper on a common Homeland Security theme. Explore
and enjoy. 
Topic: Artificial Intelligence’s Role in Homeland Security
Possible references:
https://www.rand.org/hsrd/topics/dhs-and-ai.html
https://www.gao.gov/blog/how-artificial-intelligence-transforming-national-security
https://www.dhs.gov/science-and-technology/artificial-intelligence
https://www.reuters.com/technology/us-homeland-security-names-ai-safety-security-advisory-board-2024-04-26/
Please add and use additional references as necessary to
meet the technical requirements.
Components of the Analyst’s Paper
·      
Cover Page (does not count towards your minimum
or maximum page count).
·      
Abstract and Keywords (does not count towards
your minimum or maximum page count).
·      
Introduction, Body, and Conclusion.
·      
Reference Page (does not count towards your
minimum or maximum page count). 
Technical Requirements:
·      
Your
paper must be at a minimum of 8 pages and a maximum of 9 pages (the Title,
Abstract, and Reference pages do not count towards the minimum limit).
·      
No direct quotations, paraphrases are
acceptable.
·      
Do not include a methodology section or a
literature review.
·      
You must have at least eight unique sources in
the paper. Each requires both a citation and a reference.
·      
Type in double-spaced Times New Roman 12-point
font. One-inch margins left, right, top, and bottom.
·      
No direct quotations.
·      
All paraphrases require a reference. All
references require a paraphrase.
·      
Follow APA 7 as the sole citation and reference
style used in written work submitted as part of coursework.
·      
Points will be deducted for the use of Wikipedia
or encyclopedic-type sources. It is highly advised to utilize books,
peer-reviewed journals, articles, archived documents, etc.
·      
All submissions will be graded using the
assignment rubric.

Categories
Criminology

“Examining the Supreme Court’s Decisions on Life Without Parole for Juveniles: A Critique of Bell and DeMatteo’s Review” Introduction The United States has been grappling with the issue of life without parole (L

******ARTICLE FOR CRITIQUE: Bell, J. G., & DeMatteo, D. (2020). Life without Parole for juveniles: Review of Supreme Court
decisions and recent case law. Criminal Justice Review, 45(1), 37-56
https://doi.org/10.1177/0734016820911176
The purpose of this assignment is to give you
experience critiquing a journal article. The Journal Article Critique
Assignment enables you to practice thinking critically and synthesize
information. You may use a journal article that you selected for your Research
Paper: Topic Selection with Research Questions Assignment or select a new journal
article. Use the topic that you have selected for your Research Paper: Topic
Selection with Research Questions Assignment and Research Paper: Policy
Issue and Solution Assignment. Pay particular attention to the theoretical
foundation, the methodology, and the results of data analysis. Utilize headings
to distinguish the various components of your paper.
Instructions
Do not quote from the article. Instead,
summarize and paraphrase. Your review must be written in your words and include
at least 3 (three) scholarly citations in current APA format. In addition to 5
pages of content (not counting the title page, abstract, or references). Make
sure to include a title and reference page. In addition to an introduction and
conclusion, make sure to respond to the following questions to prepare your Journal
Article Critique Assignment.
·        
What
are the article’s title and purpose?
·        
Who
is/are the author(s) of the article and what are his/her/their qualifications?
·        
What
are the author(s)’ theoretical assumptions?
·        
What
is the article’s hypothesis?
·        
How
is the hypothesis supported or rejected? What makes the supporting points
credible?
·        
How
does the article fit into other literature on the topic?
·        
What
other articles or research support the authors’ main points?
·        
Does
the article advance the work in a given field?
Be sure to review the criteria on the Journal
Article Critique Grading Rubric before beginning this assignment.
·        
Format
of assignment: Current APA
·        
Number
of citations: Minimum of three (3)
·        
Acceptable
sources: Scholarly articles published within the last five years, the course
textbook, and
the Bible

Categories
Criminology

Title: The Exceptions to the Warrant Requirement: Search Incident to Arrest and Exigent Circumstances

his week, you are continuing your study of the Fourth, Fifth, and Sixth Amendments. Respond to 1 of the following questions. Support your answer with at least 1 published court case, such as a case from the U.S. Supreme Court, lower federal courts, or appellate state courts.
What is a search incident to arrest, and what circumstances must exist in order for this exception to the warrant requirement to apply? Next, locate and summarize a published case in which the court discusses a search incident to an arrest. Finally, provide the citation to the case as your reference.
Or
What are exigent circumstances, and what are the various circumstances where exigent circumstances exist?  Next, locate and summarize a published case in which the court discusses exigent circumstances. Finally, provide the citation to the case as your reference.
Discussion Board Reminders:

Categories
Criminology

“Balancing Privacy and Technology: The Legal and Ethical Implications of DNA Extraction from Arrestees and the Use of ShotSpotter Technology in Law Enforcement” The Fourth Amendment and the Use of ShotSpotter Technology: An Analysis of United States v. Rickmon and the Goodman Article

You will create this assignment following the Assignment Detail instructions below.
Review the tutorial How to Submit an Individual Project.
Assignment Details
As recent events have shown, the rapid pace of technology development has created complicated legal questions that are being litigated before the courts today. Select one of the following topics to analyze, and prepare a three to five page paper addressing the following issues.
DNA from Arrestees
One of the most controversial of technological advances is the relationship between DNA, probable cause, and issues of privacy and the Fourth Amendment. You are provided with two research documents below that analyze the case of Maryland v. King, 569 U.S. 435 (2013), in which the U.S. Supreme Court held that it is constitutional to extract DNA from arrestees. The author of the first article provides an overview of the legal issues associated with compulsory DNA collection from arrestees and argues that the U.S. Supreme Court correctly decided the Maryland v. King case.
The author of the second article raises several concerns about the Maryland v. King opinion and the future of privacy and the Fourth Amendment. Read both documents, and then write an argumentative essay explaining your position on the issue of DNA extraction from arrestees.
Complete the following for this assignment:
Read the following 2 research documents:
Deitrich, L. (2015). Say Aah! Maryland v. King Defines Reasonable Standard for DNA Searches. 49 Val. U.L. Rev. 1095.
Click here to access the article.
Noronha, S. (2014). Maryland v. King: Sacrificing the Fourth Amendment to Build up the DNA Database. 73 Md. L. Rev. 667 (2014)
Click here to access the article.
Summarize the key legal and privacy concerns discussed by Deitrich.
Summarize the key legal and privacy concerns discussed by Noronha.
Write an argumentative essay supporting your position relating to those issues raised by Deitrich and Noronha. Indicate the following: 
Whether you agree with both authors or one author over the other, and why;
Whether you disagree with one or both authors, and why;
Discuss your own ideas on DNA extraction from arrestees;
Explain your position in detail.
For background and additional insight into the Maryland v. King case,
Click here to listen to the oral arguments. 
Click here to read the Maryland v. King case. 
ShotSpotter Technology
Another controversial technological advancement has been police departments’ adoption of ShotSpotter technology across the county. ShotSpotter is a sophisticated surveillance system that detects gunshots and pinpoints the location of the gunshots. Once the system’s microphones detect sounds of gunfire, it sends the audio file to the ShotSpotter Review Center where it will be determined whether the sound was indeed gunfire. If it is determined that the sound is gunfire, ShotSpotter notifies the local police department.
In favor of the use of ShotSpotter, you are provided with a case, United States v. Rickmon, and the oral arguments, in which the majority of the Seventh Circuit Court of Appeals held that a ShotSpotter alert could be used to create reasonable suspicion. There also is a dissenting judge in the Rickmon case. You also are provided with an interview with the president of the company that devised ShotSpotter.
Concerns also have been raised about the use of ShotSpotter technology. To support this position, you are provided with an article that questions the use of ShotSpotter and its effectiveness, and Chief Judge Wood’s dissenting opinion in the United States v. Rickmon case. In the article, Mr. Goodman also questions the United States v. Rickmon opinion and raises several concerns about the ShotSpotter technology.
Read these documents and listen to the oral arguments, and then write an argumentative essay explaining your position on the issue of whether ShotSpotter technology is an effective tool that law enforcement should use and whether it should be used to create reasonable suspicion for an investigatory stop, also known as a Terry stop.
Complete the following for this assignment:
Read the following documents and listen to the oral arguments.
Pro ShotSpotter
United States v. Rickmon, 952 F. 3d 876 (7th Cir. 2020).
Click here to access the case. 
United States v. Rickmon Oral Arguments.
Click here to listen to the oral arguments
Williams, C. (2017, May 10). ) How ShotSpotter locates gunfire, helps police catch shooters and works to ‘deformalize’ gun violence. Weblog post. Washington Post – Blogs , Washington: WP Company LLC d/b/a The Washington Post. 
Click here to access the article.
Questions ShotSpotter
Goodman, B. (2021). ShotSpotter – The New Tool to Degrade What is Left of the Fourth Amendment, 54 UIC L. Rev. 797.
Click here to access the article. 
United States v. Rickmon, 952 F. 3d 876 (7th Cir. 2020) (dissenting opinion)
Click here to access the dissenting opinion in the Rickmon case. (Only list the dissenting opinion here, if possible). 
Summarize the key legal points of the Rickmon case and the benefits of ShotSpotter technology.
Summarize the key legal and privacy concerns discussed by the Goodman article and Chief Judge Wood’s dissenting opinion in the Rickmon case.
Write an argumentative essay supporting your position relating to those issues raised by the United States v. Rickmon case and the Goodman article. Indicate
Whether you agree with the majority opinion or the dissenting opinion in the Rickmon case,
Whether you agree or disagree with the Goodman article.
Discuss your own ideas about ShotSpotter technology, how it should be used by police departments, and any constitutional concerns that you may have.
Explain your position in detail.
For additional background and insight into the ShotSpotter technology and constitutional issues, see
Gecas, A.S. (2016). GUNFIRE GAME CHANGER OR BIG BROTHER’S HIDDEN EARS?: FOURTH AMENDMENT AND ADMISSIBILITY QUANDARIES RELATING TO SHOTSPOTTER TECHNOLOGY. 2016 U. Ill. L. Rev. 1073.
Click here to access the article.
Be sure to cite all references in APA format.
Please submit your assignment.
For assistance with your assignment, please use your text, Web resources, and all course materials.
The following grading rubric will be used for this assignment: Grading Rubric.
Assignment Reminders:
Please submit your assignment.
Make sure you submit this assignment by the listed due date. Late deductions will apply for this assignment. Please refer to the Late Submission of Assignment policy.
If you need assistance, please view the Troubleshooting tips.
Resave in the proper format per the Assignment Detail instructions and resubmit.
Submit with a different Web browser.
Submit from a different computer.
Call Technical Support at 877-221-5800, Menu Option 2. They are open 24/7.
If you are still having difficulties after trying steps 1-4, please contact your course instructor.
Instructor’s Comments
There are no instructor comments added at this time.

Categories
Criminology

Title: “H.H. Holmes: The White City Devil and the Psychology of a Serial Killer”

The book is titled: “H.H. Holmes: The True History of the White City Devil” by Adam Selzer and published by Simon and Schuster, 2017. ISBN:1510713468, 9781510713468. 
Requirements:
I. Book Summary
A succinct, yet thorough summation of the chosen book for reading. This
summary should read similar to an abstract or annotation with 
approximately 100 words.
II. Identification / Biographical Information
The offender is identified with a full description, including dates of birth
and death, and geographic information.
III. History of the Offender
Provide background information about the serial killer such as 
childhood, residence, family, etc.
IV. Motives and Theoretical Explanation
Determine a motive for the killing along with a theoretical explanation.
Students must choose a criminological theory that best explains the
commission of the killer(s) crimes.
V. Criminal History
Provide a number of kills – suspected, proven, convicted, claimed /
admitted to, etc. Include dispositions (sentences imposed) as attached to any crimes the offender was convicted of in court. Information about
the kills is required to include details such as victim names, offenses 
included, etc.
VI. Typology
Decide which of the presented typologies would best fit or be used to
describe this particular serial killer. With the choice, provide a definition and description of this typology. Be sure to also include a full application of this typology to the offender and his / her crimes by way of 
connecting details.
VII. Predatory Traits and Crime Scene
Establish whether this particular offender was more organized or
disorganized in their crime scene behaviors. This section should also 
include reference to predatory traits and or criminal paraphilia the 
offender may have possessed.

Categories
Criminology

“The Importance of Speed vs. Charges in Choosing to Run a UC Investigation”

What is the most important factor in choosing to run a UC? Speed of the
results or the potential for greater charges from a grand jury
indictment? Explain your answer.
Choosing the UC is a process. Is it based on speed, potential charges, or is it tactical?
View the information  https://www.news-journalonline.com/story/news/local/flagler/2017/07/04/expert-undercover-stings-important-tool-for-police/20376988007/  as a helpful aid…
Why is an UC investigation useful in a child sex case?
Can you determine which if any aspect of the investigation steps below  is most critical?
Method of Conducting Undercover Investigations
Development of a cover story– 
Agent reports–
Communication– 
Shutdown–  
Content, Presentation, and Receipt of Reports
Daily Activity Report (DAR) – 
Statement of Witness Report (SOR) – 
Time Frame for Results
Fitzgerald, D. G. (2015). Informants, cooperating witnesses, and undercover investigations: A practical
guide to law, policy, and procedure (2nd ed.). Boca Raton, FL: CRC Press, Taylor & Francis Group.

Categories
Criminology

Title: “Exploring the Edward Brooke Papers: A Reflection on Conservatism and Its Evolution in American Politics” The Edward Brooke Papers are a collection of documents that provide valuable insights into the political career and ideologies of Edward Brooke, the first African

write a 1500 words essay about the Edward Brooke papers- What is the document? Who wrote it? When is it from? – What does it say about the definition and role of conservatism? – Why was it compelling or interesting to you? – What was the context in which it was written? – How does it relate to course themes – ideas, media, social movements, or other themes? include info on Sen. Tom Scott and his views on conservatiism

Categories
Criminology

Title: Cyberwarfare in the Ukraine-Russia Conflict: Motives, Effects, and Strategies for Combating Attacks

The structure should be the following: 
Introduction/methodology
Chapter
1 (2200 words approx.)
·      
Overview of the Ukraine-Russia conflict and its impact on
both countries.           
·      
Definition and types of cyberwarfare in the context of the
conflict.
·      
You’re looking at cyberwarfare as an extension of the conflict,
with both sides using computer technology as a weapon.
·      
‘What does a cyberattack hope to achieve?’ Damage to
critical infrastructure? Damage to supply lines? Damage to utilities etc.
Chapter
2 (2200 words approx.)
·      
Motives behind cyberattacks in the Ukraine-Russia conflict.
·      
Psychological effects of cyberattacks on individuals and
society.
·      
How the combatants have used cyberattacks against their
opponent.
·       The possible effects of a successful
cyberattack on the population: What would happen if gas, electric, food supplies were
disrupted? What would the effect be on the populations?
Chapter
3 (2200 words approx.)
·      
Strategies for combating cyberattacks in the context of the
conflict.         
·      
Main arguments
o   Cyberattacks have become a
significant aspect of modern warfare with state and non-state actors using them
to achieve political and military objectives.
o   The Ukraine-Russia conflict has seen
a rise in cyberattacks targeting critical infrastructure government
institutions and individuals leading to widespread disruption and fear.
o   Understanding the psychological
motivations behind cybercrimes in this conflict is crucial for developing
effective countermeasures and promoting peace and stability in the region.
·      
How other countries prevent cyberattacks
·      
A successful cyberattack: Stuxnet
·      
A successfully prevented cyberattack.
Summary
References

Categories
Criminology

Title: Exploring the Social Learning Theory through “When I was a Teenage Felon”

For this Deep Dive, you will need to watch Episode 10 of Season 2 of “When I was a teenage felon”. Select ONE theory covered in Modules 2-7 and answer the following questions. Make sure to concisely apply all aspects of the theory and provide at least one academic reference to support your arguments.
1.    Explain your chosen theory. Specifically, define the (a) assumptions, (b) level of explanation (micro, macro), and (c) its central concepts (propositions). 
2.    Apply those key concepts to explain Sean’s criminal behavior. Use specific examples described in the show that support the theory. 
3.    Identify at least two limitations of your chosen theory for explaining Sean’s behavior. What other theory (or theories) could address these limitations and why?
4.    According to your chosen theory, what could be done to prevent criminal behavior more broadly? 
You may have free access to this show depending on your streaming services. Otherwise, this is available for $1.99 from YouTube. 
Questions to Answer In This Deep Dive
1. Explain the theory. Specifically, define the (a) assumptions, (b) level of explanation (micro, macro), and (c) its central concepts (propositions). 
2. Apply those key concepts to explain Sean’s criminal behavior. Use specific examples described in the show that support the theory. 
3. Identify at least two limitations of your chosen theory for explaining Sean’s behavior. What other theory (or theories) could address these limitations and why? 
4. According to your chosen theory, what could be done to prevent criminal behavior more broadly?

Categories
Criminology

“Exploring the Rules of Procedure: Applying Florida Law to the Case of Rompilla v. Beard”

Introduction
There are hundreds of jurisdictions in the United States on the state and federal level. Each jurisdiction can have its own set of laws, including rules of evidence and procedure that govern how an individual’s rights are protected. A defendant may receive greater protections in one state jurisdiction than in another. During our review of the material, in the book, understand that often you’re learning about federal law or common law. However, Florida law mirrors federal law very closely. For example, the Federal Rules of Evidence and Florida Rules of Evidence are nearly identical substantively and are even numbered similarly. Florida simply adds a “90” in front of its rules of evidence. Federal Rule of Evidence 403 is 90.403 in Florida. As we learn more about the different laws that govern criminal procedure feel comfortable that your knowledge will be easily applied to any Florida scenario. Unless specified, please use Florida law when answering your assignments.
Case
View the video–Court Shorts: Right to CounselLinks to an external site.. Read the case of Rompilla v. Beard, in Chapter 12, Page 499 of your textbook; Was He Denied His Right to “Effective” Counsel?
Directions
Each FRCP assignment is an opportunity for you to explore and learn more about the rules of procedure for Florida. The rules of procedure are extensive, but once you learn to navigate them they will provide answers to most criminal procedure questions a person may encounter. You will apply the rules of procedure that are relevant to the legal scenario in your book. To complete your FRCP Assignment, you must:
Identify two rules of procedure that apply to the legal issues discussed in the case;
Summarize the meaning of two rules, including the relevant subsections;
Explain why you think the rules apply to the legal issues in the case (support your opinion by citing specific references to the language in the case).