you must follow apa format perfectly, this teacher is very hard on that. if you

you must follow apa format perfectly, this teacher is very hard on that. if you

you must follow apa format perfectly, this teacher is very hard on that. if you have any questions let me know. also i have attached sample papers on what its supposed to look like as well as the rubric they use to grade it and the apa 7th templete. Please read over everything and look at the links he is very strict.
2nd Paper ~ 1891 New Orleans Lynching of Italian Americans that almost led to Declaration of War by Italy vs USA ~
The Grisly Story of One of America’s Largest Lynching | HISTORY
You must use your textbook as a source, and you must also use five other additional outside sources for your paper (a total of at least 6), and three of these should be scholarly in nature. For example, you may use the internet, academic journal databases, books, encyclopedias, videos, newspapers, etc. So, a minimum of six (6) sources are required.
* Use the subheadings listed below in your paper for organization, consistency, and coherency of the overall paper:
Both Research papers must consist of the following – No Abstract – Must Use in 1st Paragraph ~ Title of The Paper as the heading, the first paragraph*** This is the introduction that contains the thesis in the last sentence but does not have Introduction as a heading, but the Title of the Paper* Must Use the subheadings (do not include hint underneath) listed in order below in your paper for organization, consistency, and coherency of the overall paper:
Description of the research subject (hint ~ Write an overview of the subject you are researching for that paper)

Analysis of the crime event or events (hint ~ your decision on what crime or crime events you want to write on for that paper based on your research)

Description of media involvement and coverage (hint ~ write to the media coverage, how much, what venue, what did they cover, did it change over time, i.e., during the event, trial, etc.)

Perspective concerning the media influence on; (1st paper) and (2nd paper). (hint: What is your perspective (not your Opinion) based on your research backed up with citations and sources on how the media influenced this matter? It could be what impact it had while it was going on, afterwards, trials, currently, etc.).

Conclusion (hint ~ The paper’s conclusion wraps it all up for the reader who is your grade)

** (Overall, the last hint ~ Review the APA Module Again before submitting the papers ~ I structured this paper format approach so that one segment flows nicely into the next one. Again, sentences should not be more than 25-30 words. Paragraphs approx. 5-6 sentences, with proper indent. Use APA 7 citations and references.)
———————————————————————————————–
Format
Each paper must be in APA 7 format (NO ABSTRACT) and include a title page, body *Thesis is last sentence in first paragraph of body* (include subheadings above), and references/work cited page. Intext citations are required when citing your sources and must be in correct APA format. The length of the body of each paper is to be 1500 words, written in 12-point font and double-spaced, papers should be a minimum of 1500 words, not counting the title page, and reference page.
You must use your textbook as a source, and you must also use five other additional outside sources for your paper (a total of at least 6), and three of these should be scholarly in nature. For example, you may use the internet, academic journal databases, books, encyclopedias, videos, newspapers, etc. So, a minimum of six (6) sources are required.
Both Research papers must consist of the following –
– note that the first paragraph is an introduction that contains the thesis in the last sentence.
* Use the subheadings listed below in your paper for organization, consistency, and coherency of the overall paper:
Description of the research subject
Analysis of the crime event or events.
Description of media involvement and coverage.
Perspective concerning the 1891 New Orleans Lynching of Italian Americans that almost led to the Declaration of War by Italy vs USA ~The Grisly Story of One of America’s Largest Lynching | HISTORY
Conclusion
Each paper must be in APA 7 format and include a title page, body (see subheadings above), Thesis at the end of the first paragraph, and references/work cited page. Intext citations are required when citing your sources and must be in the correct APA format. The length of the body of each paper is to be 1500 words or more, written in 12-point font and double-spaced; papers should be a minimum of 1500 words, not counting the title page and reference page. Papers are to be submitted through the course website.———————————————————————————————The final paper will graded on a 100-point scale and provided feedback by their TA in the form of the Turnitin report,

Posted in Law

Use correctional Officer and Deputy Sheriff. Your assignment should be completed

Use correctional Officer and Deputy Sheriff. Your assignment should be completed

Use correctional Officer and Deputy Sheriff. Your assignment should be completed using the planning guide provided and written in Standard English. The assignment will be based on your findings from the career/employment sites that you use and the information you find in the Library. Please make sure you indicate which sites you have used to find your information. In addition, assignments should demonstrate careful proofreading. View Final Project Checklist I will upload the templates you will need for this assignment

Posted in Law

Stacey is a wealthy person who wishes to make a number of gifts to her friends a

Stacey is a wealthy person who wishes to make a number of gifts to her friends a

Stacey is a wealthy person who wishes to make a number of gifts to her friends and family. The following events occur:
(1)Stacey transfers £100,000 to Timothy, stating ‘I am transferring this money to you because you are the most trustworthy person I know, and I am sure that you will use it fairly and benefit both of my children with it.’
(2)Stacey hands the share certificate for all of her shares in ‘A Company Ltd.’ and a partially completed share transfer form to her best friend, Bertha, stating ‘I am giving these shares to you as a gift.’ Stacey has not signed the share transfer form and later changes her mind, demanding a return of the share certificate and destruction of the transfer form.
(3)Stacey declares that she holds her collection of Fabergé eggs on trust equally for her two sisters.

Advise the parties as to the validity and enforceability of these transactions.

Posted in Law

Digital Age Terrorism: Balancing Surveillance, Security, and Ethics

Digital Age Terrorism: Balancing Surveillance, Security, and Ethics

The Rise of Surveillance and Public Safety

Street crime has drastically dropped as theft, drug trafficking, and street crime have lowered in places maintaining very large populations. While surveillance is seen as a negative, the idea of a constant security force does not limit criminal intent, regardless of ethics and morality.

A lot could be said about the usage of facial technology. While the system does yield results, as seen in China, there is a lot of ambiguity surrounding the ethics of utilizing facial recognition and surveillance. If it is being used as a commercialized product, then you can make a case for it being somewhat ethical. As a product, it is up to the consumer if they wish to use it or not.

However, if it is becoming a standardized system across various government institutions, then there may be a problem. As seen in China, there is a very noticeable drop in crime rates committed on the streets; the technology profiles and records suspicious individuals and displays their status on overhead monitors around cityscapes. It is a blessing to know who and what to watch out for, but dangerous as the implications it brings.

Surveillance’s Impact on Privacy and Security

Constant surveillance is a method of security and safety but should not come at the cost of privacy. Facial recognition should not be used for marketing and general surveillance. If it is not used for any purposes besides security and safety, it can work. That being said, there is a stigma behind constant surveillance, and facial recognition provides the platform for it. Like all mediums, there is ambiguity for good and bad. The usage of facial recognition remains a utility for security, which can be used to the imagination of the user. It can be good, but the potential for the heinous and mischievous is enough to deter most, with good reasons as well.

The Evolution and Potential of Facial Recognition

While it is still in its infancy stage, facial recognition provides a very promising scope for network security and criminal prevention. As the systems become more commercialized, there is a guarantee that they will only become easier to use and more sophisticated in their usage. However, its development will move alongside its implementation. Governments, private sectors, and even individuals are turning to facial recognition as a factor for security.

As seen in China and some pockets of the United States, the shift towards facial recognition is becoming more and more widespread. It can be said that the Chinese government is ahead of the curve, whereas the U.S. is still on the cusp of whether it wants to follow that same path. As more industries invest in the technology, the shift may become more drastic. For all that it stands, the use of facial recognition has its quirks and shortcomings, yet it still does provide promising economic results and safety for civilians around. While it can be easy to dismiss, only time can tell how it will develop.

U.S. Response to Terrorism Post 9/11

Since the infamous September 2001 attacks, the USA’s response to the rise in terrorism has escalated. Special branches were instated to counter the fear of terrorism. In response to the attack, the United States announced the establishment of the Office of Homeland Security (OHS) to coordinate “homeland security” efforts. The official announcement stated that “The mission of the Office will be to develop and coordinate the implementation of a comprehensive national strategy and will coordinate the executive branch’s efforts to protect against, respond to, and recover from terrorist attacks…”

The OHS states that the best form of counter-terrorism is prevention. The less freedom the enemy has, the harder it is for them to mobilize and exploit weaknesses in the nation. Terrorists seek to find any and all paths of least resistance for an attack, whether it be chemical, biological, radiological, nuclear, and explosive weapons or cyber-attacks.

Tools in the Counter-terrorism Arsenal

Fortunately, some of the new technologies that prevent and potentially catch terrorists can detect explosives and other weapons, helping to protect critical infrastructures and cyber networks from attacks and allowing organizations to build information-sharing partnerships.

Since the initiation of OHS, results from their work have greatly improved catching and preventing terrorists. One of the programs that OHS has funded is the Nationwide Suspicious Activity Reporting Initiative (SAR). The National Security Initiative is a program that is designed to increase the effectiveness of state, local, tribal, and territorial law enforcement, public safety professionals, and other frontline partners in identifying, reporting, evaluating, and sharing pre-incident terrorism indicators to prevent acts of terrorism while maintaining citizen privacy, civil rights, and civil liberties. Documenting suspicious observations helps maintain an up-to-date knowledge of attacks.

For example, if an attack happens and frontline officers are not able to prevent it, we are able to track and trace the events leading up to it. This allows us to read between the lines and gives us insights into the terrorist’s mind and see how and where they exploited loopholes and security flaws; this only works if events leading up to an attack are documented.

The recording of events, along with real-time sharing of information, is shared on a secure network hosted by the Department of Homeland Security. The Homeland Security Information Network (HSIN) is the trusted network for homeland security mission operations to share sensitive but unclassified information. This network is considered the front door to Homeland Security. HSIN is threefold: First, it provides a SharePoint web portal system, which allows agencies and events to have a basic workspace for collaboration. Second, it provides a Jabber chat system with user-managed rooms. Third, it provides the Common Operational Picture, a custom executive situational awareness web application based on Oracle HTML DB.

The Role of TSA and Advanced Scanning Technologies

Under the OHS, one of the biggest Federal agencies is the TSA: Transportation and Security Agency. One of the front liners that deals with the public every day is TSA. They are the first line of protection, the ones who scan the public for potential threats. They are the ones who must identify and elevate security concerns. There are many rules and regulations to protect citizens. Some of the databases and technologies the TSA uses are the No-Fly List, bans on certain items, screening procedures, and full-body scanners.

With the No-Fly List and the list of banned items, they can start to look for people who attempt to break the rules and stop them before they can cause any threats. Everyone who flies needs identification and is required to go through multiple security checkpoints. The full body scanner uses millimeter wave scanners to view cartoon-like models on a screen and uses a form of electromagnetic radiation to detect objects concealed underneath clothing to a small degree.

Not only does the TSA have a full body scanner, but they also have X-ray scanners to check luggage for potentially dangerous items. X-ray technology used by a typical airport provides two levels of intensity and uses a central sensor to provide extra information about the contents of the luggage. These X-rays send the information to the computer, which is read by a TSA agent and identifies contents using different colors to indicate density and the type of materials that are in the bag.

Systems can identify luggage contents without opening them by cross-referencing live data with databases of known objects. It especially helps in identifying known illegal substances. The accuracy is precise enough to detect the difference between flour and cocaine. It can color code items of the same category, label threatening items with stark colors, and create a 3D image of the luggage. However, the biggest proponent of catching terrorists is not the TSA. It is the eye in the sky, the NSA.

The NSA and Cybersecurity in Terrorism Prevention

The National Security Agency was around long before 9/11. It was created in 1917 under the Cipher Bureau of Military Intelligence to improve the communication of intelligence between the Allies. The NSA changed when the 9/11 attack happened. It began to monitor domestic activities to prevent any attacks on U.S. grounds. On October 26, 2011, the USA Patriot Act was signed; warrantless wiretapping and surveillance from phones, texts, and internet browsing became legal. United States citizens lost a massive amount of privacy for the sake of security. Today, cyber threats are more prevalent, and the NSA has risen to meet the challenge.

One of the strongest tools that has yet to be perfected is the manipulation of metadata. Metadata is the data that A.I. scrapes through to find valuable information. The NSA has the ability to tap into any available mode of communication and capture data. Some powerful A.I. tools, such as facial recognition and linguistic recognition, are some of the tools being constantly refined to avoid false positives in metadata. If engineers can perfect the A.I. to identify metadata accurately, they can find anyone and anything in the world.

It is no secret that every form of government has a cyber defense team that works on not only defensive measures but also offensive measures. It is not far-fetched that the NSA cyber team has modified and refined many cyber weapons such as Duqu, Flame (malware), Great Cannon, Mirai (malware), Stuxnet, and Wiper (malware). These cyber-attacks are forms of malicious and deliberate attempts by an individual or organization to breach the information system of another individual or organization. Usually, the attacker seeks some type of benefit from disrupting the victim’s network. These weapons are capable of, but not limited to, phishing, man-in-the-middle, Denial of Service, SQL Injection, and Zero-Day attacks.

With the use of these weapons, the NSA is able to gain information that is not readily available to track terrorist organizations down. Even with powerful tools, the data is useless unless a person or company knows how to use the information. These tools and agencies do not work independently. Humans tend to work better in a society or in a group of teams, which can be seen with one of the most famous bands of agencies, Interpol.

INTERPOL’s Global Effort Against Terrorism

The International Criminal Police Organization, more commonly known as Interpol, is the international organization that facilitates international police cooperation. An official statement from Interpol is as follows: “INTERPOL enables police in our 194 member countries to work together to fight international crime. We provide a range of policing expertise and capabilities, supporting three main crime programs: Counter-terrorism, Cybercrime, and Organized and Emerging Crime.”

INTERPOL uses the United Nations Security Council Special Notice to alert law enforcement that certain sanctions apply to threats. The most common sanctions are:

  • Asset freezing, freezing funds or other assets with no requirement to seize or confiscate assets.
  • Travel bans that prevent an individual from entering or transiting through territories.

With no requirement to arrest or prosecute these individuals and an arms embargo, which prevents the direct or indirect supply, sale, or transfer of arms and related materials.

The special notice is to help law enforcement capture or mitigate national threats. Once a threat’s mobility is limited, it allows other law enforcement agencies to work on the capture of the terrorist itself. Some of the strategic intelligence agencies help with two forms of analysis: operational and strategic analysis. Operational analysis (O.A.) aims to achieve a specific law enforcement outcome. This might be an arrest, seizure, forfeiture of assets or money gained from criminal activities, or the disruption of a criminal group. O.A. is used to identify links between suspects and crimes, identify key investigative or information gaps, and create profiles of known or suspected criminals.

On the other hand, strategic analysis(S.A.) is intended to inform higher-level decision-makers with long-term benefits. The intention is to provide early warning of threats and to support senior decision-makers in preparing their organizations to deal with emerging criminal issues. This might include allocating resources to different types of crime or increasing training in a particular crime-fighting technique.

Some of the S.A. is Modus Operandi(MO-“Motive”), crime trends and patterns, emerging threats, and the potential impact of external factors such as technology, demographics, or economics on crime. Along with these teams, one of INTERPOL’s biggest roles is border management. INTERPOL has a specific team called the Integrated Border Management Task Force (IBMTF), which specializes in running operations in air, land, and water border points with a database that is provided by headquarters. Some of the databases are the Nominal database, Stolen and Lost Travel Documents database, and Travel Documents Associated with Notices. Over 192 countries use and help INTERPOL as a team to fight terrorism.

Digital Security: Technology’s Blessing and Curse

As technology has advanced with the internet and increased capabilities of machines, so have the various terrorist groups and specialized agencies. Today, most people are connected through the use of social media, and those very platforms are used to spread propaganda for all movements, regardless of the just or unjust purposes behind each organization. Because of these threats, it is imperative that organizations like the NSA and INTERPOL develop technologies to apprehend any and all possible terrorists that would threaten innocent lives. Technology was created out of a need for convenience and time but brought with it many upsides and downsides. As these technologies develop, ideologies around how they should be utilized must be critically analyzed alongside them.

Nations such as China have adopted an around-the-clock surveillance state where citizens are tracked and described through high-functioning cameras; on the other hand, nations like the U.S. prioritize apprehension via tracking possible threats and propaganda. When it comes down to safety, the concept is a never-ending game of cat-and-mouse with much ambiguity at the center. With everyone trying to gain more information and protect their interests, it is important not to lose sight of the benefits and dangers technology can bring. However, that is up to the user behind these advancements. Like all other tools, technology is one of them, and its potential is up to those who can utilize it properly.

References

  1. Li, Z. (2020). Crime Prevention in the Digital Era: The Effects of Surveillance Technologies in Chinese Cities. Beijing University Press.
  2. Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books.
  3. O’Neil, C. (2016). Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Crown.
  4. Zheng, C. (2019). Facial Recognition: Ethics, Privacy, and Public Safety. SciTech Publications.
  5. National Commission on Terrorist Attacks Upon the United States. (2004). The 9/11 Commission Report. W. W. Norton & Company.
  6. Mayer, J. (2011). The Dark Side: The Inside Story of How the War on Terror Turned Into a War on American Ideals. Anchor.
  7. Department of Homeland Security. (2017). Office of Homeland Security: Ten Years of Service. U.S. Government Publishing Office.
  8. Kean, H., & Hamilton, L. (2006). Without Precedent: The Inside Story of the 9/11 Commission. Vintage.
  9. Nakashima, E. (2015). “U.S. to China: Stop It.” The Washington Post.
Posted in Law

you may choose to communicate your ideas in one of two ways: Write a 3- to 4-par

you may choose to communicate your ideas in one of two ways: Write a 3- to 4-par

you may choose to communicate your ideas in one of two ways: Write a 3- to 4-paragraph company newsletter. OR Create a PowerPoint or a Prezi presentation. If you choose this option, you must submit the equivalent of 450 or so words (the script for your PowerPoint or Prezi) to the assignment Dropbox. Your grade will be based on the written information rather than the PowerPoint or Prezi presentation skills you demonstrate.

Posted in Law

Assignment Content Curators oversee museum exhibits. They must ensure the servic

Assignment Content Curators oversee museum exhibits. They must ensure the servic

Assignment Content Curators oversee museum exhibits. They must ensure the service the museum provides is achieving its intended goals. This is known as services evaluation. Imagine that you are the curator of a nationally renowned museum badly in need of funds to renovate and update exhibits to increase patronage. You have just received a huge endowment from a controversial figure who has recently been in the news for allegedly running a pyramid scheme and swindling millions of dollars from unsuspecting investors. You have concerns about associating with this figure, but without funds, the museum faces possible closure. You must prepare a presentation to your board of directors. Create an 8- to 10-slide presentation with detailed speaker notes. Include the following in your presentation: The potential of corporate liability for receiving stolen property The social implications that stem from overlooking criminal behavior because of its advantages, financial or otherwise A discussion of the pros and cons of accepting this endowment, where there is no proof that the funds were obtained as the result of any fraudulent transactions, and charges have not been filed A discussion of the pros and cons of accepting this endowment, where no charges have been filed, but the public widely believes the money resulted from the pyramid scheme and fraud A discussion of the pros and cons of accepting this endowment, where criminal charges against the controversial figure have been filed Final recommendation to the board of directors Speaker notes that include what you would say in a live presentation Cite at least 2 outside references to support your assignment. Format your assignment according to APA guidelines.

Posted in Law