National Security Policy Issues

How did the wars with Native Americans influence the early need for national security?

The Native Americans refer to indigenous people who live in North America within the boundaries of the continental United States. Cultural differences between the Native Americans, and immigrant Europeans caused political tension and ethnic violence. These people took arms to defend their nation. Before the war, the number of Native Americans dwelling in the United States was estimated to be more than one million.

By 1800, the population dropped to 250,000 because the Native Americans were involved in several wars. The wars ranged from the 17th century to the beginning of the 18th century. These wars include the Pequot war of 1637, Anglo Powhatan wars, King Philip’s War, King William’s war among others. During the American revolutionary war, most Native Americans collaborated with the British to reduce settlement and expansion on their land. They also sided with the British during the Chickamauga wars in 1776 and 1777. In 1787, the Native Americans defeated the American army, which was led by Arthur St. Clair.

They fought white settlers in the Second Seminole war. These wars were a result of conflicts between Native Americans, the United States Army, and American settlers. The Indian wars influenced the early need for national security. It also established several treaties with the Native Americans as a security measure. The United States government established effective armed forces to curb these wars. The concept of national security was developed in the United State of America after the Second World War. During World War II, more than 44,000 of the Native Americans were recruited in military service1.

They were recognized by being given things such as Air Medals, Bronze Stars among other things. The Native Americans loved a military job as it elevated one’s status and provided a steady income among other privileges. This intensified security in the United States, as there were enough workforces to curb any outside aggression from any state2. Native Americans also influenced the need for security. The whites saw that the Native Americans were bold thus needed unity to avoid any uprising within the United States. Their loyalty was considered paramount for the prosperity of the United States.

Identify and recall examples of National Security through Expansion. National security through expansions

There are several examples of the National Security through Expansion. One example of national security through expansion is through promoting democracy. This form of national security enhances security through protecting, consolidating, and enlarging the community of free-market democracies. When President Bush invaded Iraq, he hoped to establish a democratic government that would act as a role model to other Middle East countries.

This, he believed, would stabilize the region thus minimize the threats imposed on America and her allies. Overseas presence is another example of national security. This involves deploying the United States military forces abroad in peacetime. For instance, United State military forces were deployed in Iraq during the time of war. The other example is through the Continental Expansion, and in this case, The United States would conquer and control, purchase or make treaties with other countries.

This would make the United States develop robust diplomatic ties with these countries thereby being able to monitor their security power. The purchase of Guam, after World War II, led to the capture of Aguinaldo in 1901. A significant expansion occurred after the Mexican- American War in 1948. Mexican was made to sell its northern territories to America. The treaty of Guadalupe-Hidalgo made California and the Southwest states unite making the USA continent expand considerably.

After the revolution, the U.S. had only 13 former British colonies in the Southeast and Northeast. Colonies to the south and west of the original colonies were also possessed through concessions and buying3. An outstanding example is the purchase of Louisiana in 1803 by which the country territory doubled. At the battle, of Wounded Knee, many Sioux were killed and the survivors displaced to Pine Ridge Reservation.

Explain and analyze National Security policies before, during, and immediately after (up to 1946) World War II. National Security Policy

Congress passed this act making a unified defense body with autonomous service in the Central Intelligence Agency with separate service in the air fighting soldiers and the National Security Council (NSC). The council members of NSC were the president, the vice president, the secretary of state, and some members of other security bodies. The CIA emerged out of the Office of Strategic Services and small post-war intelligence organizations4. This marked a decisive regrouping of the U.S. National Security framework to address the inconsistencies in the world. The implementation of this act was faced with different challenges such as errors, false starts, and it was a slow process. This policy mandated substantial reorganization of the U.S. military and foreign policies.

The policy of containment (1946)

It was considered as the mother of the United States Strategy for fighting the cold war with its rival the Soviet Union. This policy was put forward by a career foreign service officer George f. Kennan. He argued that the major concern of any United States policy with the Soviet Union should be of a long-term, patient, strong and continuous containment of Russian expansive tendencies5. He pointed out that the continuous use of counterforce at a series of constantly different political and geographical areas, corresponding to the invasion of the Soviet policy would encourage tenderness that will make the Soviet Union weak and eventually break. This policy was criticized for being too defensive.

The policy of unilateralism

State policies were considered unilateral if they had an enormous impact on citizens of other countries. Through this, a country could make decisions without listening to the views and suggestions of other countries. America believes that its interest lies by not underestimating how far the threats are or how small these threats are. However, America believes that where they can make a change, they have to do so. Other nations do not stop them to ensure their interest is not compromised. The U.S. interest in ensuring geopolitical stability is seen as being the superpower with global economic interest.

Identify and analyze examples of the changes to National Security during the Cold War?

Changes in national security

In 1949, the National Security Council was redesigned. Truman ordered that the Secretary of the Treasury attend all meetings. Congress scrapped the three service secretaries from council membership. The Vice President was added to the council, and he assumed the second rank from the Secretary of State. Joint Chiefs of Staff were made permanent advisers to the Council. In late 1950 and 1951, Truman made additional structural changes in the National Security Council. He allowed the head of the newly created Office of Defense Mobilization to attend the National Security meetings. In 1951, the Psychological Strategy Board was created to evaluate the response to Soviet cold war tactics.

Explain and analyze the key strategic events in Iraq between 1990 and 2010.

Four Presidents handled the U.S. policy in the Middle East differently during those years. Which decisions were most influential and how might one apply lessons learned to influence any of those decisions?

Strategic events in Iraq

In July 1990 president, Sadaam invaded Kuwait. He accused Kuwait of supplying flooding oil in the market. This he said led to a flood of oil in the market a thing that made Iraq unable to boost her weak economy. On August 2, 1990, Kuwait reported Iraq to the UN. These led to the imposition 1990-1991 America considered Iraq as a threat to her interests. This led President Bush to send troops to Iraq.

When it was, viewed that Saddam was adamant US soldiers crushed Iraq soldiers. The Iraq soldiers were made to surrender after 100 days. UN Security Council on April 2, 1991, passed resolution 687. This required Iraq to dismantle all chemical as well as biological weapons in her possession. The UN in April 1995 passed resolution 986 creating an oil for food program to cater to the citizen’s food needs. In1996, the CIA hired Saddam officers to assist in the coup. These officers were told they would be recognized as genuine leaders of Iraq. Unfortunately, Saddam loyal officers recognized and exposed them.

They were tortured and executed. In December 1998, Saddam claimed that the UNSCOM would not continue with its inspection in Iraq. This led to President Clinton ordering his soldiers in Iraq to bomb Iraq military areas for four consecutive days. In February 2001, the US and Britain bombed Iraq to weaken Iraq Air Force. The US then on November 26, 2001, threatened Iraq by telling her that she has to allow UN inspectors back to her country. On March 28, 2002, the Arab League convened and deliberated that Iraq should allow UN inspectors to continue their inspection.

The power vacuum left in the Middle East will soon extend to South Asia and Iran is the link between the two. Using the DIME principles, what should America do in each category to deal with the threat to American interests posed by Iran?

The U.S. then invaded Iraq in March 2003. Generally, Tommy Franks led the military operation. The main reasons for the invasion were to end the Sadaam era, eliminate any Islamic militants in Iraq, and to get more information about militant networks, destroy any mass destruction weapons, which could be there. The invasion also aimed to create a representative and compliant government to act as an example to all failed states6. On April 9, 2003, Baghdad came down and this led to the capture of Iraq’s President Saddam. He was arrested on December 13, 2003, in operation Red Down. There emerged uprisings against coalition forces and among different secretarial.

Elections

On January 31, 2005, the citizens of Iraq elected Iraq Transitional Government to draft a long-lasting constitution. There was some violence and some communities. Sunni refused to participate in the elections. Kurd and Shia took part in the elections. On April 21, 2003, the Coalition Provisional Authority was formed as a transitional government of Iraq. It was to be effective up to when a democratic government would be established.

It had a mandate of exercising executive, judicial and legislative roles. In 2008, the Iraq government and the U.S. approved the status of the Forces Agreement effective through 2012. On January 1, 2009, the Green Zone and Presidential palace were handed over to the Iraq government. This was seen to symbolize that Iraq’s sovereignty had been fully restored.

The president who handled the U.S. policy well in the Middle East was President Bush. This is because, by invading Iraq, there was a delivery of the Iraq citizens from the dictatorship. This acted as a warning to emerging dictators to know that there is no room for dictators in the world. The invasion also acted as a warning to any country or group that may wish to attack the U.S. The invasion also demonstrated that the U.S. was ready to use its unilateral policy to deter any potential threat to its citizen or its allies.

Iran influence on Iraq

Iran would not try to increase its efforts to establish an influence on Iraq. That was because there was a strong diplomatic relationship between Iraq and the U.S. Iran would fear that by having an intimate relationship with Iraq, it might lead to exposure of its nuclear plans to the U.S. This may bring its downfall. Iran would then fear that Iraq might act as a spy since their relationship is sour. The U.S. was helping Iraq to reconstruct itself and having their soldiers trained; Iraq soldiers would pose a threat to Iran in case it tried to influence Iraq in any way.

The power vacuum left in the Middle East will soon extend to South Asia and Iran is the link between the two. Using the DIME principles, what should America do in each category to deal with the threat to American interests posed by Iran?

The threat that Iran imposes to America can be dealt with by ensuring that Iran is not military superior. This can be achieved by liaising with the UN to keep a watch on weapons produced by Iran. The US can also establish formal diplomatic ties with other Middle East countries. The U.S. can convince the International Atomic Energy Agency to be more vigorous in its mandates. To force Iran to comply fully with the UN demands, the U.S. can impose segregating diplomacy, military options, and economics. Since the US is aware that Iran is a threat to it then it should employ some spies to give information on every military move that Iran carries. The US can hinder Iran’s wealth creation by coursing with its allies not to do business with Iran.

The U.S. is leaving Iraq so quickly because its “democratic” government did not want to sign a status of forces agreement protecting the U.S. troops deployed there. This was the response from the “democratic” government.

What do you believe is the political future of Iraq and do you expect Iran to increase its efforts to establish influence in Iraq? Is Iraq more or less prone to control (I did not say support) terrorism now than before the invasion?

Political future of Iraq

Iraq has now achieved political gains from the invasion. There is a democratic government, which is elected by people without intimidation. The leaders are now cautious not to be dictators as they have seen what happened to Saddam. The government is willing to propagate the rights and freedoms of its citizen7. There is also an international intimate relationship to provide necessary advice on the need. The military training offered by the U.S. soldiers to Iraq soldiers will help the government to be able to curb down any terror uprising. Iraq now having established a formal diplomatic relationship with the U.S. and can obtain military support fast in case of any terror. Iran’s influence on Iraq will not be observed with suspicions. Military expertise would make Iraq be in a better political position.

Iran influence on Iraq

Iran would not try to increase its efforts to establish an influence on Iraq. This is because there exists a strong diplomatic relationship between Iraq and the U.S. Iran would fear that by having an intimate relationship with Iraq, it might lead to exposure of its nuclear plans to the U.S8.

Reference List

Armstrong, Jennifer. The American Story. Texas: Texas Press, 2006.

Barton, David. American History. Canada: Viking Adult, 2004.

Dempsey, Hugh. Native American History. California: Bisson Books, 1979.

Gaddis, John Lewis. Surprise, Security, and the American experience. London: London, 2005.

Jones, Steve. “Post War Policies.” United States New Policies, 2009: 19-23.

Maqstadt, Thomas. An Empire if you can Keep It. Hong Kong: CQ Press, 2004.

Shanker, Thom. Counter Strike. London: Oxford Press, 2007.

Zinn, Howard. A People’s History of the United State. Chicago: Hill Press, 2005.

Footnotes

  1. Hugh, Dempsey. Native American History. California: Bisson Books, 1979.
  2. Jennifer, Armstrong, The American Story. Texas: Texas Press, 2006.
  3. Maqstadt, Thomas. An Empire if you can Keep It. Hong Kong: CQ Press, 2004.
  4. Steve, Jones. “Post War Policies.” The United States New Policies, 2009: 19-23.
  5. Howard, Zinn. A People’s History of the United State. Chicago: Hill Press, 2005.
  6. John, Lewis Gaddis. Surprise, Security, and the American experience. London: London, 2005.
  7. Thom, Shanker. Counter-Strike. London: Oxford Press, 2007.
  8. Howard, Zinn. A People’s History of the United State. Chicago: Hill Press, 2005.
Read more

American Juvenile Justice System

Youth crime has been increasingly on the rise over the past years. It is caused by numerous factors, ranging from social inequality to the influence of popular media. As young people are integrated into criminal justice, they are faced with harsh realities of consequences for actions which could influence their whole life. Therefore, it is important that the juvenile justice system uses a competent and fair approach to punishment of youth. Juveniles should not be sentenced as adults or housed in adult prisons. When juveniles commit egregious crimes, they should undergo evaluation, assessment, minimal confinement and enter into rehabilitation programs that provide treatment or offer opportunity for personal development.

Problem

Juvenile delinquency is a highly controversial and emotional topic which leads to challenges of confronting it. The issue of juvenile justice is inherently complex, with risk factors for delinquency interconnected. The causes of juvenile crime may range from mental health issues and lack of stability or attachment to problems at home and at school leading to violence, trauma, drug use, and family history of criminal behavior. The primary problem explored in this paper is the commonality of youth tried as adults, thus resulting in harsher punishments and integration into the adult penal system despite the juvenile justice system being established as a separate entity decades ago.

Defining Juvenile

When faced with the term juvenile, most assume it applies to individuals that are under the legal age of adulthood (commonly 18 years of age) in the jurisdiction. Therefore, this should apply to the juvenile justice system. However, the legal definition of a juvenile is complex, nor is it fixed or universal in criminal justice systems. It depends strongly on the historical, ideological, and political developments of youth justice models and institutions. The concept of creating a separate juvenile justice system is based on the premise that youth are generally less culpable than adults, thus more susceptible to rehabilitation. Thus, they should be kept away from difficult and punitive conditions of the adult penal system. The policy establishes an age for juvenile courts based on age or a presumed maturity (Abrams, Jordan, & Montero, 2018).

Another aspect to consider is the Minimum Age of Criminal Responsibility (MACR) that identifies the minimum age at which an individual can be held accountable for crimes and the Age of Criminal Majority (ACM) when a person can be prosecuted with the full force of the law, subject to adult penalties. The United States has generally symbolized efforts to lower ACM in most states to 16, with some states setting precedent of transferring youth to adult systems as young as 12 given appropriate circumstances.

This greatly contrasts with European countries which attempt to promote extending the ACM and often provide protections for young people for several years afterward, allowing adult courts to waive individuals back to the juvenile system (Abrams et al., 2018). This greatly aggressive tactic in the United States is problematic and causing significant issues for rehabilitation attempts and recidivism rates.

Juvenile Justice History and Statistics

The first elements of the juvenile justice system in the United States began to emerge at the end of the 19th century as urbanization led to high rates of youth crime. The standard was to severely punish such crime and give long prison sentences, which appalled early reformers. The idea behind the creation of the juvenile system is based on the theory that youth benefits more from care and direction rather than isolation and punitive measures. The institutional legitimacy of the juvenile court took hold with the consideration that it is partially the responsibility of the state to act as a parent, particularly for those children without proper support structures, such as orphans or children from troubled families (Tanenhaus, 2018).

In the 1950s and 1960s, there was much public concern and debate regarding the juvenile system as it was viewed as ineffective. The Supreme Court made a series of rulings, including Kent v. the United States which identified that juveniles were not provided rights that adult criminals would have nor given the adequate protections and rehabilitative treatment that a child should have. In 1967, on the case of In re Gault, the Supreme Court expanded rights of minors facing charges.

In 1969, another Supreme Court case that the standard of evidence and conviction “beyond a reasonable doubt” must be applied to juvenile courts as well, which was not done beforehand. The 1975 case of Breed v. Jones establishes protections of youth against double jeopardy, particularly when it plays a role in the transfer to adult courts. The 2005 case Roper v. Simmons determined that it is unconstitutional to sentence minors to the death penalty. However, there is some differentiation between juvenile and adult courts, such as McKeiver v. Pennsylvania established that jury trials and some other adult constitutional rights are not applicable to minors (Meng, Segal, & Bogden, 2013).

After the softening of juvenile penalties in the mid-20th century, violent crimes continued to increase which led to a significant turnaround in the 1990s. States began to pass strict punitive laws, such as mandatory sentencing and blanket transfers to the adult penal system. This trend continued for some time, and only recently is the public and expert opinion beginning to support rehabilitation-focused practices again (Meng et al., 2013).

In 2017, there have been approximately 809,700 juvenile arrests made, which is at approximately 2,400 per 100,000 persons aged 10 to 17. This rate is 59% lower than a decade ago and demonstrates a 5% annual decrease (Office of Juvenile Justice and Delinquency Prevention, 2018). Overall, juvenile delinquencies have been decreasing, particularly for violent crimes.

Policing Perspective

Start.

Significance

Handling of Juveniles

A range of scientific research has identified that youth and adults have developmental differences and needs. This affects decision-making processes, which is more susceptible to lack of impulse control and peer pressure for youth. Research also shows that punishing young people with similar severity as adults does not promote successful rehabilitation or protect public safety. With maturity, youth will be less likely to engage in recidivism with appropriate resources.

Implementing adult-level punishments extends incarcerations which lower the opportunity for rehabilitation outside the penal system. Youth involved in the criminal justice system commonly come from difficult families and neighborhoods, experiencing or witnessing a wide range of violence and trauma. Incorporation into the adult penal system presents a further risk of aggravation for youth by creating the risk of sexual abuse, assault, and even suicide. It also leads to a denial of access to essential programs and rights such as educational counseling that can impede their re-entry into the communities and fundamental development needs (Juvenile Law Center, n.d.).

A significant concern in the handling of juveniles, a reflection of the adult system, is the extent of racial, ethnic, and economic discrepancies and discrimination for youth delinquents. Certain minority groups are overrepresented in the early stages of processing in the juvenile justice system which is concerning. Despite the African-American population compromising only 14% of the US population, black youth were involved in 36% of the delinquency cases (Claus, Vidal, & Harmon, 2017).

This is the effect of what is known as disproportionate minority contact (DMC) which is the context of police arrest and further processing of minorities in the penal system. While contextual factors such as poor socioeconomic environments and lack of educational attainment may contribute to the disproportion, it does not fully explain the phenomenon. The symbolic threat theory which suggests that racial stereotypes and profiling lead to the greater exposure and contact of minorities with the justice system.

In turn, DMC leads to significantly different handling of youth cases in court. Legal factors depend on crime severity, as discrepancies are more evident in minor crimes. For example, black youth are more likely to be formally processed, charged, and placed in correction placement than white youth for minor drug-related offenses. Racial and ethnic minority youth are more likely to receive harsher penalties such as being committed to a correctional facility or charged as an adult (Claus et al., 2017). This suggests that the handling of youth delinquents is both disproportionate and intentionally targeted towards minorities to place harsher punishments on them rather than promote rehabilitation.

Actions and Applicable Laws

Approximately 16,000 youth at any given time are locked in juvenile facilities without sentencing, with some not yet having a trial while others are awaiting disposition, essentially being held in prison without being committed (Sawyer, 2018). This is already a worrying trend which inherently allows for abuse of the system that forces youth to be transferred to the adult system without oversight or conviction or to be incarcerated for relatively minor offenses such as a technical violation or status offense.

The Office of Juvenile Justice and Delinquency Prevention (OJJDP) under the supervision of the U.S. Department of Justice has been taking concrete steps at evaluating alternatives to incarceration and supporting a wide range of state and community programs which offer opportunities for delinquents. The OJJDP has published guidelines for law enforcement and courts to follow to prevent unjust incarcerations, racial discrepancies, and transfer of minors to the adult system. In cases where incarceration is necessary, the OJJDP is exploring the options and effectiveness of reentry services to ensure a fluid transition to society (Calleja, Fisher, & Fernandez, 2016).

Minimum age laws, referring back to ACM, exist in 18 states which prohibit youth to be tried as adults and therefore undergo incarceration in adult prisons (Barnert et al., 2017). The legal Supreme Court cases discussed earlier outline the fundamental legal rights around juvenile cases which must be followed to ensure the Constitutional rights of the individuals. It has been recognized on numerous occasions by the highest court of the country that youth should be considered less blameworthy than adults, thus able to achieve rehabilitation, a court decision which should set precedent for lower-level courts (Juvenile Law Center, n.d.).

Otherwise, there are no legal frameworks or national laws guiding the juvenile justice process and incarceration. Procedures and sentencing are determined by the courts based on the socio-political trends and cannot be effectively reviewed or overturned without a long and complex court battle. A lack of appropriate legislation and transparency in the juvenile system is greatly concerning as it often leads to instances of harsh penalties and youth tried as adults. Furthermore, as described earlier, it creates a possibility for the abuse of power by courts and juvenile detention facilities which cannot be regulated without a proper legal framework.

Long-Term Effects

The most prominent argument for juvenile transfer to adult court and incarceration is public safety to ensure full accountability in accordance with the full letter of the law which is applied to adults. For particularly violent and egregious crimes, the public believes that strengthening sanctions will guarantee the prevention of recidivism. However, most people fail to consider long-term impacts on youth having to undergo transfer to adult court and imprisonment, which can be significant.

Extensive research demonstrates that juvenile adult incarceration is largely ineffective at reducing future criminal behavior or recidivism, potentially increasing it as juveniles face abuse, challenges, and criminal influence in the adult penal system. Most experts universally agree that lacking the opportunities and a support system in place in adult prisons, juveniles are more likely to experience negative outcomes, the likes of which are recidivism and re-arrest (Loughran et al., 2010).

The effects of juvenile to adult transfer extend beyond criminal justice and influence area. Evidence demonstrates a significant reduction in stability and earning potential later on in life, even if educational attainment was similar (quality of education was not examined). However, being processed through the adult system leads to a public adult criminal record that often restricts most job or educational opportunities (Taylor, 2015).

Youth are not provided required rehabilitative services in the adult system, which causes both, limitations on a healthy social and emotional development, as well as understanding the severity of their crime. Furthermore, juveniles are at a significantly higher risk in adult penal systems, facing dangers of sexual victimization or assault as statistically proven. As a result, they may be faced with lifelong trauma which will influence their mental health. Youth incarceration with adults leads to loss of liberty and identity with numerous restrictions on their ability to become wholesome human beings and responsible citizens later on as they become tethered to the criminal justice system (Gilman, Hill, & Hawkins, 2015).

Solution

The extent of punishment for juvenile delinquents has been largely dependent on public opinion, which is often based on misinformation and stereotypical portrayals of young violent offenders. Public policy discussions have been inconsistent over the decades, ranging from supporting rehabilitation to implementing harsh adult punishments. It is vital to determine a balanced solution that would present an adequate level of consequence while offering protection and opportunity for change for minors. Research indicates that reducing ACM and introducing lenient regulation is more effective in managing juvenile crime than harsh punishments and adult incarceration which are directly linked to recidivism later in life (Munyo, 2015).

Procedure and Sentencing Review

The first solution is meant to demonstrate a very passive approach that does not inherently implement any changes but shows a symbolic effort to resolving the issue. A review of sentencing and procedure protocols is warranted given that juveniles which are transferred to adult courts are given longer incarceration sentences or harsher terms of punishment (Lehman, Chiricos, & Bales, 2017). The latest trend of diverting youth away from the court system has failed to improve the process of formal prosecution of juveniles. This leads to a number of problems including a lack of quality legal representation, poor understanding of the court process by the defendant and their family, as well as vulnerability to the harsher sentencing options based on the circumstance.

The increased power given to juvenile courts to deal with young offenders will inherently impact the rest of their life. It is vital to ensure that an effective system of checks and balances exists to monitor these powers. Introduction of administrative review mechanisms that review cases and provide safeguards and protections for youth delinquents will ensure a fairer process of due trial and impact sentencing (Allison & Armitage, n.d.). In turn, this can prevent unjust decisions which lead to juveniles tried as adults or facing disproportionately harsher penalties.

Alternative Punishments

Introducing alternative punishments to incarceration and adult trial would be an incremental approach in creating a resolution to the issue. A wide variety of alternative methods have been proposed by experts, law enforcement, and policymakers, with many of them focusing on rehabilitation and guidance to prevent recidivism of crimes. Such mechanisms provide a greater focus on helping the young person to understand the weight and consequence of the crime, enable therapeutic processes to deal with any mental or emotional challenges which led to the crime and help to focus on greater integration into the community.

Therapy

Evidence-based practice demonstrates the effectiveness of therapy with youth, particularly those displaying opposition and conduct issues. Family therapy is helpful as an alternative punishment to incarceration as it helps for stronger family integration and ensuring stability. The sessions attempt to improve relationships and communications, which often play a role to some extent as the reason why the crime was committed.

The therapy approach focuses on empowering youth on realizing their errors and affect the change in their own lives. Some goals of therapy include mitigating risk factors and eliminating antisocial behavior (Karam, Sterrett, & Kiaer, 2015). The court can oversee this alternative punishment by ordering therapist evaluations and mandatory weekly sessions which must be followed to prevent incarceration.

Community-based Approaches

As more evidence emerges regarding juvenile delinquency and there is growing public concern regarding the conditions that youth experience in incarceration, community-based programs have emerged as an appropriate and humane alternative. This approach seeks to introduce local community programs which focus on treatment-oriented initiatives and rehabilitation. They provide homelike and non-correctional environments aiming to help youth find their way.

Such programs are well-supervised and have strong supporting staff, offering small, peer-led services. These programs highlight community service as a method of giving back to the community as a manner of payback for the committed crime. Youth development is also at the core of such programs, helping to create leadership experiences and opportunities to grow, both personally and academically (McCarthy, Schiraldi, & Shark, 2016).

Policy Change

Public policy has historically had a profound impact on the juvenile justice system in the US. Therefore, competent and widespread policy change, ranging from national to state and local levels is the most drastic solution out of all of them. Despite a recent trend of a more adjunctive approach, the US juvenile system remains largely punitive, with strong measures toward violent crime offenders and minorities. A solution would be to reform policy to focus on a restorative justice approach as it is successfully done in Europe and Australia. While in the US restorative justice takes second place behind punitive measures, in other countries it has become a statutorily mandated measure.

Restorative justice is a process where stakeholders and parties involved in the offense attempt to collectively resolve the aftermaths of crime. It is an inherently dialogic nature of justice, focusing on sentencing circles and victim-offender mediation. Restorative justice forces juveniles to reflect and engage in conversation and solution, positively impacting the development process and rehabilitation (Artello, Hayes, Muschert, & Spencer, 2015).

Implementing restorative justice into policy is a challenging process, particularly in socio-political environments where it is not widely accepted. Restorative legislation must balance the needs of the community with those of the offender. The most effective mechanism would be to include restorative provisions in statutes or penal codes that could be used to influence and guide juvenile court intents and practices.

Furthermore, hinging the evaluation of all levels of the criminal justice system on restorative justice as a method to determine funding eligibility may be effective as well. While the OJJDP strongly encourages and attempts to provide coordination of alternative responses, including restorative justice, to juvenile delinquency, it still remains only an agency which provides recommendations. It is vital to pass federal legislation, led by the US Department of Justice, which would set national standards for juvenile justice reform and shift the general trend towards restorative justice. Finally, it is important that restorative justice principles are clearly articulated in state law, ensuring a balanced approach and promote aspects of juvenile accountability (Pavelka, 2016).

Discussion

Trends in the Justice System

The juvenile justice system has been undergoing rapid reform over the last decade in the attempt to depart from harshly punitive measures of the 1990s which influence policy and court decisions to this day. Policy makers in national and state legislations are attempting to rebalance approaches to youth delinquents and improve the overall quality of the justice system. A number of initiatives are being proposed as policy including restoring independent jurisdiction to juvenile courts and divert youth away from the system.

The trend is to implement responsible fiscal accountability and promote distribution of resources that would enhance community alternative and seek better outcomes. Furthermore, the importance of risk factors and mental health is more recognized as both a causative factor and consequence of juvenile crime, leading to investment in appropriate response services. Finally, comprehensive efforts are being made to address racial disparities in the national criminal justice systems at all levels as the country faces an identity crisis regarding racial discrimination which reflects on the juvenile justice system as well (National Conference of State Legislatures, 2015).

Biblical Worldview

The Bible says “Yet the Lord longs to be gracious to you; therefore he will rise up to show you compassion. For the Lord is a God of justice” (Isaiah 30: 18-19, New International Version). Christianity views God as the pinnacle of justice, fully gracious, righteous, and graceful. God is able to manifest grace, mercy, but also toughness and being able to teach a lesson to those that deserve it. Applying Christian perspectives to the justice system has been done historically, and the United States, as a predominantly Christian country, has deeply involved religion in the process.

However, the recent trends of overcriminalization and harsh incarceration have deviated away from Christian principles. The biblical worldview suggests that human beings are not perfect, and deserve justice and mercy, with lives worthy of respect. The relationship between man and God should be fostered by cultivating morality and virtue. Religion stands for just causes of eliminating social inequality which is often the cause of crime and advocates for proportional punishment and rehabilitation (Eckman, 2017).

Introducing spirituality into the juvenile justice system as part of the method to assist social workers and other staff can significantly improve the well-being of youth. A diversity of religious practices, led by Christianity, can become proven coping mechanisms for the young people as well as structure the nature and ultimate objective of the correctional system. For example, historically, the Catholic church offered biblical guidelines to justify and determine the punishment for each behavior.

The guidelines can potentially aid juveniles in comprehending their actions and consequences of the punishment (Villa, 2016). While the modern justice system is a state entity, separate from religion, many principles of compassion, forgiveness, and spirituality can be utilized for the purpose of reform for the system and rehabilitation of youth.

Conclusion

Juvenile justice is a complex and controversial topic. It is particularly difficult to address when crimes are repeated or highly violent. Youth should not be sentenced or punished as adults, allowing for the opportunity for rehabilitation. It is evident that although there are attempts being made to improve the juvenile justice system, it is still broken and often has negative long-term impacts on young lawbreakers. It is better for society and the criminal justice system to ensure that juvenile justice is reformed through competent policy and efforts are made towards the rehabilitation of juvenile offenders which would prevent them from entering the adult criminal system.

References

Abrams, L. S., Jordan, S. P., & Montero, L. A. (2018). What Is a juvenile? A cross-national comparison of youth justice systems. Youth Justice, 18(2), 111-130. 147322541877985. Web.

Allison, M., & Armitage, S. (n.d.). Sentencing reviews for juvenile offenders: The need for a judicial mechanism. Web.

Artello, K., Hayes, H., Muschert, G., & Spencer, J. (2015). What do we do with those kids? A critical review of current responses to juvenile delinquency and an alternative. Aggression and Violent Behavior, 24, 1–8. Web.

S Barnert, E., S Abrams, L., Maxson, C., Gase, L., Soung, P., Carroll, P., & Bath, E. (2017). Setting a minimum age for juvenile justice jurisdiction in California. International Journal of Prisoner Health, 13(1), 49-56. Web.

Calleja, N., Fisher, J., Fernandez, M. (2016). Reducing juvenile recidivism through specialized reentry services: A second chance act project. OJJDP Journal of Juvenile Justice, 5(2), 1-11. Web.

Claus, R. E., Vidal, S., & Harmon, M. (2017). Racial and ethnic disparities in the police handling of juvenile arrests. Crime & Delinquency, 64(11), 1375–1393. Web.

Eckman, J. (2017). The church as an advocate of justice. Issues in Perspective with Dr. Jim Eckman. Web.

Gilman, A. B., Hill, K. G., & Hawkins, J. D. (2015). When is a youth’s debt to society paid? examining the long-term consequences of juvenile incarceration for adult functioning. Journal of Developmental and Life-Course Criminology, 1(1), 33–47. Web.

Juvenile Law Center. (n.d.). Youth tried as adults. Web.

Karam, E. A., Sterrett, E. M., & Kiaer, L. (2015). The integration of family and group therapy as an alternative to juvenile incarceration: A quasi-experimental evaluation using parenting with love and limits. Family Process, 56(2), 331–347. Web.

Lehmann, P. S., Chiricos, T., & Bales, W. D. (2017). Juveniles on trial: Mode of conviction and the adult court sentencing of transferred juveniles. Crime & Delinquency, 64(5), 563–586. Web.

Loughran, T. A., Mulvey, E. P., Schubert, C. A., Chassin, L. A., Steinberg, L., Piquero, A. R., Fagan, J., Cota-Robles, S., Cauffman, E., … Losoya, S. (2010). Differential effects of adult court transfer on juvenile offender recidivism. Law and Human Behavior, 34(6), 476-88. Web.

McCarthy, P., Schiraldi, V., & Shark, M. (2016). The future of youth justice: A community-based alternative to the youth prison model. New Thinking in Community Corrections, 2. 1-35. Web.

Meng, A., Segal, R., & Boden, E. (2013). American juvenile justice system: History in the making. International Journal of Adolescent Medicine and Health, 25(3), 275-278. Web.

Munyo, I. (2015). The juvenile crime dilemma. Review of Economic Dynamics, 18(2), 201–211. Web.

National Conference of State Legislatures. (2015). Trends in juvenile justice state legislation 2011-2015. Web.

Office of Juvenile Justice and Delinquency Prevention. (2018). Juvenile arrests. Web.

Pavelka, S. (2016). Restorative justice in the States: An analysis of statutory legislation and policy. Justice Policy Journal, 2(13), 1-23. Web.

Sawyer, W. (2018). Youth confinement: The whole pie. Web.

Tanenhaus, D. S. (2018). Juvenile justice in the United States. Oxford Research Encyclopedias: American History. Web.

Taylor, M. (2015). Juvenile transfers to adult court: An examination of the long-term outcomes of transferred and non-transferred juveniles. Juvenile and Family Court Journal, 66(4), 29–47. Web.

Villa, J. (2016). Multicultural training for mental health professionals working in the juvenile justice system. Web.

Read more

Identification, Collection and Preservation of Evidence

Abstract

For five types of evidence— drugs, firearms, glass, paint, and tool marks—the processes of identification, collection, and preservation were explained. For each type, it was established how to detect relevant evidence at the crime scene and judge its importance for further investigation. Also, necessary precautions and appropriate procedures for gathering evidence of all five types were described. Finally, it was explained how to deliver the evidence to the laboratory in a way that enables successful forensic analysis. Several general principles of collection and preservation were found, including keeping evidence intact (except for firearms that should be unloaded for safety) and packaging everything separately.

Introduction

Upon the initial walk-through at the crime scene, the next step is to properly identify and collect evidence and to ensure that it will be appropriately preserved for further analysis. The general crime scene procedures are similar for different types of physical and trace evidence, and the general principle is the same—to collect everything that can assist in solving a crime and in making sure that it is unaltered and not contaminated so that nothing interferes with analyzing it—but the specificity of different types of evidence should not be overlooked because they may present different complications on the collection and preservation stages (Saferstein, 2013). Five types of evidence were chosen to describe their proper identification, collection, and preservation: drugs, firearms, glass, paint, and tool marks.

Drugs

Drugs are defined as “any substance in violation of laws regulating the sale, manufacture, distribution, and use of drugs” (Saferstein, 2013, p. 81). Various types of regulated substances exist, and drugs come in many forms, which is why an investigator may overlook the presence of drugs at the crime scene. However, “common sense is the best guide in such situations” (Saferstein, 2013, p. 267). Anything that can be suspected to contain illegal substances should be treated as evidence. This may include powders, powdered crystals, granular substances, pills, dried leaves and other plant parts, and suspicious liquids (Millen, 2013). The presence of certain objects associated with drug use and drug production can indicate the presence of drugs at the crime scene, too; these objects include used syringes, burnt spoons, manually rolled cigarettes, laboratory equipment, and razors.

The collection of drugs at the crime scene is estimated as relatively simple, but several complications may occur. First of all, different packaging may need to be applied to different types of drugs due to different chemical and physical characteristics. Labeling evidence before delivering it to the laboratory is necessary. Moreover, it is recommended that investigators, when collecting substances suspected of being drugs, indicate for analysts the context of the collection, i.e., where exactly the sample was collected and what surrounded it. The practice of working with evidence shows that this indication can significantly reduce the time needed by analysts to identify substances (Saferstein, 2013). Since the list of controlled substances in the United States is “extremely flexible” (Saferstein, 2013, p. 268), the illegal status of certain substances may be reconsidered at any time, but any evidence suspected of being a dangerous drug that is confirmed to cause physical and psychological addiction should be collected with proper tools, including bags, envelopes, and possible scalpels or razor blades if suspicious substances need to be scraped off a surface.

Being organic substances or synthetic chemical compounds, drugs are more likely to be contaminated than some other types of physical evidence, which is why their preservation is crucial. To avoid loss or cross-contamination, drugs should be packaged reliably, and their original packaging normally meets this requirement of preserving the original content (Baxter, 2015). Complications may arise with volatile drugs, such as solvents used for sniffing. A container for them should be airtight to ensure that the solvent does not evaporate. In case the collected substance’s actual component that is regulated as a drug is lost, the substance may become inadmissible in court.

Firearms

Important pieces of evidence that can be collected at a crime scene are any types of firearms as well as discharged or intact ammunition suspected of being involved in a crime. Firearms usually come in two forms: handguns and long guns. Firearms identification is the study of weapon characteristics that allows identifying whether particular ammunition items detected at the crime scene were fired from certain firearms. The inner surfaces of gun barrels, known as bores, are rifled, i.e., spiral grooves are impressed on them, for the purpose of spinning a bullet when it is fired. The striation of rifled barrels, i.e., the pattern of striae, grooves on the bore, is unique, which means that markings on a bullet can theoretically allow identifying the gun from which it was fired (Saferstein, 2013). Detecting firearms and bullets or cartridges at the crime scene rarely involves complications.

Firearms may have important evidence on them, such as fingerprints, which is why the specialist who collects them should wear latex gloves and hold them carefully in the areas that were unlikely touched by a person who fired them. This will prevent scratching, contaminating evidence with grease, the presence of investigators’ fingerprints on a gun, and other possible complications. Also, firearms may have substances on and inside them that can indicate when guns were fired, which is why it is important to package these pieces of evidence into plastic bags. If bullets need to be extracted from any surfaces at the crime scene, an investigator should use tweezers (if the bullet is close to the surface), but the extraction should be carried out carefully not to scratch the bullet (Fisher & Fisher, 2012) because it may display a pattern that will allow identifying the firearm from which it was fired.

Although firearms are less vulnerable than some other types of physical evidence, such as chemical compounds or organic substances, it is necessary to deliver them to the laboratory as soon as possible because the early analysis is more likely to indicate when a gun was fired. To prevent contamination and physical damage, firearms and ammunition should be packaged in plastic bags. However, before this, it is necessary to unload the weapon to prevent accidental discharge because safety is the main consideration (Saferstein, 2013). Concerning bullets, they need to be wrapped in tissue paper and put into an envelope; the wrapping is needed to preserve minute evidence that may be present on the bullet, including chemical substances or fibers. Under normal conditions, not many factors can cause the inadmissibility of firearms and ammunition in court.

Glass

There are two primary purposes of forensic analysis of glass fragments or particles: first, they may contain minute traces of evidence indicating who contacted this glass; second, they may be analyzed for their origin. The former is needed in such cases as breaking and entering, burglary, or similar cases where offenders break glass with illegal intentions. Fragments of broken glass may contain fibers of suspects’ clothes, drops of their blood, or other indicators of who broke the glass. In terms of establishing the origin of glass fragments, it may be needed in hit-and-run accidents for identifying a vehicle involved in an accident (Saferstein, 2013). Also, bullet holes in glass may be subject to forensic analysis. Identification of glass fragments at the crime scene rarely involves complications.

Concerning the collection of glass evidence, the first rule for an investigator is to gather all the glass fragments that can be found at the crime scene. For example, in investigations of hit-and-run accidents, collecting all the shattered parts of the headlight and reflector lenses of a vehicle that escaped the accident scene is crucial because matching these fragments with glass that remained in the suspect vehicle can become ultimate evidence for placing the vehicle at the crime scene. Therefore, any shattered glass should be appropriately collected if “even the remotest possibility exists that fragments may be pieced together” (Saferstein, 2013, p. 362). Since glass fragments can be sharp and dangerous, appropriate safety measures should be taken by an investigator to prevent cuts and breakages of packaging. Glass should be collected carefully to prevent further breaking and placed in paper bindles and then in envelopes, boxes, or cans (Spear, Rush, Massetti, Weigand, & Traughber, n.d.). Bindles are needed to prevent loss and edge damage.

Concerning preservation, glass is known to be chemically inactive, i.e., not many substances can affect the composition of glass, and it does not react with most substances that it can contact under normal conditions. However, glass is fragile, which is why it is needed to place large fragments, especially those that are not flat, in boxes to prevent further breaking. Also, despite the resistance of glass to chemical influences, traces of evidence that can be found on glass may be affected by contamination, which is why preservation from contaminants is still required.

Paint

Paint is important evidence because it covers various surfaces and can be easily transmitted from one object to another, either in liquid or dried forms, thus indicating a contact and possible involvement in a crime. Identification of paint traces at the crime scene is often associated with the search for paint chips, i.e., small particles of dried paint that peeled off a surface. Even the smallest paint chips should be collected because as small amounts of them as 20 micrograms (Saferstein, 2013) can be used in the analysis. Therefore, identification may require scrutiny, but it is justified by the importance of this evidence for placing suspects at the crime scene.

Saferstein (2013) particularly describes the procedures of collecting paint in investigating hit-and-run accidents. In these cases, paint chips are usually found on the clothes of people involved in the accident, on vehicles, on near them. It is especially stressed that paint chips should be kept intact, which is a rather difficult task due to their thinness and fragility, which is why the collection should be carried out “with the utmost care” (Saferstein, 2013, p. 350-351). A way to do it is to use tweezers or a piece of paper to pick paint chips up. Glass and plastic vials should be used as containers. Also, if the paint is smeared on an object, it is better for an investigator to package the entire object and deliver it to the laboratory than to try to scrape paint off. In hit-and-run accidents, paint from undamaged parts of suspect vehicles should be collected, too, for the purpose of comparison.

In terms of preservation, it is noteworthy that paint can be contaminated by the presence of various chemicals, which is why it is necessary to isolate it from exposure to any substances until it is delivered to the laboratory (Fish, Miller, Braswell, & Wallace, 2013). Also, when collecting different samples (from damaged areas, undamaged areas, deeper layers of previous paint, and so on), an investigator should make sure to use disposable scalpels every time to prevent cross-contamination of different paints, thus preserving them for analysis.

Tool Marks

On various surfaces and objects at the crime scene, marks can be found that can be attributed to something that served as a tool in the investigated crime. These marks may include “impression, cut, gouge, or abrasion“ (Saferstein, 2013, p. 214). Identifying tool marks can be challenging because the tool itself may be absent, which significantly increases the number of mark types to be searched; besides, it is not always evident which marks at the crime scene are relevant to the crime (by being caused by the contact with an instrument of crime) and which may be irrelevant because they had appeared before the investigated crime was committed. In identifying a tool mark, it is important that an investigator should not fit the suspect tool into the mark because any contact will alter the mark and complicate or make further analysis impossible.

For the collection of evidence, the entire object with a tool mark should be packaged and delivered to the laboratory. In case the transportation of such an object is impractical, the mark should be photographed, or a cast should be made with liquid silicone. However, this will significantly reduce the chances of successful individualization of the mark to the suspect tool.

The value of tool marks as evidence is that they allow placing a suspect tool at the crime scene, but in order to prove the connection, both the mark and the tool should be properly preserved, and any contacts between them or between the mark and other objects and the tool and other objects should be prevented. For example, in burglaries, paint found on a tool can serve as valuable evidence, as “paint [chips] adhering to the mark or tool provide perhaps the best example of how the transfer of trace physical evidence can occur as a result of using a tool to gain forcible entry into a building” (Saferstein, 2013, p. 216). Loss or destruction of physical evidence on a suspect tool or a tool mark can make this evidence inadmissible in court.

Conclusion

Five types of evidence have been addressed to determine how they should be identified at the crime scene, collected, and preserved. The types of evidence are drugs, firearms, glass, paint, and tool marks. It has been shown that pieces of evidence may vary to a large extent in terms of difficulty to detect them, process, and deliver to the laboratory. However, there are general principles applicable to all of them: as many pieces of evidence should be collected as possible; everything should be properly labeled and accompanied by some context to facilitate further analysis; evidence should be kept intact (with the only exception of safety considerations: firearms found at the crime scene should be unloaded); and separate packaging is required in most cases to prevent cross-contamination. It can be concluded that a proper and thorough approach to the identification, collection, and preservation of evidence is crucial in solving a crime.

References

Baxter, E., Jr. (2015). Complete crime scene investigation handbook. New York, NY: CRC Press.

Fish, J. T., Miller, L. S., Braswell, M. C., & Wallace, E. W. (2013). Crime scene investigation (3rd ed.). New York, NY: Anderson Publishing.

Fisher, B. A., & Fisher, D. R. (2012). Techniques of crime scene investigation (8th ed.). New York, NY: CRC Press.

Millen, P. (2013). Crime scene investigator: True stories of forensic detection. London, UK: Constable & Robinson.

Saferstein, R. (2013). Forensic science: From the crime scene to the crime lab (2nd ed.). Boston, MA: Pearson.

Spear, T., Rush, J., Massetti, J., Weigand, J., & Traughber, M. (n.d.). Evidence packaging: A how-to guide. Web.

Read more

Security Systems and Loss Prevention

Conducting Risk and Vulnerability Assessments

Risk management refers to the process of setting up various measures within an enterprise for the purpose of addressing any identified risks and thus, entails plans to avoid, reduce, spread transfer, eliminate, as well as accept risks. However, for effective risk management and vulnerability assessments, there are important elements to put into consideration (Garcia, 2011). For example, in the case of a large retail enterprise that has recently experienced an increase in customer volume, an increase in product theft, and an increase in work-related injuries, and workplace violence incidents, there would be a need for a risk and vulnerability assessment.

Some of the elements to look for include the possibility of a negative event occurring, the impacts of the event on the operations of the enterprise, as well as the identification of aspects within the enterprise which may some additional attention.

A number of questions would be important to identify and assess the enterprise-level risk and vulnerability issues such as what can has gone wrong, what is the probability that the risk will occur, as well as what are the expected consequences of the risks.

It is important for companies to conduct risk and vulnerability assessments. This can be attributed to the assessment of risks and a company’s level of vulnerability provides awareness of risks and hazards in any given organization. Secondly, such a process is important in that it identifies the target of any risks (Garcia, 2011). Thirdly, the risk and vulnerability assessment process is important in that it provides information on the adequacy of any control measures within a country as far as their efficiency in preventing and eliminating risks are concerned. As such, a company is able to prioritize hazards as well as control measures based on information from the assessment.

Reference

Garcia, M. (2011). Vulnerability assessment of physical protection systems. Boston, UK: Butterworth-Heinemann.

Defining a Threat

The definition of any threat is important during the vulnerability assessment process. Defining a threat provides the necessary information to site managers for the purpose of adopting appropriate measures to counter the occurrence as well as the impacts of the expected threat. In most of the cases, the effective definition of a specific threat for a community is based on the historical evidence of the area to prove that a threat is imminent (Garcia, 2011). If I were to analyze my community’s history of past events, some of the elements that I would still consider as imminent threats to my community today include climate change, cyber-attacks, bioengineered pandemic and nuclear war.

The increased release of harmful emissions to the atmosphere is a potential threat to global warming and subsequently, climatic change. Secondly, improved technology has brought with it adverse consequences such as cybercrimes as well as biological weapons that can have adverse effects on people and the environment. On the other hand, increase in political conflicts all over the world has increased the demand for more powerful weaponry. This has raised the fear that the occurrence of nuclear war is imminent. This is based on the fact that there have been two incidents where nuclear weapons were used-Nagasaki and Hiroshima during the World War II.

It is important to prove that threats are properly defined and identified. This is done through listing the necessary information regarding the concerned threat, the collection of the potential threat’s information, as well as ensuring that it is organized into a usable manner.

Reference

Garcia, M. (2011). Vulnerability assessment of physical protection systems. Boston, UK: Butterworth-Heinemann.

Physical Security

Physical security refers to the measures that are adopted for the purpose of preventing any unauthorized individuals from accessing resources, equipment, and facilities. Thus, this type of security is also aimed at ensuring that property and personnel are safe from harm or damage. Various approaches can be adopted to deal with any form of physical security. For example, several physical security measures are used in my community nowadays including the use of physical barriers, natural surveillance, security lighting, alarms and sensors, access control, as well as video surveillance.

The physical barriers used included vehicle barriers, walls, and fences which are considered to be the outermost layer of security (Fennelly, 2012). As such, they make intrusions a bit difficult through the definition of a facility’s perimeter. Natural surveillance refers to the incorporation of security concerns into the design of facilities. In this case, spaces are left during the construction of facilities such that it is possible to see any entry of unauthorized individuals.

Security lighting acts as a source of fear to intruders. On the other hand, alarm systems and sensors are used for the purpose of alerting security any unauthorized access. Similarly, surveillance cameras installed in visible areas are used for verifying incidents and analyzing incidents’ history.

All the outlined measures are effective in regards to crime control and prevention. In spite of this, with the increased crime cases despite the availability of physical security measures, there is still a need for the improvement of physical security within the community. To improve the physical security measures in the community, creating awareness of the need for better and operational security measures through security training. The access control is more efficient as the approach combines various security systems.

Reference

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

The 3D Approach

The 3D approach to human space assessment can be defined as a process that involves the design and use of a particular space for the purpose of ensuring that they are applied in the right manner. For this reason, it is important to base safety and security on the dimensions of human space since it ensures that measures are implemented prior to the occurrence of any criminal activities. Such an approach ensures that the opportunities for crime are reduced by designing and using human space appropriately.

There is a close relationship between environmental design and criminal behaviors. It is theoretically believed that different types of urban environments can lead to various criminal behaviors in a number of ways (Crowe, 2011). For example, the characteristics of urban environments have adverse impacts on the people living in them. These features include overcrowding, pollution, and noise, among others.

On the other hand, the environmental engineering formula has a lot of impacts on the social features of individuals within a community. This is based on the fact that the there are various features within a community triggered by the environmental design, which affect the social relationships of the people living in such environs. For example, the engineering formula can lead to characteristics such as dehumanization, anxiety, and loneliness that can trigger criminal behavior.

It is important for homeowners and businesses to focus on the appropriate development and management of environmental space as this reduces the probability of developing negative characteristics that might eventually lead to the adoption of various criminal behaviors among individuals.

Reference

Crowe, T. (2011). Crime prevention through environmental design in the twenty-first century. Boston, MA: Butterworth-Heinemann.

Situational Crime Prevention, Opportunity Blocking and the SARA Model

Community policing is considered to be a strategy in the form of a philosophy used in the promotion of organizational approaches for the purpose of supporting the adoption of partnerships as well as other problem-solving approaches aimed at proactively addressing community problems and conditions that might trigger criminal behaviors (Crowe, 2011). There are three main components of community policing, which include the establishment of community partners, organizational transformation, and problem solving.

Situational crime prevention refers to the process of focusing preventive measures on crime hotspots, while opportunity blocking is the strategy where organized crime activities are deliberately hampered.

The SARA problem-solving model is an approach used in community policing for the purpose of formulating the process to be followed whenever solving any problems within the community. In most of the cases, the SARA model is used by law enforcement agencies and it is divided into four stages including scanning, analysis, response, as well as assessment (Sorensen, 2009). It is very important as far as helping in overall mission of crime prevention and community policing is concerned in that its separate stages provide a proper sequence that is easy to follow to ensure that the set objectives are achieved easily.

For example, the scanning step ensures that problems within a community are identified and prioritized. The analysis stage on the other hand, provides more information about the identified problems through research. The response stage allows the concerned agency to develop solutions that can be adopted in reducing the occurrence as well as extent of the identified problems. The last stage is the assessment phase where the response provided is evaluated to determine whether or not it is successful.

It is important for law enforcement to work with the community in crime prevention efforts in order to get firsthand information about the problems the community has.

References

Crowe, T. (2011). Crime prevention through environmental design in the twenty-first century. Boston, MA: Butterworth-Heinemann.

Sorensen, L. (2009). Economic misery and crime waves. Rockville, MD: Sikyur Publication.

Regulatory Compliance

The safety of the workforce is a very important element that must be given consideration whenever designing any security programs within an organization. This is attributed to the fact that there are various needs and demands of the workforce in any company that ought to be complied with for all security programs for a chance of such programs to be successful. Some of the standards and regulations that security programs must follow in regards to security operations that affect life and workplace safety include the Gramm-Leach-Bliley, Sarbanes-Oxley, FISMA, credit card process, and HIPAA (Fennelly, 2012).

In addition, the success of any security program is tied to the available risk standards as well as any associated regulations. For this reason, it is important for security programs to have strictly defined risk standards and regulations. Such an approach ensures that there are platforms that can be used in the assessment of any security attacks within an organization. Having set standards and regulations ensures that the necessary measures to deal with any security can be developed and effectively implemented.

Therefore, it can be considered that the availability of such standards and regulations gives the company an opportunity to assess, identify, and respond to risky situation with regard to the set standards and regulations. Furthermore, such standards and regulations are important as far as organizational compliance to security management is concerned.

Security companies are audited to determine their compliance with life and workplace safety standards. However, there are cases where companies are found to be out of compliance with regard to the life and workplace safety standards. In such cases, the company is compelled to adopt a compliant security system.

Reference

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

S.O.X. The Sarbanes-Oxley Act of 2002

The Sarbanes-Oxley Act of 2002 administered by the United States Securities and Exchange Commission has significant implications for physical and information security programs. This is attributed to the fact that the Act sets out laws and regulations that govern the operations of any organization as far as their security programs are considered.

There are a number of strategies that are adopted to ensure that records and any other information stored does not get compromised (Fennelly, 2012). Some of these measures include the implementation of access control and the use of encrypting technology. The access control tools such as PIN numbers and passwords are used to ensure limited access to any information. The implication is that only authorized individuals can access such records and hence, minimizes cases of stored information being compromised. In addition, information encrypting is used to ensure that only specific individuals with the access key to decrypt such documents can access it. Such approach is effective in that unauthorized individuals cannot access the stored information.

There is no definite time for a security company to retain records although it is advisable to have such records permanently. This is because there is no certain time when risks might occur. There are instances when a security company is audited but does not provide all the requested documentation from a record. In such a scenario, penalties, fines, and disallowances are imposed, which could have adverse impacts as far as the reputation and financial position of the security company are concerned.

Reference

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

Access Control

In any organization, there is certain extent of control as well as security that ought to be maintained. However, achieving the needed control depends entirely on the significance of the security interest alongside its sensitivity and nature. A “restricted area” can be described as any area whose access is limited to a specific person or group of people (Fennelly, 2012). In most of the cases, restricting a given area is a security measure and it is done to ensure that only limited number of people have access to the restricted area. This is done to lower the cases of external security threats (Fennelly, 2012). For this reason, individuals with the access to “restricted area” are always accountable for any breach of security in such areas.

Restricted areas are classified as exclusion areas, limited areas, or even controlled areas (Fennelly, 2012). A controlled area refers to a part of a restricted area that is next to, or surrounds an exclusion or limited area. However, in such areas, there is no control of movement for unauthorized individuals. Secondly, limited areas refer to restricted areas that are next to the area of security interest. In such areas, movement of individuals is controlled. Lastly, the exclusion area represents a restricted area that hosts the security interest. Movement in such areas ought to be controlled since the lack of such control allows unauthorized people to access areas of security interest.

During the design and the development of a physical protection system within a company, the classification of restricted areas is important. This is based on the fact that such grouping makes it easy for security personnel to monitor the restricted areas for the purpose of ensuring that there are no unauthorized people to such areas.

Reference

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

Information Technology

Technology plays a significant role in enhancing security. One of the most important skills for a security systems designer is to understand TCP/IP (Transport Control Protocol/Internet Protocol). The Transport Control Protocol/Internet Protocol refers to an internet suite if protocol that is used in the provision of reliable, ordered as well as error-checked octets’ stream that operate on hosts and communicate through an internet protocol network. As such, the TCP/IP comprises of two layers whereby the higher layer is the Transport Control Protocol, while the lower layer is the Internet Protocol.

While the work of the TP layer is to ensure that a file or even a message is assembled in to smaller transmittable packets, the IP ensures that all the packets are send to the appropriate destination. This done by adding information regarding in packet’s address. For this reason, it is important to understand how TCP/IP works for development of security systems, as such knowledge is important for the assessment of the efficiency of any security measures adopted. On the other hand, a security program designer would not want to solely rely on the technology installer in regards to the understanding of how this system works as it does not provide clear details.

Understanding how the Transport Control Protocol/Internet Protocol works is very important to any security designer as well as generally for any security initiative. This is attributable to the fact that with such knowledge, it becomes easy to identify areas that are vulnerable to security attack (Fennelly, 2012). In addition, the knowledge about the operation of TCP/IP helps in effective design and development of strong security systems. As such, the lack of the understanding on how TCP/IP works puts any security system at risk of attack since all security measures adopted while developing such a system must be based on the operations of the Transport Control Protocol/Internet Protocol.

Reference

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

Categories of Information

Information cannot be categorized into standard units. In spite of this, there are logical groups which can be used to distinguish various forms of information. These groups include private and personal information, national security information (which is further divided into classified and unclassified information), and lastly the business information (Fennelly, 2012).

The personal and private information can be described as information that has a lot of significance to an individual, though it would have some level of importance to the business and the government as well. Some examples of private information include a person’s likes and dislikes, salary, phone number, address, weight, as well as age. In spite of the fact that such information is personal it is important to develop a security program aimed at ensuring that such information remains secure. This is attributable to the fact that there are individuals who are interested in such information for criminal action since it is valuable.

Business information on the other hand, refers to any information that pertains to business and may include aspects such as the number of employees, business transaction, returns, and losses. Such information can be further subdivided into corporation trade secret, corporation proprietary, corporation sensitive, corporation private, as well as corporation internal use (Fennelly, 2012). Based on the significance of business information, it is important to have security programs to protect it from individuals who would wish to use it for self-interests.

Government information refers to information about the operations of any government such as policies, and security details. Such information ought to be protected to prevent any internal and external attack. There are numerous risks of leaving information unprotected but the most significant one is that actions give potential unauthorized users of such information easy time to carry out their attacks.

Reference

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

The Role of the Corporate Security Manager

A Corporate Security Manager (CSM) refers to an individual put in charge of the overall security in any given corporate institution (Fennelly, 2012). As such, a corporate security manager plays significant role as far as enhancing the security of any given area is concerned. Some of the duties and responsibilities of a CSM include the management of the daily security operations in any institution, supervising the corporate security team, identifying and making recommendations regarding security measures to be adopted in any institution.

By managing the security operations, the CSM ensures that all activities within his jurisdiction are carried out according to the requirements of the corporate and that there are no cases of unauthorized access to restricted areas and classified information (Fennelly, 2012). As a supervisor, the corporate security manager ensures that the security team members are carrying out their daily tasks in line with the set standards and policies. On the other hand, an individual mandated with the role of the corporate security management ought to identify, assess, as well as recommend any appropriate security measures that ought to be implemented in a given institution to ensure that all company’s assets and information is protected.

A CSM is important in the development of information and physical protection systems and generally in the information protection industry. This is attributed to the fact that the CSM that all the necessary security measures and procedures are taken into consideration when developing any security systems.

Reference

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

Response Tactics

Security officers in any organization are mandated with the duty of responding to security incidents. As such, the efficiency with which such individuals respond to any security issues determines the success of the security initiative adopted. One of the major responsibilities of a security officer is incident response. According to Fennelly (2012), there are certain “standards of performance” which are likely to affect the security officer’s ability to successfully respond to incident.

First, security officers ought to be aware of various legal requirements as far as plant protection and industrial security are concerned. A security officer differs from a police officer in that they cannot enforce the law and hence, they are only mandated to protect goods and services within an organization (Fennelly, 2012). As such, their objective is to ensure that the operations of any organization are smooth as opposed to the enforcement of law. In spite of this, there are special cases when security officers can be required to arrests any offenders but such cases can only be applicable if the offense committed is a felony. In addition, the security officers must be authorized to make the arrests by a superior officer.

The standards of performance affect the security officer’s ability to successfully respond to incident in that they have to follow certain laws and regulation when responding to an incident. For example, they are not allowed to make any arrests unless it is within the set requirements of the standard performance.

There are a number of risks associated with the role of the security officer if the standards of performance are not adhered to, such as being dismissed from job, or prosecuted for failing to follow the required standards.

Reference

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

Security Threat Procedures

In any security attack, the involved security officers are exposed to a number of threats and security-related incidents. This is attributable to the fact that these individuals are in direct contact most of the time with perpetrators of criminal activities (Braga, 2010). As such, some of the threats a security officer may be exposed to include bodily harm, psychological harm, loss of property, as well as death. For this reason, there is a need for effective measures within an organization that ensure the protection of organization’s security personnel (Fennelly, 2012).

First, security officers ought to be aware of how to respond to alarms. As such, they ought to have basic knowledge regarding the strategy of protective as well as fire alarm systems as such circumstances are common in organizations. Being aware of how such systems function would help them respond effectively and avoid the consequences of such security risks.

Secondly, there ought to be the necessary training regarding the duty of care among the security officers. Such a duty describes reasonable actions that the officers can engage in when faces with various situations. As such, the duty of care ensures that the officers can secure and protect a crime scene as required. With such knowledge, the security officers are able to protect themselves to risk of bodily harm or even death.

On the other hand, the security officers ought to be aware of ways to identify and respond to emergency situations (Fennelly, 2012). For this reason, organizations should create and develop emergency response procedures and ensure that they are effectively used to reduce the risk of exposure to security threats among the security officers.

References

Braga, A. (2010). Gun violence among serious young offenders. Washington, DC: United States Department of Justice.

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

Domestic Violence Prevention

Legally, domestic violence refers to the psychological, sexual, as well as physical abuse on one’s spouse or child that can take the form of assault, bodily harm, physical harm, emotional abuse, threats, manipulation, as well as sexual abuse among other types of behaviors that are adopted by individuals as way to maintain power, intimidation, and fear. It can also be defined as the act of inflicting harm (bodily or otherwise) on family members.

Victims of domestic violence vary since such mistreatment is discriminatory in terms of age groups, sexual orientation, religion, race, and social class. In spite of this, the other immediate victims of domestic violence are friends, co-workers, employers, grandparents, parents, children, and family. Nevertheless, in most of the cases, women and children are the major victims of domestic violence.

Although there is no theoretical background on the reasons why domestic abusers engage in such acts, there is a common belief that the gender analysis of power plays a significant role to the occurrence of domestic violence (Fennelly, 2012). In spite of this, there are concerns that early traumatic life experiences, personality disorders, and having been abused during one’s growth can be instrumental in the development of emotional problems leading to domestic violence. In addition, insecurity and jealousy can fuel emotional behaviors whereby the violent tends to consider themselves being inferior or even inadequate to the victims.

On the other hand, there are concerns that changes within the society such as the advocacy for equal rights have led to rage and hostility among individuals who are different in terms of gender, race, social class, or even age groups. However, everybody is ultimately responsible for domestic violence prevention, and this can be done through spreading awareness of the consequences of domestic violence.

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

Identity Theft

Identity theft refers to the crime where an individual knowingly uses another person’s data to carry out criminal activities. There are numerous types of crimes that are associated with identity theft and in most of the cases such activities are aimed at deception, and fraud (Braga, 2010). Deception is whereby individuals use other people’s identity to get things that do not rightfully belong to them.

For example, mails are lost through when a certain person obtains custody, and remove contents of a given mail through false representation. On other instances, identity crime is carried out when dishonored checks are issued to an individual as a result of deception. Fraud cases resulting from identity theft are many. For example, forging of document to conceal one’s identity as well as assume another identity is common incident nowadays (Braga, 2010). As such, individuals tend to use identity as well as other documentation belonging to other people to defraud or to cause injury.

An individual’s identity can be stolen in a number of ways. For example, an individual’s identity can be stolen in public places through “shoulder surfing”, or even where the criminals get details from certain conversations that tend to reveal particular information about a person such as credit card number or calling card number.

Secondly, identity criminals obtain other people’s information from discarded “pre-approved” credit cards that are not disposed effectively. In other cases, people lose their identity to criminals through the use of public facilities such as through the interception of mail in scenarios where one’s mails are delivered in areas where other people can access. On the other hand, one’s identity can be stolen through phishing.

To prevent identity theft, people should exercise caution when using their details in public or even over the internet. People wishing to learn about identity theft can visit government and non-governmental sites addressing issues related to identity theft.

Reference

Braga, A. (2010). Gun violence among serious young offenders. Washington, DC: United States Department of Justice.

Terrorism

Understanding the fundamentals of terrorism plays a significant role in combating terrorism. This is attributed to the fact that measures adopted ought to align with the basics of terrorism. As such, the lack of the fundamental knowledge of terrorism makes it quite hard to develop effective measures of dealing with terror problems.

Defining the term terrorism is quite challenging since different people have different aspects of what terrorism entails. However, it is considered to be a type of violence that is motivated as well as premeditated by politics and is targeted on noncombatant targets (Hudson, 2011). In most of the cases, terrorism activities are meant to bring about a certain influence on a given audience. As such, international terrorism can be considered to be a terror activities carried out by individuals from more than one country. On the other hand, the domestic terrorism is defined as the terror activities involving citizens from one country.

Terrorism can be categorized into various groups such as transitional and international, domestic and international, social, religious, political, revolutionary, nationalistic, ethnocentric, and separatist. The various categories of terrorists are based on their general objectives and affiliation. For example, domestic category of terrorists operates within a country’s borders, as opposed to international ones who can carry out terror activities in any country of interest depending on their intended influence.

Some of the motives of terrorism include invoking fear, harm people, as well as cause some significant influence (Hudson, 2011). To achieve such motives, the terror groups often attack a given section of people, wound, as well as kill some individuals. A number of resources are used at the local, state, and federal levels to combat terrorism including creating awareness regarding terrorism and how to avoid be recruited to terror group, as well as having strict laws and regulation to prevent incidents of terrorism by blocking terror individuals from gaining access to restricted areas. Such measures are effective as awareness reduces the number of people joining terrorism, while having access controls reduces cases of terror attacks.

Reference

Hudson, R. (2011). The sociology and psychology of terrorism: Who becomes a terrorist and why. Charleston, SC: CreateSpace Publishers.

Crisis Management

A crisis management team refers to a team created in an organization for the purpose of responding to any warning signs regarding a potential crisis, as well as adopting the appropriate pans to deal with such problems. For this reason, this team is considered to be highly efficient as far as handling as well as de-escalating a crisis is concerned.

The functions of a crisis management team include to detect early signs regarding a potential crisis, identify any challenges anticipated in a given area, obtain feedback form employees regarding a given concern within an organization, preparing crisis management, as well as help organizations and employees to deal with any problems that they encounter courageously. Such approaches are often adopted to ensure that an organization and its employees are not adversely affected in terms of their productivity following the occurrence of a crisis (Coombs, 2007).

Crisis management differs from incident management in that, while crisis management focusses at the detection of potential crisis’ signs, the incident management process identifies, categories, investigates, corrects, and prevents recurrence of any potential incidents.

Incident management entails the plans that are adopted with regard to a disruption in the operations of an organization or region. As such, incident management focuses on returning activities to their normal state. On the other hand, crisis management involves the adoption of plans that are implemented as protective and defensive measures with regard to an organization’s reputation, products, services, and brand. As such, crisis management is strategic, communications-oriented, and reputation-focused, while incident management is tactical, action oriented, and operations-focused.

Reference

Coombs, W. T. (2007). Crisis management and communications. Institute for public relations, 4(5), 6.

Corporate Policy and Procedure

Corporate policy and procedure plays a significant role in the successful operations of any organization. Similarly, it is important for companies to have clearly defined security and safety policies and procedures for a number of reasons. This is attributable to the fact that such policies and procedures help to ensure that there is consistency, productivity, as well as efficiency of business administration. This is achieved easily since all the employees and the managers are aware of what is expected of them at any given time. Security and safety policies and procedures are very important in ensuring that all organization’s employees are vigilant as far as security attacks are concerned and hence, carry out activities in line with the security requirements within the company (Bulgurcu, Cavusoglu, & Benbasat, 2010).

There are several topics that are available in a safety and security policy. Some of these topics can include measures to adopt in case of a security attack, steps to follow in order to counter a given attack, as well as approaches used to identify and respond to a security threat. A policy is described as a predetermined course of action within an organization, that is used in the provision of guidance as far as the organization’s objectives and strategies are concerned. On the other hand, a procedure is a plan that contains the steps to be followed for the purpose of implementing an organization’s policy.

FEMA help companies and organizations develop emergency management plan by offering the necessary support and guide regarding the right approaches to emergency management. In the event of a man-made or natural disaster, FEMA provides various resources to the affected communities including material support such as food, shelter, and immaterial support such as funds.

Reference

Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.

References

Braga, A. (2010). Gun violence among serious young offenders. Washington, DC: United States Department of Justice.

Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.

Coombs, W. T. (2007). Crisis management and communications. Institute for public relations, 4(5), 6.

Crowe, T. (2011). Crime prevention through environmental design in the twenty-first century. Boston, MA: Butterworth-Heinemann.

Fennelly, L. (2012). Handbook of loss prevention and crime prevention. Waltham, Mass.: Elsevier.

Garcia, M. (2011). Vulnerability assessment of physical protection systems. Boston, UK: Butterworth-Heinemann.

Hudson, R. (2011). The sociology and psychology of terrorism: Who becomes a terrorist and why. Charleston, SC: CreateSpace Publishers.

Sorensen, L. (2009). Economic misery and crime waves. Rockville, MD: Sikyur Publication.

Read more

The Freedom of Information Act

The Freedom of Information Act (FOIA) is a federal law that was ratified by the United States Congress in 1966 (Pozen, 2005, p.634). Under this law, the federal government agencies (i.e., FBI, CIA, etc.) are legally compelled to provide information to the public on a need basis (Kreimer, 2007, p.1149). Any individual, including U.S. citizens, academic institutions, and organizations (as well as foreign nationals) can file an FOIA request. In 1974, the Act was modified to enhance agency compliance. It was also revised in 1996 to allow better access to electronic information (National Security Archive, 2009, par 1).

Benefits associated with the Freedom of Information Act

FOIA requests are more suitable for those individuals and organizations that want to make large requests that comprise numerous dissimilar types of confidential and non-confidential documents. Whereas confidential documents are subject to Mandatory Declassification Review (MDR), the Freedom of Information Act covers confidential as well as non-confidential materials. In case an FOI request is denied, the requester can appeal the decision within the federal agency and then institute legal proceedings against the agency in the court of law. However, the requester is barred from instituting legal proceedings in the court if the duration for processing his/her MDR request has not expired. FOI requesters are thus advised to seek MDR only if they have ample knowledge about the record they need (National Security Archive, 2009, par 5).

Risks associated with the Freedom of Information Act

There are a number of problems that a requester can run into during the FOIA process. These include:

Delays. It is important to note that FOIA offices may take time to respond to an FOIA request since these offices receive numerous FOIA requests. Thus, requesters are advised to submit precise requests that will make it easy for the FOIA officers to locate the required document swiftly (National Security Archive, 2009, par 11).

Operational File Exemption. There are a number of federal agencies that are exempted from FOIA review requirements. These federal organizations that enjoy operational file exemptions include the National Security Agency (NSA), National Geospatial-Intelligence Agency (NGA), and National Reconnaissance Office (NRO). These organizations are allowed by this law to exempt whole or part of their operational files from being subjected to the search/review requirements as stipulated by FOIA (National Security Archive, 2009, par 12).

Dubious Secrecy. FOIA has homogenized language as well as precise directives for redaction processes. However, differences might emerge in relation to the decision to hold back information, both within and between federal agencies. These discrepancies may exist during the appeal process and follow through to a final decision (National Security Archive, 2009, par 13).

Recommendations on how to improve the Freedom of Information Act (FOIA)

Although the FOIA program provides a useful avenue with regard to information dispensation, it is highly decentralized and has numerous and different DOD Components missions, functions, organizations, and locations. As a result, there are a few selected areas that must be improved. These include organizational structure and manning; training; and backlogs/resources (Donley, 2006, p.11).

Organizational structure and manning. A majority of FOIA offices are located within numerous dissimilar institutional elements. For example, some FOIA Offices are found within a functional institution such as I.T. systems, which do not contribute to the overall mission of FOIA. Thus, the first step should be to ascertain the current locations of all FOIA offices in order to establish homogenous standards within the DOD. This will optimize the efficiency of all FOIA offices (Donley, 2006, p.11).

Staff training. According to one study, only 76% of Freedom of Information Act staffs have obtained some form of FOIA training. In addition, it has been established that senior FOIA leaders are not conversant with the FOIA requirements. Thus, there is an urgent need to develop a training program (i.e., FOIA Officer Certification Programme).

The residential training program must be tailored for staff attorneys, senior leaders, as well as FOIA personnel on a biennial basis (Donley, 2006, p.12).

Resources and backlog. FOIA Offices have limited manpower resources to handle numerous requests. It is imperative that the required manpower is determined to minimize the backlogs in the FOIA Offices, especially those with a backlog that exceeds 50 requests. Some of the remedial measures to be implemented include identification of FOIA Offices with backlogs that exceed 50 requests, provision of adequate resources to FOIA Offices with heavy backlogs; and development of a staffing program for the identified FOIA Offices (Donley, 2006, p.18).

Computer Abuse Law

Computer and internet usage has escalated in recent years, given the low costs associated with procuring a computer and internet connectivity. What’re more many people and different organizations nowadays prefer to carry out personal and/or business transactions via computers and automatic agents. However, given the anonymity associated with computer/internet usage, computer-related crimes are on the rise.

Computer abuse entails crimes committed against the computer, the information/materials enclosed therein (i.e., data and software), as well as its uses as a processing device. Examples of computer abuse include cyber sabotage, unlawful use of computer services, and hacking. On the other hand, cybercrime entails unlawful activities carried out via electronic communication media. One of the major concerns facing individuals and organizations relates to identity theft and cyber-fraud that are committed via the illegal use of online surveillance technology, spoofing, and hacking. There are also other types of criminal activities carried out via online platforms such as industrial espionage, cyber-terrorism, pornography, defamation, and sexual harassment (Kunz & Wilson, 2004, p.3).

Many countries have enacted several laws to curb computer-based crimes. It is worthy of mentioning that computer crimes are somewhat new phenomena associated with the digital era. What’s more, such crimes have an adverse impact on the role of computers and the internet as valuable resources that transcend physical frontiers with regard to communication and information sharing. It is against this backdrop that new unified legislations are urgently needed to protect and enhance a systematic digital environment. Computer crimes are simply novel ways to perpetuate conventional offenses via an electronic platform. As such, the current state laws are inadequate to curb the computer-based crimes (Kunz & Wilson, 2004, p.4; Doyle, 2010, p.1). The following section will compare computer and internet legislation in three states, namely: New York, Texas, and Washington D.C.

New York Legislative Model

The New York Penal Code [Article 156] reflects the state’s legislative effort to combat a wide range of computer abuses. For example, the Penal Code describes five distinct computer-related crimes: criminal possession of computer-related information, illegal duplication of computer-related information; computer interference; computer trespass; and unlawful use of a computer. In addition, New York’s Penal Code defines a computer as a device(s) that can mechanically execute logical, arithmetic, storage, or recovery operations on computer data. The New York statute also offers the defendant various avenues to defend himself/herself from computer-related accusations.

For example, according to N.Y. Penal Code § 156.50, the defendant can argue that he/she had [1] authority to use the computer; [2] the right to destroy or change in any way the computer program or data; [3] the permission to duplicate, reproduce or copy the computer program or computer data (Kain, 2008, p.16).

Thus, under this Penal Code, an individual is deemed guilty of computer abuse if he/she intentionally uses or gain access to a computer network, computer service, or computer device without prior consent from the owner. In other words, an individual commits a computer crime when he/she (without prior consent from the owner) accesses a computer device, computer network, or computer service with an intention to commit a crime or aid in the commission of computer-related crime. According to the New York Penal Code, computer abuse is divided into four degrees. Computer tampering (fourth-degree) is the most basic of the computer-related abuses.

It takes place when an individual unlawfully accesses a computer device, service, or computer network and deliberately adjusts it in any way or obliterates a computer program or computer data of another individual. The severity of the crime depends on the presence of exacerbating factors such as international destruction or alteration of computer material, prior convictions for an Article 156, and the effects of such destruction or alterations in the amount exceeding US$ 1,000 (Kain, 2008, p.16).

Texas Legislative Model

Texas is among states that have enacted computer security laws to address computer-related crimes. For example, the 69th Texas Legislature integrated Section 33 into the Texas Penal Code. This Legislation describes various forms of computer-related abuses as well as the relevant punishments for such crimes. For instance, computer damage that exceeded US$ 2,500 is deemed a third-degree crime. However, in 1989, the 71st Texas State Legislature introduced an amendment that widened the scope of computer-related offenses as well as penalties provided by Section 33. For instance, computer damage that exceeded US$ 750 is now deemed a criminal act (Revello, 1996, p.15).

In addition, Information Resource Management was ratified in 1989 under the 71st Legislation resulting in the formation of the Department of Information Resources (DIR). The newly ratified Act requires DIR to formulate and publish standards and guidelines relevant to the management of information resources. In pursuant to the Information Resource Management Act, DIR established a Texas Administrative Code, known as Information Security Standards [1 TAC 201.13b], which compels state agencies to protect the confidentiality of information owned by the state (Revello, 1996, p.15). What’s more, DIR employs 1TAC 201.13b to allocate the task for providing security to information technology assets, data information assets as well as risk management to senior administrators in every state agency.

According to the IRM Act, a state agency is described as any council, office, board, commission, or department within the judicial or executive branch of the Texas state government. In addition, the Act defines information resources as any software, equipment (i.e., the computer) or procedures that are invented to gather, process, and broadcast information. Thus, the abovementioned agencies are legally required to fight computer-related offenses that fall within the scope of definitions discussed above (Revello, 1996, p.16; Clayton, 2006, p.5).

The Washington Legislative Model

According to the Washington statute, computer abuse occurs when an individual, without prior consent, deliberately gains access to a computer (and information therein). For example, in State v. Olson case, the police (defendant) was found guilty, under the statute, for unlawfully accessing a computer and acquiring print-outs that identified codes of a local college when there was no ongoing investigation of those codes. However, the Court of Appeal annulled the conviction and stated that the defendant (as part of his work) had the power to access the computer and that he was not prohibited by the statute to use the information (Kain, 2008, p.4).

The state-based Legislation mentioned above demonstrates a lack of clear definition with regard to the nature and scope of computer-related crimes (Cheon et al., 2009, p.82; Almahroos, 2007, p.597; Brenner, 2001, par. 1). The following section will recommend a union legislative model that can be adopted by all states in order to combat computer-related offenses.

Combined Legislative Approach

The advantage of an omnibus law is that it addresses computer-related crimes comprehensively. Such a law can provide the impetus for cooperation and convergence as a joint statement for inter-state policy objectives. What’s more, a combined legislative model that is generally ratified can generate a consistent set of decrees and enforcement processes in various states. For example, the Cybercrime Convention may present an apt platform to promote dialogue and general consensus as well as information sharing among different states in order to produce effective inter-state legal solutions for computer crimes (Keyser, 2003, p.289; Archick, 2004, p.2).

The Cybercrime Convention is the only viable option that can effectively protect all states from computer-based crimes that are executed through the internet. The effectiveness of the Cybercrime Convention is subject to three salient aspects:

  • The synchronization of state-based Legislation on computer-based crimes. The main aim of the Cybercrime Convention is to produce consistency among signatory states with respect to the nature and scope of laws that criminalize computer crimes. For example, the Cybercrime Convention demands consistency with regard to the legal description of terms such as traffic data, service providers, computer data, and computer systems (Schjolberg & Ghernaouti-Helie, 2011, p.9).
  • The effectiveness of the Cybercrime Convention rests on the ability of signatory states to set up efficient local investigative processes and powers that address computer crimes as well as electronic evidence. It is thus imperative that all states have consistent powers for inspecting computer crimes as well as collecting evidence. These powers must include interception of content records, search and seizure, and disclosure of traffic records (Schjolberg & Ghernaouti-Helie, 2011, p.9).
  • The setting up of a rapid and efficient system of state collaboration with regard to the investigation and prosecution of computer crimes. In addition, the combined legislative approach will create a system that facilitates reciprocated support among signatory states. The role of reciprocated support in combating computer crimes cannot be understated, given that internet usage transcends state borders. For instance, a computer-related offense executed in New York may have adverse effects in Texas. Thus, a combined legislative model will provide a widespread avenue for punishing perpetrators of such crimes in different states (Schjolberg & Ghernaouti-Helie, 2011, p.9).

References

Almahroos, R. (2007). Phishing for the Answer: Recent Developments in Combating Phishing. Journal of Law and policy for the Information society, 3(3), 595-621.

Archick, K. (2004). Cybercrime: The Council of Europe Convention. Web.

Brenner, S. (2001). State Cybercrime Legislation in the United States of America: A Survey, 7 Rich. J.L. & TECH. Web.

Cheon et al. (2009). Analysis of Computer Crime in Singapore using Local English Newspapers. Singapore Journal of Library & Information Management, 38, 77 -102.

Clayton, R. (2006). Complexities in Criminalizing Denial of Service Attacks. Web.

Donley, M.B. (2006). Department of Defence (DoD) Freedom of Information Act (FOIA) Improvement plan for Executive Order (EO), 13392: Improving Agency Disclosure of Information. Web.

Doyle, C. (2010). Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws. Web.

Kain, R. (2008). Independent Contractors and Computer Crimes: The Impossible Prosecution. Web.

Keyser, M. (2003). The Council of Europe Convention on Cybercrime. J. Transnational Law & Policy, 12(2), 287-326.

Kreimer, S. (2007). Rays of Sunlight in a Shadow War: FOIA, the Abuses of Anti Terrorism and the Strategy of Transparency. Lewis & Clark Review, 11(4), 1141 -1220.

Kunz, M., & Wilson, P. (2004). Computer Crime and Computer Fraud. Web.

National Security Archive. (2009). FOIA Basics. Web.

Pozen, D. (2005). The Mosaic Theory, National Security and the Freedom of Information Act. The Yale Law Journal, 115, 628-679.

Revello, R. (1996). A Descriptive Analysis of Computer Security Measures in Medium Sized Texas Counties. Web.

Schjolberg, S & Ghernaouti-Helie, S. (2011). A Global Treaty on Cybersecurity and Cybercrime.Web.

Read more

Global Health and Human Security

Introduction

Human security has emerged as the opposite of national security. While national security is concerned with resolving issues related to the country’s borders, human security focuses on people’s well-being and is related to human rights (Saladino slide 31). Human security relies on two main concepts: freedom from fear, meaning the absence of violence, and freedom from want, which means not being subject to threats and long-term illnesses (Ostergard and Griffin 3). This essay aims to observe how human security offers explanations and solutions to such worldwide problems as food security, global health, and environmental security. Evidence shows that this new paradigm can be efficient if it is complementary to national security.

Food Security

Food and water security is a crucial problem, especially in developing countries. Widespread hunger, water shortages, and the changeability of food prices are the most important concerns of this issue (Committee on World Food Security [CFS]). Overall, food security is a condition in which people always have “physical, social and economic access to sufficient, safe and nutritious food” (Saladino slide 24). It is based on four principles, the first of which is available, meaning that all individuals in all countries have enough food (Saladino slide 25). The second principle is access, which means making sure that people can afford products (Saladino slide 26).

Utilization is the third pillar, and it relates to the way consumers use foodstuffs (Saladino slide 27). The final principle is stability, meaning that it is necessary to provide basic food security regardless of conflicts, bad weather, economic crises, and other issues (Saladino slide 28). These four pillars provide an explanation of what a country should consider guaranteeing food security for its citizens.

Since human security differs from national security, these concepts emphasize different aspects of food security while searching for the solution to this problem. Since human security is closely related to human rights, it takes into consideration people’s right to food (CFS). The suggested solutions include identifying and assisting those who are food insecure, paying special attention to vulnerable populations such as children, women, and the elderly (CFS). Human security is concerned about all people in the world rather than citizens of a particular country, and, therefore, it encourages international assistance to marginalized and poor communities (CFS).

National security, on the contrary, cares for people within a state and aims at protecting domestic resources and seeking domestic food independence (Saladino slide 30). It cannot be said that one security paradigm is better than the other in handling food insecurity; rather, they should be combined to both provide individuals with nutrition and protect domestic products.

Global Health

Human security is also concerned about the health of the world population. It addresses issues that are not confined to a particular country but are common for all people (Ostergard and Griffin 3). According to this new paradigm, such problems as famine, terrorism, and epidemic illnesses cannot be regarded as a concern of one nation, and, therefore, traditional national security cannot handle them effectively (Ostergard and Griffin 3). Therefore, human security offers a better explanation of the ways of handling global health issues.

According to the new security paradigm, there are several aspects of health security. Researchers distinguish three major concerns of human security related to global health: violence, poverty, and infectious diseases (Ostergard and Griffin 9). Conflicts in one country may harm its citizens’ health, and they can influence neighboring countries either by direct interference or by the inflow of refugees (Ostergard and Griffin 9).

Poverty and global health are interrelated because poor people often cannot afford proper nutrition, clean water, and shelter, and they cannot improve their position because diseases prevent their work productivity (Ostergard and Griffin 13). Infectious diseases are a human security concern since they can cause an epidemic (Ostergard and Griffin 14). If a state fails to stop an outbreak, infections may spread over its borders, as happened with the Ebola epidemic in West Africa (Ostergard and Griffin 14). All three aspects are interrelated and constitute a human security concern.

Although human security concerns about global health go beyond the focus of national security, a state plays an important role in addressing global health issues. If a country cannot deal with a health issue within its borders, it may affect the population in the neighboring states (Ostergard and Griffin 16). Therefore, to ensure global health security, governments should be prepared to handle outbreaks and prevent severe diseases.

Possible solutions offered by national security include forcing immigrants and refugees to undergo medical examinations on entering a country to identify infectious diseases and prevent their spreading (Bunnell et al. 7). A partnership among countries is also a necessary measure because it may help to stop an outbreak before it crosses the borders (Bunnell et al. 7). Thus, a state’s participation is essential in ensuring global health security.

Environmental Security

Environmental security has become a security concern not so long ago. During the Cold War, states were concerned only about the safety of their territories, and all their concerns about their population were related to military aspects (Rucktäschel and Schuck 72). After the end of the Cold War, the priorities of governments shifted. The human security paradigm emerged to change the focus of security from a state to individuals or expand national security so that it took citizens into consideration (Rucktäschel and Schuck 76). Environmental security, in its turn, considers not only individuals but also the world as a whole, which makes it be more extended than national security (Rucktäschel and Schuck 76).

According to the human security paradigm, not states but humans are the major agents who cause and damage the environment (Rucktäschel and Schuck 76). However, although individuals have the primary influence on nature, they are unable to resolve environmental issues themselves (Rucktäschel and Schuck 77). It implies that environmental security requires the actions of a state.

Environmental issues have a significant impact on human security, especially in the most affected regions. Climate-related disasters lead to great expenses, damaged homes, and food and water insecurity (Modéer). Experts say that global warming is a crucial environmental problem nowadays, which should be addressed within the next 12 years (Modéer). If humans do nothing about it, it will cause more droughts and floods, increased sea levels, and decreased yields of crops (Modéer).

Since individuals alone cannot cope with this problem, states should take measures to ensure environmental security. For example, governments can encourage emission reduction, transit to renewable energy sources, and invest in the ecological use of land (Modéer). Thus, a people-centered approach to security emphasizes the need to address environmental issues, but the participation of a state is necessary to meet this requirement.

Conclusion

To sum up, human security is a new paradigm that shifts the focus of security from a state to individuals. It also tries to expand the concept of national security so that it takes into consideration not only borders but also individuals. Human security involves such issues as food security, global health, and environmental security. It explains why and how these problems affect the population. However, the solutions to these problems require the involvement of a state.

Works Cited

Bunnell, Rebecca E., et al. “Global Health Security: Protecting the United States in an Interconnected World.” Public Health Reports, vol. 134, no. 1, 2018, pp. 3-10.

Committee on World Food Security. “Section 5: Uniting and Organizing to Fight Hunger.” CFS. Web.

Modéer, Ulrika. “Why Does the UN Focus on Climate-Related Security Risks?United Nations Development Programme. 2019. Web.

Ostergard, Robert L., and Jeffrey A. Griffin. “Global Health and Human Security.The Oxford Handbook of Global Health Politics, edited by Colin McInnes et al., Oxford University Press, 2018. Oxford Handbooks Online. Web.

Rucktäschel, Kathrin, and Christoph Schuck. “Non-Traditional Security Issues and the Danger Not to See the Forest for the Trees: A Critical Analysis of the Concept of Environmental Security.” European Journal for Security Research, vol. 3, no. 1, 2017, pp. 71-90.

Saladino, Christopher. “Food Security: Global, National, and Local.” Political Science, 2018, Virginia Commonwealth University. Microsoft PowerPoint presentation.

Read more

Ignition and Burning Processes of Fuels and Accelerants

The crime of arson thrives on the availability and tenacity of a fire; devoid of a fire or if a fire is not tenacious enough, arson will fail. To solve arson cases, the investigators must understand fundamental and essential facts about fire. Having background knowledge on fire helps crime busters to not only understand how arson occurred but also what the perpetrators used in committing the crime. This section of the paper addresses what a fire is from its physical properties, the fire triangle, the oxidation process, accelerants, and how detectives can locate and retrieve trace elements of accelerants from fire debris.

According to the US National Fire Protection Association (2019), fire is not a thing but is instead a chemical reaction known as oxidation. As an oxidation process, fire (or combustion) happens rapidly, releasing light, heat, and sound. The heat energy released by this process (exothermic) makes temperatures to soar, causing the temperature of the fire’s immediate surrounding to rise as well. The fire also emits smoke, which is a toxic waste of fire debris. Van Wagtendonk (2006) defines fire as a process that combines hydrocarbons with oxygen to give out carbon dioxide, water, and heat energy as a chain reaction occurring fast at elevated temperatures.

The fire triangle is a framework that depicts the components that constitute a fire. The fire triangle has three elements; these are fuel, heat, and air. The fuel is the matter that the combustion process consumes; it is the source of the hydrocarbons to combine with oxygen to produce fire. For combustion to occur, there needs to be a sufficient supply of oxygen (or oxygen-containing-air). The third element is heat, which commences and sustains combustion. It is the heat that ignites the fuel into a fire; heat facilitates the combination of hydrocarbons (in the fuel) with oxygen without which combustion would not occur. The heat to sustain the reaction comes from the reaction itself. Consequently, there has been a new proposition to add a fourth element to the triangle to make a tetrahedron. The fourth element is the uninhibited chain reaction that is feedback between the heat and the fuel that produces a gaseous fuel utilized in the flame. It is out of the chain reaction that heat necessary to maintain fire(combustion) arises.

Fire as a reaction is an oxidation process. Oxidation is the process or the reaction that combines an oxygen molecule with another substance, compound, or elemental molecule forming an oxide. Oxidation can be either rapid or gradual; as an oxidation process, combustion is similar to rust formation on iron nails, the only difference being the speed of the reaction. In the case of the rapid oxidation process, the process is highly exothermic, leading to an uninhibited chain reaction that sustains the oxidation reaction henceforth, making it challenging to suppress provided the necessary reagents and conditions necessary for oxidation are available.

In combustion, an accelerant either starts or hastens the burning (fire). Primary accelerants are the ignitable liquids used to initiate or hasten a fire (Ferreiro-González et al., 2016). According to Interfire Online website (2019b), the ignitable liquids include acetone, carbon disulfide, Coleman fuel, ethyl alcohol, ethyl ether, Fuel Oil no. 1 ((kerosene, aviation fuel, coal oil, range oil), Fuel Oil no. 2 (diesel, home heating fuel), Gasoline (Motor fuel, gas), isopropyl alcohol, kerosene, lacquer, lacquer thinner, methyl alcohol, methyl ethyl ketone (MEK), mineral spirits, naphtha, paint thinner, toluene, turpentine, and xylenes. The most commonly used accelerants are petroleum-based commodities such as gasoline, diesel, and kerosene (Ferreiro-Gonzalez et al., 2016). These products are cheap and easy to access because they are not controlled commodities. Other than their ready availability, these products are easy to ignite. For instance, gasoline is highly flammable and composed of over 300 volatile hydrocarbons produced from the fractional distillation of petroleum. As Interfire Online website (2019b) reports, American forensic research facilities report gasoline as the leading commonly used and identified ignitable liquid accelerant.

Once they burn, ignitable liquids leave behind two things; ignitable liquid residues (ILRs) (Rankin & Petraco, 2014; Ferreiro-Gonzalez et al., 2016), and ignitable liquid pour patterns (Rankin & Petraco, 2014). The ILRs are the burnt remains of the ignitable liquid, while the pour pattern is a depiction of how the arsonist applied the accelerant. Investigators look for, analyze, and categorize ILRs from the fire debris following the American Society for Testing and Materials International (ASTM International) standard by way of Gas Chromatography-Mass Spectrometry (GC-MS) (Ferreiro-Gonzalez et al., 2016). Investigators obtain debris samples from a point they suspect the application of an ignitable liquid and take these samples to a laboratory. At the research facility, specialists isolate ILRs from the fire debris before vaporizing the ILR for chromatographic tests. “Passive Headspace Concentration with Activated Charcoal, ASTM E1412, is the standard practice separation of ILRs from fire debris most commonly used in the United States” (Ferreiro-Gonzalez et al., 2016, p.696). According to Interfire Online (2019a), when there is a combustion of volatile vapors atop an ignitable liquid accelerant pool, there is a distinct burn pattern left on the structure different from the patterns of other combustible material. These are the patterns detectives look for. Material lying on the floor before the fire more often presents the best potential sites to collect debris within the pour pattern on floors that impervious to moisture.

References

Ferreiro-González, M., Barbero, G., Palma, M., Ayuso, J., Álvarez, J., & Barroso, C. (2016). Determination of ignitable liquids in fire debris: Direct analysis by electronic nose. Sensors, 16(5), 695 – 706. Web.

Interfire Online. (2019a). Accelerant evidence collection. Web.

Interfire Online. (2019b). Fire and arson accelerants. Web.

National Fire Protection Association. (2019). NFPA – Reporter’s guide: All about fire. Web.

Rankin, J., & Petraco, N. (2014). Interpretation of ignitable liquid residues in fire debris analysis: Effects of competitive adsorption, development of an expert system, and assessment of the false positive/incorrect assignment rate. Web.

van Wagtendonk, J. (2006). Chapter 3: Fire as a physical process. In N. Sugihara, J. van Wagtendonk, J. Fites-Kaufman, K. Shaffer, & A. Thode (Eds), Fire in California’s ecosystems (pp. 38-57). University of California Press. Web.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp