Discussion board

 Similar to Module 5: Week 5, using the 4 classical phases of disaster management, discuss how collaboration between public and private organizations can support phases 3 and 4 of the model. Choose a threat/hazard/disaster different from the Module 5: Week 5 Discussion prompt. Describe the possible interactions and involvement of each organization. Include in your discussion specific … Read more

Discussion board

 Research Aafia Siddiqui, her background, her arrest, and her prosecution. In your research for outside sources pay attention to the materials in addition to maps, etc., found on her person during her arrest in Afghanistan. Focus on whether she is a terrorist or not, separate from the outcome of her trial. (A simple Google is … Read more

Discussion board

 Following the homegrown jihadist terrorist attacks in Orlando and San Bernardino, there is a growing debate about the relationship between community policing and homeland security. Is community policing a tool that should be applied to homeland security? Why or why not? 

Discussion board

 How can technological advances support homeland security and emergency management? What are the current and possible future issues that need to be addressed? Based on your readings, how would you address these issues? 

Discussion board

 Investigative journalist Steve Emerson originally documented the existence of jihad in America. Then, Brian Jenkins found 46 publicly recorded attacks or attempted attacks from radicalized individuals between 9/11/2001 and December 2009. More recently, Ryan Mauro and the Clarion Project exposed radical Islamic groups inside America. Do you agree or disagree with these findings? If there … Read more

Intro to criminal Justice.

 How do criminal justice professionals measure crime? What are their methods? What, in your opinion, are the strengths and weaknesses of each of these methods, and why?  Do you think public perception of crime is aligned with the actual crime data that has been reported? 

crjs370 dp

  Outline some of the key challenges to countering terrorists’ illicit finance efforts. Explain why it is difficult to mitigate these activities. Discuss some of the various funding sources used by terrorist organizations to raise funds. Include both legitimate and illicit sources of revenue.

crjs370

  The use of terrorist tactics and strategies is linked to a terrorist organization’s goals and underlying motivations. Additionally, a terrorist organization must execute certain functions to conduct operations. This requires the selection of new recruits to support the terrorists’ cause. Address the following: Select a particular terrorist group. Describe how or why this group’s … Read more

CRJS365 DB

  Forensic science begins at the crime scene. Based on the Locard principle, even the actions of the Crime Scene Investigator (CSI) may be destructive to evidence found at the scene. It is imperative that the actions of the CSI mitigate damaging the evidence as much as possible during collection, field processing, and packaging of the … Read more