SlideShare a Scribd company logo
1 of 37
Week-3 Scholarly Writing
Review the document, How to Benefit from Critiques of Your
Work, located under your weekly resources.
Spotlight on Skills: Information Literacy: Finding what you
need in the library
In this and other courses you need to find information, usually
scholarly articles from the library, to support your learning
activity. View the Northcentral Search Like an Expert Tutorial,
located under your weekly resources, to learn how to Search
like an Expert and find what you need efficiently in the vast
holdings of the Northcentral Library. It is well worth your time!
Assignment
Your task this week is to locate two peer-reviewed articles in
the NCU library that discuss current research on the topic
addressed in your Week 2 assignment.
You will evaluate the two new articles as part of your Week 4
assignment. Make sure you save either the doi/permalink from
the NCU library, or a copy of the articles you locate because
you will need to provide either the links or those copies to your
faculty along with your paper in Week 4.
In locating your articles, you may find it helpful to determine a
more specific idea within the general topic that will help guide
your research, not only for your Week 5 assignment, but also
for other papers you will prepare later in the course.
Length: 2 research articles
You do not need to submit any documents this week.
US POLICIES ON TWO TRANSNATIONAL CRIMES, ILLICIT
DRUG
TRAFFICKING AND CYBER-LAUNDERING, WILL NOT
SECURE THE
HOMELAND FROM TERRORIST THREATS
A Master Thesis
Submitted to the Faculty
of
American Public University
by
First Name Last Name
In Partial Fulfillment of the
Requirements for the Degree
of
Master of Arts
April 2012
American Public University
Charles Town, WV
1
A wealth of academic literature on transnational crimes has
increased over the past decade.
In particular, illicit drug trafficking and cyber-laundering, are
two of the most active crimes that
are being utilized to support terrorist organizations. The first of
the resources for this research
paper comes from Jay S. Albanese’s 2012 Deciphering the
Linkages between Organized Crime
and Transnational Crime from the Journal of International
Affairs, Volume 66, Issue 1. The
significance of this particular literature is that it provides
characteristics of organized crimes and
transnational crimes which is important for this study. The
review of this literature highlights the
linkage between organized crimes and transnational crime while
making the point clear that the
two are distinctively separate. By having a sound
understanding in the particulars are critical as
US policies are reviewed and discussed for analysis throughout
the research. The root conduct
of both organized crime and transnational crime parallels each
other according to studies. A
synopsis of this literature provides distinct differences between
transnational crimes and
international crimes in that transnational crime are those crimes
leading to or resulting in
individual profit. One of three elements, if not two or all three,
may exists during the
identification of transnational crimes. The elements are illegal
substances, the arrangement for
illegal labor, and or penetration of either commercial or
government businesses operations.
Additionally, the literature characterizes international crimes as
those crimes that involves crimes
against humanity that sometimes includes several countries.
There are three classifications of
transnational crimes, Provision of Illicit Goods; Provision of
Illicit Services; and Infiltration of
Business or Government. Studies have shown that the existence
of transnational crime is nothing
new. These crimes have in fact existed for many decades and
there has been little to no change
in them; but, the innovative technology has advance the means
in which these crimes are
executed.
Another literature review provides an in-depth concern for
political officials. John Rollins
and Liana Wyler convey these concerns clearly in their 2010
article International Terrorism and
Transnational Crime: Security Threats, U.S. Policy, and
Considerations for Congress. The
literature adds value to the research because the recognition of
political disconnects and law gaps
that terrorist organizations exploit are highlighted. In this report
to Congress there are
conceivable strains between counterterrorism and anti-crime
policy objectives; to include, the
usefulness of financial intelligence in fighting the crime-
terrorism nexus. (Rollins and Wyler
2010, 12)
2
Gilipowski W. Paraschiv’s 2013 Conceptualizing
Transnational Organized Crime:
Economic, Management, and Financial Markets, Volume 8,
Issue 2, is an eye opening piece of
literature. The purpose for inserting this literature within the
research is to exclusively bring to
the forefront the enormous amount of resources and assets that
it will take to unify the
international community in order for US policies to be more
effective. A clear synopsis of this
literature supports other areas of research in making it clear that
the boundaries of transnational
organized crimes are nonexistence. The article provides an
understanding to how the
international community realizes that transnational organized
crime is a common threat while
highlighting the division in international law and policies.
Additionally, the article highlights
transnational organized crime having developed in various
countries throughout the world;
subsequently, making this emergence a phenomenon. The
literature illustrates the political
influence throughout the international community that makes
US policies vulnerable. For an
example, Asia’s footprint consists of multiple loop holes added
with corruption and a lack of
effective governance. Without a clear definition or
understanding to distinguish between gangs
and organized crime, the political initiatives could have
challenges. If there is not an objective to
influence politicians to establish judicial authority at the
national level to combat organized
crime, many efforts to minimize this baseline that influences
transnational crime will be doomed
at the start. The size and growth of transnational crime cannot
truly be determined because the
crime groups often establish and maintain contingent ties with
each other. Worthy to note is the
hierarchical structure described in this article that clearly
articulates the complexity in
comprehending the international community’s ability to fight
and stop transnational crime, the
global threat impact of transnational crime, and the business
and economic dimensions of these
crimes. (Paraschiv 2013, 173-178)
The Congressional Research Service describes various
patterns that parallels to interaction
among terrorist groups leading to transnational security issues.
In recognition of these activities,
the US Congress continues to respond with policies in attempts
to remain abreast with the rapid
changing environment in Terrorism and Transnational Crime:
Foreign Policy Issues for
Congress by John Rollins and Liana Wyler, 2013. US global
security interests are threatened by
transnational crimes and to this extent, in 2011 President
Obama issued the Strategy to Combat
Transnational Organized Crime. Although, the US security
strategies maybe multidimensional
3
in focusing on citizen security and dismantling illicit networks,
the support from governments
throughout the international community is needed. The
literature is significant and support the
research in defining the complexity to establish policies to
support the people to carry out
strategic objectives that are identified within this study, starting
at the top of the political stage.
In Congress charge to evaluate the current policies and practices
in determining if the US is
synchronized in effectively fighting transnational crimes, the
committee realizes that the
conceptualization of transnational crime will require
interagency coordination with international
cooperation. Adding to the challenge of loyalty and total
commitment is geographic regions and
politics. Clapper’s testimony to Congress in 2012 emphasized
that illicit networks have been
fundamental in the growth of transnational crimes that has led
to profitable terrorist networks;
subsequently, increasing the threats to US national security.
The research study focuses on two specific transnational
crimes, illicit drug trafficking and
cyber-laundering. The first of several literature reviews to
support this research study in the area
of illicit drug trafficking is a thorough analysis of US drug
policy by David Boyum and Peter
Reuter in 2005, An Analytic Assessment of US Drug Policy.
The review of this literature
supports the claims that policies targeting the prohibition of
drugs are universally ineffective.
The constant development of illicit drugs and its distributions
are staying ahead of policies and
counterdrugs programs designed to combat such activity.
Although drugs growth in quantity are
geographically limited, the sophistication involved in
establishing an illicit transnational drug
trafficking network makes the fight against these crimes more
challenging. Another key point to
highlight from the review is that US policies along with tougher
laws will not materially reduce
the use or illegal sale of drugs. The study within this literature
exclusively discusses the need for
drug treatment services that is in short supply. The ability to
treat drug users is a key aspect in
fighting the war on drugs; however, some US policies do not
address the root issue or concern.
The absence of US policies to target this area is a gap requiring
lawmakers and politicians
attention. The identified gap contributes to the research
findings and establish ground for later
discussions.
Drug Policy in Understanding America: The Anatomy of a
Exceptional Nation by Jonathan
P. Caulkins and Mark A. R. Kleiman, 2008, highlights the
counterdrug initiatives carried out by
the US. The literature supports the study in many ways; but,
specifically in such a way to
magnify discussions surrounding US policies. In accordance to
this literature, the US fight on
4
illicit drugs has led to more arrest and imprisonments than its
European partners. A sense of
relevancy is established in this literature that aid the
conceptualization of illegal drug trafficking.
The US parallels countries like Columbia and Nigeria in
comparison to its severe drug problem.
The literature focuses many efforts on comparing the US with
other countries throughout the
world to highlight the use of illicit drugs. The results of studies
performed are anything less than
stunning. Combating the trafficking of transnational illicit drug
exhausts many US resources that
include equipment, money, and people. Before the US could
actually identify the chaos
associated with its leading illicit drug, cocaine, Americans
embraced the illicit drug before its
exposures. Other countries simply watch the effects that it took
throughout the US before trying
the drug. To this extent, other countries did not have the
capability in availability for cocaine.
The US have large Colombian immigrants communities in
Florida and New York and with so
much legal trade occurring in these areas, the literature suggests
that the capability to effectively
hide the illegal trafficking of cocaine is almost seamless.
The Congressional Research Service study focusing on the
illegal drug trade in Africa has
direct ties to the US policies designed to combat illicit
transnational drugs trafficking. The
majority of the illicit drug growth and trafficking in Africa is
directed towards South America
and European countries according to Liana S. Wyler and
Nicolas Cook in their 2009
congressional research Illegal Drug Trade in Africa: Trends and
U.S. Policy. However, other
illegal products such as heroin and precursors required to make
illicit drugs do enter the various
borders of the US. The issue that is revealed in the literature is
the threat to US policy and its
interests both at home and abroad. Because of the enormous
illegal drug production
environments throughout the western portion of Africa, US
policies combating transnational
illicit drug trafficking faces an uphill battle. The challenge
becomes even more complex when
terrorist organizations occupy various parts of the region for
safe havens. Additionally, the
revelations of US policies being in its early stages or formative
stages are exposed during this
study. The study further suggests that there is not a solid
commitment or coordination on roles
from both the US and the international community’s
counternarcotic agencies.
Continued support that suggests the US policies for
combating illicit drug trafficking are
ineffective comes from a review of the updated 2006
Congressional Research Service Report for
Congress, International Drug Trade and U.S. Foreign Policy by
Raphael F. Perl. The literature
discusses the rise in production of opium, marijuana, and coca.
Subsequently, a key point that
5
relates to this study is the emphasis of concern relating to
incontrollable consumption that
contributes to further discussions throughout the research. In
pursuit to establish the perfect anti-
drug control policies, the US finds itself in a political storm that
results from contradictions of
national policy interests. The relevance of this literature to the
study is significant because the
findings proves invaluable in that the links between drug and
terrorist organization are brought to
the forefront. Additionally, another gap in US policy is
exposed that sets the stage for follow on
discussions throughout the research. The multiple programs
that are discussed within this
literature contributes to the confirmation of findings relative to
this research study.
The Federal Bureau of Investigations (FBI) describes the
greatest cyber threats to be the
illegal acquiring of assets, sensitive data such as economic
information or military classified
intelligence. Gordon M. Snow’s 2011 article, Federal Bureau of
Investigation: The cybersecurity
threat, focuses on the cyber threats to the US private sector,
supply chain, and critical
infrastructure. The article suggests that the US critical
infrastructure will not be 100% intrusion
free; thereby, always being available for anyone with the ability
and means to gain access. There
are tremendous economic losses resulting from cyber threats.
Although, the FBI constantly
changes its methods in dealing with cybercrimes, so does
terrorist organizations. Innovation of
new cyber technology improves national and international
relations. Unfortunately, this same
advance technology becomes available or can be gain through
illicit means by terrorist
organizations. The article clearly make a point to address the
theft of intellectual property and
supply chain issues that can be interrupted by terrorist
organizations. The threat, although
specifically discussed targeting US interests, is not an isolated
threat for one nation. The
growing cyber threat is an international issue with
improvements in the availability and the
ingenuity placed in creating malicious software that makes
current national security policies an
issue. Transnational crimes such as cyber laundering can be
hidden through multiple layers of
cyber access points created by automation increase
requirements. Another issue is that with
internal support given to adversaries by recruiting business and
intellectual individuals, as
suggested by the article, the damages caused by cybercrimes
will continue to grow, making it
impractical to calculate. Information gained from this article
contributes to further analysis of
US policies targeting cyber-laundering.
Lieutenant Colonel John W. Brennan’s 2012 literature
United States Counter Terrorism
Cyber Law Policy, Enabling or Disabling recognizes the need
for political lawmakers and
6
national decision-makers to place emphasis on the modification
to current US policies. This
study was conducted to determine if US counter terrorism cyber
laws and policies were enabling
or disabling government initiatives to counter the fight on
terrorism in cyberspace. There appear
to be no optimization on the use of national counter terrorism
assets according to the study; to
include, a lack of policies update that are designed to
effectively support government officials.
Although there are US strategies such as the 2011 International
Strategy for Cyber Space, the
study emphasizes the need to initiate a comprehensive sourcing
for domestic and international
law. The failure to take these actions will continue to hinder
the professionals from performing
their jobs effectively whom are the very ones the strategy is
designed to support. The gap that is
created resulting from inconsistencies between national
security, counter terrorism and its cyber
strategies, and the laws and policies currently established
enables terrorist organizations to
occupy and operate cybercrimes successfully; including, cyber
laundering. The review of this
document increases the awareness of US policies that are not
fully supported by domestic or
international law.
A 2008 report to Congress by Clay Wilson, Botnets,
Cybercrime, and Cyberterrorism:
Vulnerabilities and Policy Issues for Congress, reveals the
modernization and sophistication of
cybercrime. The report supports this research in that evidence
is provided that support gaps
within current US policies targeting cyber-laundering.
Additionally, the literature specifically
bridges the two researched transnational crimes, illicit drug
trafficking and cyber-laundering.
The article points out the fact that normal business practices for
some IT business consists of
developing more advance computer codes for the sole purpose
to be utilized for cybercrimes.
The illicit profits are recognized as being extraordinary.
Modern technologies continue to
surpass policy for law enforcement. Complications of
coordination among agencies of different
nations, also with clashing national policies about crime in
cyberspace, cultivate to the benefit of
cybercriminals who can select to function from geographic
locations where penalties may not
exist for some forms of cybercrime. Value is added to the
research with the insertion of specifics
from this literature because it magnifies the complexities that
must be taken into consideration
during the establishment of new US policies or the modification
of current US policies.
Cyber-laundering techniques that are utilized by criminals or
terrorist organizations are
discussed in Wojciech Filipkowski’s 2008 article Cyber
Laundering: An Analysis of Typology
and Techniques. The purpose of this literature is to add
examples and highlight symptoms of
7
cyber laundering. Additionally, facts and evidence revealed in
this literature substantiate many
claims within this research. Policies and laws that are tailored
to human beings may exist in both
the physical natural environment and the cyber environment.
Unfortunately, the authority to
enforce policies and laws amongst digital profiles in the cyber
environment is not a simple task.
The ability to exchange or transfer currency in a digital
environment swiftly, easily, securely,
and mostly anonymously are all great attributes of the use of the
Internet. The issue arise in the
increase use of these same attributes by terrorist organizations
for both illicit drug trafficking and
illicit cyber-laundering.
8
Bibliography
Albanese, J. (2012) Deciphering the Linkages between
Organized Crime and
Transnational Crime. Journal of International Affairs, Vol
66(Issue 1), pp. 1-16
Bahgat, G. (1999) Iran and Terrorism: The Transatlantic
Responses. Studies in Conflict
&Terrorism. 22(2), 141-152. doi:10.1080/105761099265801
Brennan, J. (2012) United States Counter Terrorism Cyber Law
and Policy, Enabling or
Disabling? Retrieved from
http://nsfp.web.unc.edu/files/2012/09/Brennan_united-states-
counter-terrorism-
cyber-law-and-policy.pdf
Boyum, D. and Reuter, P. (2005) An Analytic Assessment of
U.S. Drug Policy.
Washington, DC. Aei Press.
Caulkins, J. and Kleiman, M. (2008) Drug Policy in
Understanding America: The
Anatomy of a Exceptional Nation, eds Peter H. Schuck & James
Q. Wilson, 563-
953. New York: Public Affairs
Costanza, W. (2001) Hizballah and its Mission in Latin
America.
Cyber Laundering: The Risks to On-line Banking and E-
Commerce Companies.
Retrieved May 29, 2008 from Stop money laundering!
International conference
(London, February, 2002) Web site:
http://www.antimoneylaundering.ukf.net/papers/solicitor.htm
Doyle, C. (2002) The USA PATRIOT Act: A Legal Analysis.
Retrieved from
http://www.fas.org/irp/crs/RL31377.pdf
Ephron, D., Reno, J., Sparks, J., & Hosenball, M. (2006)
Hezbollah’s Men Inside
America. Newsweek, 148(7), 24-25
Filipowski, W. (2008). Cyber laundering: An analysis of
typology and techniques.
International Journal of Criminal Justice Sciences, Vol 3(Issue
1), pp. 15-27, doi:
ISSN: 0973-5089
Finckenauer, J., and K. Chin. “Asian Transnational Organized
Crime and Its Impact on
the United States.” Final report for the National Institute of
Justice, Washington,
DC: U.S. Department of Justice, National Institute of Justice,
2006, NCJ 213310.
Finklea, K. and Theohary, C. (2013). Cybercrime: Conceptual
Issues for Congress and
U.S. Law Enforcement. Retrieved from
http://jltp.uiuc.edu/recdevs/raghavan.pdf
9
Hathaway, O., Crootof, R., Levitz, P., Nix, H., Nowlan, A.,
Perdue, W. and Spiegel, J.
(2011). The Law of Cyber-Attack. Retrieved from
http://www.law.yale.edu/documents/pdf/cglc/LawOfCyberAttac
k.pdf
Paraschiv, G. (2013). Conceptualizing Transnational Organized
Crime.
Economic, Management, and Financial Markets, Vol 8(Issue 2),
pp. 173-178,
ISSN 1842-3191
Perl, R. (2006). International Drug Trade and U.S. Foreign
Policy. Retrieved from
http://www.au.af.mil/au/awc/awcgate/crs/rl33582.pdf
Raghavan, T. (2003). In Fear of Cyberterrorism: An Analysis of
the Congressional
Response. Retrieved from
http://jltp.uiuc.edu/recdevs/raghavan.pdf
Rollins, J. and Wyler, L. (2013). Terrorism and transnational
crime: Foreign
policy issues for congress. Retrieved from
http://fas.org/sgp/crs/terror/R41004.pdf
Rollins, J. and Wyler, L. (2010). International Terrorism and
Transnational
Crime: Security Threats, U.S. Policy, and Considerations for
Congress. Retrieved
from http://www.fas.org/sgp/crs/terror/R41004-2010.pdf
Saint-Claire, S. (2011). Overview and Analysis on Cyber
Terrorism. Retrieved from
http://www.iiuedu.eu/press/journals/sds/SDS_2011/DET_Article
2.pdf
Snow, G. (2011). Federal Bureau of Investigation: The
cybersecurity threat.
Retrieved from
http://www.fbi.gov/news/testimony/cybersecurity-responding-
to-
the-threat-of-cyber-crime-and-terrorism
Solicitor General Canada (1998). Electronic Money Laundering:
An
Environmental Scan. Retrieved May 29, 2008 from the
Department of Justice
(Canada) Retrieved from:
http://www.justice.gc.ca/eng/pi/rs/rep-
rap/1998/wd98_9-dt98_9/wd98_9.pdf
The White House. (2010). Cyberspace Policy Review: Assuring
a trusted and resilient
information and communications infrastructure. Retrieved from
http://www.whitehouse.gov/assets/documents/Cyberspace_Polic
y_Review_final.p
df
Whine, M. (2010). Cyberspace-A New Medium for
Communication, Command, and
Control by Extremists. Studies in Conflict & Terrorism, Vol
22(Issue 3), pp. 231-
245, doi: 10.1080/105761099265748
Wilson, C. (2008). Botnets, Cybercrime, and Cyberterrorism:
Vulnerabilities and Policy
Issues for Congress. Retrieved from
https://www.fas.org/sgp/crs/terror/RL32114.pdf
10
Wyler, L. & Cook, N. (2009). Illegal Drug Trade in Africa:
Trends and U.S. Policy
Retrieved from http://www.fas.org/sgp/crs/row/R40838.pdf
1
13
Do not put page number on your title page. Remove your last
name from the header.
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO
REDUCE THE THREAT TO THE NATION’S CYBER
SYSTEMS
A Master Thesis
Submitted to the Faculty
Comment by Chris: Change to “of”.
Of
American Public University
By
In Partial Fulfillment of the
Requirements for the degree
Comment by Chris: Change to “of”.
Of
Master of Arts
March 2016
American Public University
Charles Town, WV
Ahmad, R. & Yunos, Z. A dynamic cyber terrorism framework.
International Journal of Computer Science and Information
Security, 10(2), 149-158.
Contrary to traditional warfare, today's battlefield go beyond
national borders since cyber space has increased the scope.
Even the most important department the nation’s security, the
defense, is under constant threat from terrorists. Enemies of the
US are devising ways of cracking down the country’s valued
information system especially the Defense Department.
The availability of hacking tools has increased over time as well
as the quality. Unlike the weapons of conventional warfare,
tools for cyber warfare are accessible and undergoing constant
sophistication. As a matter of fact, a country or organization
with limited technology, staff, and funding and defense
infrastructure is able to wreak havoc on short notice from any
region in the world. As a matter of fact, there have been cases
of attacks on the nation’s defense information systems, stock
exchange among others. Subsequently, the US security
departments should remain sober through so as to protect
citizens at all times.
Brenner, Susan W. Cybercrime. Santa Barbara, Calif.: Praeger,
2010.
The author explains what cyber-crime is, and the need for
everyone to be concerned about it, including the common
citizen computer, is either used as a tool or target in cyber
criminality. Furthermore, cyber-crime has not only led to a
relatively new form of crime but has also led to the
transformation of committing traditional crimes. The only
effective way of fighting cybercrime is waging a common battle
involving all stakeholders; the public, law enforcement, private
and public sectors as well as regional and international allies.
Given the increased global interconnectedness today, online
communication has led to the emergence of new risks. This
communication surpasses physical barriers leading to a struggle
on international legal framework since each nation is only able
to regulate communication within its jurisdiction. The legal
implications surrounding cyber-crime benefits criminals who
have actually formed networks comparable to terrorist groups.
The emergence of cyber terrorism is a clear indication of the
constant evolution of cybercrime hence need for a dynamic
international framework to tackle it effectively.
Merton, Robert King. Social Theory and Social Structure, n.d.
Numerous theories have been constructed to
explain crime among them Robert Merton’s strain theory. He
coined his theory based on the concept of the “American
Dream” which piles pressure on individuals. Deviant
subcultures emerge in the society when there is too much
emphasis on success but limited means of achieving. Some of
the highlighted flaws of the society include the inability to
access quality education, inadequate employment opportunities
among others.
This theory is relevant to this study in that, cybercrime, a
relatively new crime must have emerged as a result of social
and economic factors. Although it can be argued that technology
has led to the occurrence of cybercrime, a bad intent comes into
play in the occurrence of any crime. People react to a number of
ways when pressure is placed upon then to succeed. Conformists
will stick to the institutionalized means of success, Ritualists
lose sight of success but stick to legal means of making a
living. Furthermore, innovators accept the institutionalized goal
of success but create their own means of achieving it.
Retreatism occurs when people reject the emphasis of success
and means of achieving it. Finally, Rebellion is a mode of
adaptation whereby an individual rejects both the culturally
accepted goals as well as means of achieving it but replace them
with new means of success. Drawing reference from this theory,
a good number of individuals engage in cybercrime for profit
which can be translated as a means of achieving success.
Khaddar, Majid. War and Peace in the Law of Islam. Clark, NJ:
Lawbook Exchange, 2007.
Globalization and modern technology have made criminal
activity more common, easier to commit but hard to detect
hence more lucrative. Since perpetrators of cybercrime come
from a wide spectrum of society, profit driven crimes remain of
importance to perpetrators the same way business is to owners.
The author gives an articulate analysis of modern doctrines
regarding war and peace and its adaptation to contemporary
conditions. Crime in the 21st century has really evolved thus
understanding crime in its very nature as it is in the society.
Criminals are always on the lookout for valuable information to
steal it for a competitive edge or financial gain. Defense to
counter cybercrime is evolving just the same way cybercrime is
undergoing sophistication. Therefore, the best way to protect
oneself or business organization from falling victims is ensuring
that the latest defenses are kept in place. Four main ways of
ensuring data security are highlighted namely, raising
awareness by the public and training staff, ensuring that
software used is updated, ensuring firewalls are correctly
configured and retaining security expertise within forms to
ensure that threats are addressed as they occur.
Jaishankar, K. Cyber Criminology. Boca Raton, FL: CRC Press,
2011.
Victims of crime require special care other than punishing
perpetrators or restoring justice. This is because crimes
inclusive cybercrime have detrimental effects on individuals
since it entails loss of personal identification, monetary loss,
and low productivity. Due to the anonymity assured in the
perpetration, victimization through information networks is on
the rise.
According to the literature, an individual’s lifestyle patterns
and act as a predisposing factor to victimization. Depending on
the type of attack, there exist two ways of becoming victim
namely direct or indirect attack. A direct attack happens when
an individual’s action is necessary for the course of attack such
as opening an email attachment, visiting websites infected with
malware among others. Indirect victimization occurs when an
individual’s information is obtained by cyber criminals from
cyber systems belonging to service providers such as e-shops
among others. Consequently, individuals whose lifestyle entails
a lot of activity using the internet such as communication,
business, and shopping, entertainment among others has a
higher susceptibility than less active individuals in the virtual
world.
Press, Bernan. Crime in the United States 2009. Lanham:
Rowman & Littlefield Pub. Group, 2009.
The author provides findings released by the FBI annually from
its Uniform Crime Reporting Program (UCRRP). Numerous
forms of crimes are advanced in the publication and are grouped
into various categories such as race, sex, and age of victims and
offenders. The age of committing cybercrime is said to be 17
years in the United States while the victim age is open.
However, youths are among the most vulnerable groups with
distributed denial of service, cyber stalking, hacking and child
soliciting and abuse the most likely forms of attacks.
It’s important to have a clear picture of the
state of cyber criminality in the nation before embarking on
devising means of curbing it. It’s a fact that cyber systems in
the United states area under risk of cyber-attacks more than
ever since the inception of the internet in 1989. A less
generalized approach is the better option in dealing with the
menace posed by cybercrime so as to deal with each group
based on specific demographic factors to prevent offending as
well victimization.
Holt, Thomas J, and Adam M Bossler. Cybercrime In Progress.
Theory And Prevention Of Technology-Enabled Offenses, n.d.
Perpetrators of cybercrime are not necessarily knowledgeable in
the technical front. This is because they can purchase software
or malware needed in perpetration of these crime which come
along with guides and tips of use. Further there is ready
information in the internet as well people willing to help them
out. Furthermore, there exists ready-made malicious software
for download. These factors reduce the hardship in obtaining
tools of perpetration thus make cybercrime a risk worth taking.
The relevance of this literature lies within the essence of
educating the community to protect themselves. Enhancing the
capability of government agencies in the fight against crime,
cultivating an approach whose main focus is intelligence
gathering are some of the proposed methods of fighting cyber
criminality. Moreover, ensuring an effective court system and
improving international collaboration are also very vital. Given
that the US incurs loss of business as well as taxation revenues,
a good prevention investment is worth it.
Benner, Eric. "Apple Fights Order To Unlock San Bernardino
Gunman’S iPhone". Nytimes.Com. Last modified 2016.
Accessed March 3, 2016.
http://www.nytimes.com/2016/02/18/technology/apple-timothy-
cook-fbi-san-bernardino.html.
More often than not, the question of civil rights
and prevention of cyber criminality raise questions. Human
rights and justice and justice should not be suspended even in
times of war as this removes their very essence. As a matter of a
great psychologist argued that justice is not a natural
phenomenon and would not exist if people coexisted
harmoniously. Therefore, its existence seeks to serve a given
purpose which should not be ignored under any circumstances.
The relevance of this literature to the research
question is enormous. Criminals will always leave a trail of
evidence on electronic gadgets when used in the perpetration of
crimes. ‘Therefore, law enforcement may want to have
unchallenged authority to access any gadget they wish even in
the course of justice. This would, however, put individual’s
right of privacy. On the contrary, this move may be seen as
protecting terrorists and cyber criminals by ensuring that the
road to detection full of hardships. This is a very critical in the
US right now and should be given undivided attention because a
solution today is an achievement today and the future in the war
against cyber-attacks and cyber terrorism.
Clough, J. Principles of cybercrime. Cambridge, UK:
Cambridge University Press, 2010.
The view that technology has exceeded our humanity is
somehow true in the contemporary world. It is actually
impossible to determine the scale of cybercrime problem.
Technology is depicted as far reaching with an estimated figure
of over 1.6 billion people accessing the internet. Furthermore,
more people access computers which are being designed to be
user-friendly and easier to use. Consequently, software is being
produced and advanced at a high rate thus the problem of bugs
which can be exploited inevitable.
Cybercrime is a problem being faced by all countries with
causal factors being more or less similar. Therefore, a multi-
dimensional move is the best approach in dealing with
cybercrime. Understanding the unique factors affecting a
particular nation cannot be overlooked either way. According to
this literature, a clear definition of cybercrime needs to be
formed as the first step towards securing a legal backing to this
problem. In a nutshell, gaps in law must be eliminated.
Goodman, M. Future Crimes: Everything Is Connected,
Everyone Is Vulnerable and What We Can Do About It. New
York [New York]: Doubleday, 2015.
The author benefits the world by going to an
extent of explaining how digital devices that are often ignored
in the explanation of cybercrime act as a soft target for
criminals. Such devices and services include 3d printers, home
automation, mobile payment, facial recognition, GPS, driverless
cars among others. He, therefore, gives the world a call that
every single gadget deserve to be handled with care in terms of
security
This literature secured lots of recommendation for people trying
to understand online security as well as resultant crime issues
due to its detailed information. If people understand the
underlying factors and issues within the topic of cybercrime,
they become empowered and better placed to collaborate with
the nation’s law enforcement agencies in the fight to secure the
nations cyber systems. The exhaustive coverage of this
literature shows that due to the fact that everything is
interconnected in the virtual world, everyone is at risk of falling
victim hence the way forward not taking anything for granted.
Kirwan, G., & Power, A. The psychology of cybercrime:
Concepts and principles. Hershey, PA: Information Science
Reference, 2012.
This literature suggests that there exists a relationship between
cybercrime and abnormal psychology. The most prominent
disorders are anti-social personality disorder, narcissism,
compulsive disorder, addictive behavior and Asperger
syndrome. The author rightly advances a new scope relevant to
this study when he states that when hackers ensure anonymity,
they avoid labeling hence cultivate a perception that their
actions are not deviant. The psychological profiling of cyber
criminals stands to benefit the academic community, legal
system, private sector and national security sector.
Fighting any form of crime requires having prior knowledge of
what crime entails regarding its nature of perpetration, target
groups, predisposing factor, demographic factors in perpetration
and offending among other factors. Therefore proving that
psychological factors indeed cause perpetration of cybercrimes
within this study shall be of great help in assisting suspects and
offenders undergo proper reformation given the high rates of
recidivism in our nation. In other words, by understanding the
motivating factors crime, better prevention, detection and
intervention of such activities can be instituted.
Kirwan, G., & Power, A. Cybercrime: The psychology of online
offenders. Cambridge University, 2013.
The author takes a very reserved point of view
in understanding the psychology of cyber criminals. This
literature shows the difficulty in relating the two aspects as it
would be to determine who would be a CEO of a multinational
company, a serial killer, an al Qaeda jihadist among others
based on psychological profile. However, in spite of the
challenges stated, employers would mainly be negligent not to
take into account factors if any showing that certain candidates
possess a high risk of being cyber criminals.
Although little hope of relating the two
phenomena is depicted, this view can be overruled using the
already existing statistics of how psychological factors cause
perpetration. Individuals who want to experience the feeling of
power and control will undoubtedly focus on cybercrime as an
alternative to traditional crimes. Whereas some will commit
computer related for fun, out of boredom, the thrill involved
and peer pressure, a right minded individual will avoid it at all
cost since they are aware that it will in one way or another lead
to pain to someone else. In fact, mental incapacity is strongly
exhibited to youths who will cause suffering to their peers-
people they know and interact with everybody.
O'Brien, M., & Yar, M. Criminology: The key concepts.
London: Routledge, (2008).
The contemporary world utilizes a multi-dimensional approach
to the concepts, institution, and approaches fundamental to the
study of crime. Issues advanced in this context include but not
limited to policing and the justice system, types of crime,
terrorism, war crimes, social issues and criminal psychology.
Although much has been done in the US in
addressing cybercrime based on the above-stated concepts, a lot
needs to be done because cybercrime is far from being
understood leave alone proper combating. The education system
needs to be fully involved in socializing the young generation
into a healthy lifestyle amidst the vigorous technological
advancements. Addressing the root cause of crime is the best
way towards achieving a crime free society hence taking a
similar approach with cybercrime will reduce it greatly if not
total elimination. Ensuring that at least a general concept of
addressing the root cause of cybercrime in all preventive
measures employed to protect US cyber systems will end any
conflicts playing a part in causation of cybercrime namely
societal, personal, political, intrastate, and interstate conflicts.
Ruan, K. Cybercrime and cloud forensics: Applications for
investigation processes. Hershey, PA: Information Science
Reference, 2013.
Our infrastructure is structured around computers. Individuals
with malicious can somehow cripple health, transport and
communication sectors effortlessly. There has been a shift from
human labor to computers in the wake of modernization and
globalization. Since most crimes leave trails behind them, it’s
important to know how to unearth these trails in the process of
investigation. Investigation here does not only involve a
perpetrators computer or digital gadget but entails relating all
factors at hand to determine any information network that could
have been used as a secondary tool.
Computer forensics have been very effective so far given the
high level of knowledge and technicality involved. A
considerable amount of data is able to be analyzed in a fast and
efficient way. Further, more valuable data can be retrieved and
be used in courts as evidence against perpetrators. Nonetheless,
computer forensic analysts have been criticized for constructing
findings in such a way that it’s admissible in court.
Your Annotated Bibliography was good. Your sampling of the
14 references you chose will provide a solid foundation for your
literature review. As I indicate in Week 6’s assignment and
announcement, your annotations on the authors or articles that
you chose will form a part of your lit review. This annotated
bibliography is NOT a Literature Review. The next part is
LINKING the themes that you identified in your annotations.
Each article will have links or common themes and as your
write, you are likely to develop new or additional ideas of
interest. Linking your reviews is accomplished by the theme of
your paper and linking similar threads. I like that each of your
annotated themes supports your topic and provides a firm
foundation that is rooted in the literature. Remember, you can
also drill down into each bibliography for further resources.
You should aim for 25 to 50 references total for your final
paper. I look forward to seeing your initial Lit Review!!
Chris
Criteria
Exemplary 16-20
Accomplished 11-15
Developing 6-10
Beginning 0-5
Total
Synthesis of Knowledge
17
Foundation of Knowledge
17
Application of Knowledge
16
Organization of Ideas/Format
15
Writing and Research Skill
15
Total
50
30
80

More Related Content

Similar to Week-3 Scholarly WritingReview the document, How to Benefit from.docx

Collin CenciAnalysis is one of the key components to the int.docx
Collin CenciAnalysis is one of the key components to the int.docxCollin CenciAnalysis is one of the key components to the int.docx
Collin CenciAnalysis is one of the key components to the int.docxclarebernice
 
Proposal Presentaton.pptx
Proposal Presentaton.pptxProposal Presentaton.pptx
Proposal Presentaton.pptxAbulHasan86
 
STA 544Homework 1Work on the following problem set and show yo.docx
STA 544Homework 1Work on the following problem set and show yo.docxSTA 544Homework 1Work on the following problem set and show yo.docx
STA 544Homework 1Work on the following problem set and show yo.docxsusanschei
 
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docxMY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docxgilpinleeanna
 
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docxAssignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docxjosephinepaterson7611
 
Wiley and Springer are collaborating with JSTOR to digitize,.docx
  Wiley and Springer are collaborating with JSTOR to digitize,.docx  Wiley and Springer are collaborating with JSTOR to digitize,.docx
Wiley and Springer are collaborating with JSTOR to digitize,.docxjoyjonna282
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive PolicingSherry Bailey
 
Erik S. LesserStringerGe.docx
Erik S. LesserStringerGe.docxErik S. LesserStringerGe.docx
Erik S. LesserStringerGe.docxSALU18
 
MUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docx
MUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docxMUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docx
MUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docxjacmariek5
 
Beyond Recommendations and Interpretive Notes: An Examination of How NGO Acco...
Beyond Recommendations and Interpretive Notes: An Examination of How NGO Acco...Beyond Recommendations and Interpretive Notes: An Examination of How NGO Acco...
Beyond Recommendations and Interpretive Notes: An Examination of How NGO Acco...Lydia Boyer
 
3.5 - Discussion ARFF Personnel SafetyOnce again, we are .docx
3.5 - Discussion ARFF Personnel SafetyOnce again, we are .docx3.5 - Discussion ARFF Personnel SafetyOnce again, we are .docx
3.5 - Discussion ARFF Personnel SafetyOnce again, we are .docxlorainedeserre
 
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docxRunning head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docxjeanettehully
 
Women-and-Violent-Extremism-The-US-and-UK-Experiences (1)
Women-and-Violent-Extremism-The-US-and-UK-Experiences (1)Women-and-Violent-Extremism-The-US-and-UK-Experiences (1)
Women-and-Violent-Extremism-The-US-and-UK-Experiences (1)Sabera Ahsan
 

Similar to Week-3 Scholarly WritingReview the document, How to Benefit from.docx (17)

Collin CenciAnalysis is one of the key components to the int.docx
Collin CenciAnalysis is one of the key components to the int.docxCollin CenciAnalysis is one of the key components to the int.docx
Collin CenciAnalysis is one of the key components to the int.docx
 
Proposal Presentaton.pptx
Proposal Presentaton.pptxProposal Presentaton.pptx
Proposal Presentaton.pptx
 
STA 544Homework 1Work on the following problem set and show yo.docx
STA 544Homework 1Work on the following problem set and show yo.docxSTA 544Homework 1Work on the following problem set and show yo.docx
STA 544Homework 1Work on the following problem set and show yo.docx
 
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docxMY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
 
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docxAssignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
Assignment 2 Intelligence and CounterintelligenceBoth domestic an.docx
 
Wiley and Springer are collaborating with JSTOR to digitize,.docx
  Wiley and Springer are collaborating with JSTOR to digitize,.docx  Wiley and Springer are collaborating with JSTOR to digitize,.docx
Wiley and Springer are collaborating with JSTOR to digitize,.docx
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive Policing
 
E09042536
E09042536E09042536
E09042536
 
Erik S. LesserStringerGe.docx
Erik S. LesserStringerGe.docxErik S. LesserStringerGe.docx
Erik S. LesserStringerGe.docx
 
MUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docx
MUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docxMUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docx
MUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docx
 
Beyond Recommendations and Interpretive Notes: An Examination of How NGO Acco...
Beyond Recommendations and Interpretive Notes: An Examination of How NGO Acco...Beyond Recommendations and Interpretive Notes: An Examination of How NGO Acco...
Beyond Recommendations and Interpretive Notes: An Examination of How NGO Acco...
 
Dp8497
Dp8497Dp8497
Dp8497
 
Dp8497
Dp8497Dp8497
Dp8497
 
Weber_3300_L8_RP
Weber_3300_L8_RPWeber_3300_L8_RP
Weber_3300_L8_RP
 
3.5 - Discussion ARFF Personnel SafetyOnce again, we are .docx
3.5 - Discussion ARFF Personnel SafetyOnce again, we are .docx3.5 - Discussion ARFF Personnel SafetyOnce again, we are .docx
3.5 - Discussion ARFF Personnel SafetyOnce again, we are .docx
 
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docxRunning head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
 
Women-and-Violent-Extremism-The-US-and-UK-Experiences (1)
Women-and-Violent-Extremism-The-US-and-UK-Experiences (1)Women-and-Violent-Extremism-The-US-and-UK-Experiences (1)
Women-and-Violent-Extremism-The-US-and-UK-Experiences (1)
 

More from philipnelson29183

·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docxphilipnelson29183
 
·Analyze HRM legal regulations and learn proper procedures for.docx
·Analyze HRM legal regulations and learn proper procedures for.docx·Analyze HRM legal regulations and learn proper procedures for.docx
·Analyze HRM legal regulations and learn proper procedures for.docxphilipnelson29183
 
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docxphilipnelson29183
 
~GOODWRITER~You have now delivered the project to your customer..docx
~GOODWRITER~You have now delivered the project to your customer..docx~GOODWRITER~You have now delivered the project to your customer..docx
~GOODWRITER~You have now delivered the project to your customer..docxphilipnelson29183
 
__ captures a mother and child at the table in __ Paula Modersohn .docx
__ captures a mother and child at the table in __ Paula Modersohn .docx__ captures a mother and child at the table in __ Paula Modersohn .docx
__ captures a mother and child at the table in __ Paula Modersohn .docxphilipnelson29183
 
[removed]Which of the following would not be considered a subarea .docx
[removed]Which of the following would not be considered a subarea .docx[removed]Which of the following would not be considered a subarea .docx
[removed]Which of the following would not be considered a subarea .docxphilipnelson29183
 
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docxphilipnelson29183
 
[removed]World’s Biggest Public Compan.docx
[removed]World’s Biggest Public Compan.docx[removed]World’s Biggest Public Compan.docx
[removed]World’s Biggest Public Compan.docxphilipnelson29183
 
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docx
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docxZhibei Wang04172020Page 5Authoritarian or Authoritati.docx
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docxphilipnelson29183
 
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docxZinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docxphilipnelson29183
 
Zeno of Elea.Heres the assignment Write a double-spaced paper .docx
Zeno of Elea.Heres the assignment Write a double-spaced paper .docxZeno of Elea.Heres the assignment Write a double-spaced paper .docx
Zeno of Elea.Heres the assignment Write a double-spaced paper .docxphilipnelson29183
 
Yo          los libros en la mochila.Ana y Salvador          la ta.docx
Yo          los libros en la mochila.Ana y Salvador          la ta.docxYo          los libros en la mochila.Ana y Salvador          la ta.docx
Yo          los libros en la mochila.Ana y Salvador          la ta.docxphilipnelson29183
 
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docxYouve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docxphilipnelson29183
 
Youre gonna respond to Are too many people going to college by Ch.docx
Youre gonna respond to Are too many people going to college by Ch.docxYoure gonna respond to Are too many people going to college by Ch.docx
Youre gonna respond to Are too many people going to college by Ch.docxphilipnelson29183
 
Your team was invited to present to a high school IT class to explai.docx
Your team was invited to present to a high school IT class to explai.docxYour team was invited to present to a high school IT class to explai.docx
Your team was invited to present to a high school IT class to explai.docxphilipnelson29183
 
Your Paper (8 pages) should include the following areas1. Cover P.docx
Your Paper (8 pages) should include the following areas1. Cover P.docxYour Paper (8 pages) should include the following areas1. Cover P.docx
Your Paper (8 pages) should include the following areas1. Cover P.docxphilipnelson29183
 
Your organization is expanding globally and you will no longer have .docx
Your organization is expanding globally and you will no longer have .docxYour organization is expanding globally and you will no longer have .docx
Your organization is expanding globally and you will no longer have .docxphilipnelson29183
 
Your outline should be a detailed overview of the Service Learning .docx
Your outline should be a detailed overview of the Service Learning .docxYour outline should be a detailed overview of the Service Learning .docx
Your outline should be a detailed overview of the Service Learning .docxphilipnelson29183
 

More from philipnelson29183 (20)

·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
·NEWSStates Take Aim at Social Welfare Programs  By Ti.docx
 
·Analyze HRM legal regulations and learn proper procedures for.docx
·Analyze HRM legal regulations and learn proper procedures for.docx·Analyze HRM legal regulations and learn proper procedures for.docx
·Analyze HRM legal regulations and learn proper procedures for.docx
 
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
[removed]1.value15.00 pointsProblem 5-3A Perpetual Alt.docx
 
~GOODWRITER~You have now delivered the project to your customer..docx
~GOODWRITER~You have now delivered the project to your customer..docx~GOODWRITER~You have now delivered the project to your customer..docx
~GOODWRITER~You have now delivered the project to your customer..docx
 
__ captures a mother and child at the table in __ Paula Modersohn .docx
__ captures a mother and child at the table in __ Paula Modersohn .docx__ captures a mother and child at the table in __ Paula Modersohn .docx
__ captures a mother and child at the table in __ Paula Modersohn .docx
 
[removed]Which of the following would not be considered a subarea .docx
[removed]Which of the following would not be considered a subarea .docx[removed]Which of the following would not be considered a subarea .docx
[removed]Which of the following would not be considered a subarea .docx
 
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
__ de Dolores son médicos.Dolores tiene un tío que es __.A la ab.docx
 
[removed]World’s Biggest Public Compan.docx
[removed]World’s Biggest Public Compan.docx[removed]World’s Biggest Public Compan.docx
[removed]World’s Biggest Public Compan.docx
 
[removed].docx
[removed].docx[removed].docx
[removed].docx
 
[removed]1Government.docx
[removed]1Government.docx[removed]1Government.docx
[removed]1Government.docx
 
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docx
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docxZhibei Wang04172020Page 5Authoritarian or Authoritati.docx
Zhibei Wang04172020Page 5Authoritarian or Authoritati.docx
 
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docxZinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
Zinn Ch 14 - httpwww.historyisaweapon.comdefcon1zinnwarhea14.ht.docx
 
Zeno of Elea.Heres the assignment Write a double-spaced paper .docx
Zeno of Elea.Heres the assignment Write a double-spaced paper .docxZeno of Elea.Heres the assignment Write a double-spaced paper .docx
Zeno of Elea.Heres the assignment Write a double-spaced paper .docx
 
Yo          los libros en la mochila.Ana y Salvador          la ta.docx
Yo          los libros en la mochila.Ana y Salvador          la ta.docxYo          los libros en la mochila.Ana y Salvador          la ta.docx
Yo          los libros en la mochila.Ana y Salvador          la ta.docx
 
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docxYouve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
Youve now read Johnathan Swifts brilliant (it is, trust me) satiri.docx
 
Youre gonna respond to Are too many people going to college by Ch.docx
Youre gonna respond to Are too many people going to college by Ch.docxYoure gonna respond to Are too many people going to college by Ch.docx
Youre gonna respond to Are too many people going to college by Ch.docx
 
Your team was invited to present to a high school IT class to explai.docx
Your team was invited to present to a high school IT class to explai.docxYour team was invited to present to a high school IT class to explai.docx
Your team was invited to present to a high school IT class to explai.docx
 
Your Paper (8 pages) should include the following areas1. Cover P.docx
Your Paper (8 pages) should include the following areas1. Cover P.docxYour Paper (8 pages) should include the following areas1. Cover P.docx
Your Paper (8 pages) should include the following areas1. Cover P.docx
 
Your organization is expanding globally and you will no longer have .docx
Your organization is expanding globally and you will no longer have .docxYour organization is expanding globally and you will no longer have .docx
Your organization is expanding globally and you will no longer have .docx
 
Your outline should be a detailed overview of the Service Learning .docx
Your outline should be a detailed overview of the Service Learning .docxYour outline should be a detailed overview of the Service Learning .docx
Your outline should be a detailed overview of the Service Learning .docx
 

Recently uploaded

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 

Recently uploaded (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 

Week-3 Scholarly WritingReview the document, How to Benefit from.docx

  • 1. Week-3 Scholarly Writing Review the document, How to Benefit from Critiques of Your Work, located under your weekly resources. Spotlight on Skills: Information Literacy: Finding what you need in the library In this and other courses you need to find information, usually scholarly articles from the library, to support your learning activity. View the Northcentral Search Like an Expert Tutorial, located under your weekly resources, to learn how to Search like an Expert and find what you need efficiently in the vast holdings of the Northcentral Library. It is well worth your time! Assignment Your task this week is to locate two peer-reviewed articles in the NCU library that discuss current research on the topic addressed in your Week 2 assignment. You will evaluate the two new articles as part of your Week 4 assignment. Make sure you save either the doi/permalink from the NCU library, or a copy of the articles you locate because you will need to provide either the links or those copies to your faculty along with your paper in Week 4. In locating your articles, you may find it helpful to determine a more specific idea within the general topic that will help guide your research, not only for your Week 5 assignment, but also for other papers you will prepare later in the course. Length: 2 research articles You do not need to submit any documents this week. US POLICIES ON TWO TRANSNATIONAL CRIMES, ILLICIT
  • 2. DRUG TRAFFICKING AND CYBER-LAUNDERING, WILL NOT SECURE THE HOMELAND FROM TERRORIST THREATS A Master Thesis Submitted to the Faculty of American Public University by First Name Last Name In Partial Fulfillment of the Requirements for the Degree of Master of Arts April 2012 American Public University Charles Town, WV
  • 3. 1 A wealth of academic literature on transnational crimes has increased over the past decade. In particular, illicit drug trafficking and cyber-laundering, are two of the most active crimes that are being utilized to support terrorist organizations. The first of the resources for this research paper comes from Jay S. Albanese’s 2012 Deciphering the Linkages between Organized Crime and Transnational Crime from the Journal of International Affairs, Volume 66, Issue 1. The significance of this particular literature is that it provides characteristics of organized crimes and transnational crimes which is important for this study. The review of this literature highlights the linkage between organized crimes and transnational crime while making the point clear that the two are distinctively separate. By having a sound understanding in the particulars are critical as US policies are reviewed and discussed for analysis throughout the research. The root conduct of both organized crime and transnational crime parallels each
  • 4. other according to studies. A synopsis of this literature provides distinct differences between transnational crimes and international crimes in that transnational crime are those crimes leading to or resulting in individual profit. One of three elements, if not two or all three, may exists during the identification of transnational crimes. The elements are illegal substances, the arrangement for illegal labor, and or penetration of either commercial or government businesses operations. Additionally, the literature characterizes international crimes as those crimes that involves crimes against humanity that sometimes includes several countries. There are three classifications of transnational crimes, Provision of Illicit Goods; Provision of Illicit Services; and Infiltration of Business or Government. Studies have shown that the existence of transnational crime is nothing new. These crimes have in fact existed for many decades and there has been little to no change in them; but, the innovative technology has advance the means in which these crimes are executed.
  • 5. Another literature review provides an in-depth concern for political officials. John Rollins and Liana Wyler convey these concerns clearly in their 2010 article International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress. The literature adds value to the research because the recognition of political disconnects and law gaps that terrorist organizations exploit are highlighted. In this report to Congress there are conceivable strains between counterterrorism and anti-crime policy objectives; to include, the usefulness of financial intelligence in fighting the crime- terrorism nexus. (Rollins and Wyler 2010, 12) 2 Gilipowski W. Paraschiv’s 2013 Conceptualizing Transnational Organized Crime: Economic, Management, and Financial Markets, Volume 8, Issue 2, is an eye opening piece of
  • 6. literature. The purpose for inserting this literature within the research is to exclusively bring to the forefront the enormous amount of resources and assets that it will take to unify the international community in order for US policies to be more effective. A clear synopsis of this literature supports other areas of research in making it clear that the boundaries of transnational organized crimes are nonexistence. The article provides an understanding to how the international community realizes that transnational organized crime is a common threat while highlighting the division in international law and policies. Additionally, the article highlights transnational organized crime having developed in various countries throughout the world; subsequently, making this emergence a phenomenon. The literature illustrates the political influence throughout the international community that makes US policies vulnerable. For an example, Asia’s footprint consists of multiple loop holes added with corruption and a lack of effective governance. Without a clear definition or understanding to distinguish between gangs
  • 7. and organized crime, the political initiatives could have challenges. If there is not an objective to influence politicians to establish judicial authority at the national level to combat organized crime, many efforts to minimize this baseline that influences transnational crime will be doomed at the start. The size and growth of transnational crime cannot truly be determined because the crime groups often establish and maintain contingent ties with each other. Worthy to note is the hierarchical structure described in this article that clearly articulates the complexity in comprehending the international community’s ability to fight and stop transnational crime, the global threat impact of transnational crime, and the business and economic dimensions of these crimes. (Paraschiv 2013, 173-178) The Congressional Research Service describes various patterns that parallels to interaction among terrorist groups leading to transnational security issues. In recognition of these activities, the US Congress continues to respond with policies in attempts to remain abreast with the rapid
  • 8. changing environment in Terrorism and Transnational Crime: Foreign Policy Issues for Congress by John Rollins and Liana Wyler, 2013. US global security interests are threatened by transnational crimes and to this extent, in 2011 President Obama issued the Strategy to Combat Transnational Organized Crime. Although, the US security strategies maybe multidimensional 3 in focusing on citizen security and dismantling illicit networks, the support from governments throughout the international community is needed. The literature is significant and support the research in defining the complexity to establish policies to support the people to carry out strategic objectives that are identified within this study, starting at the top of the political stage. In Congress charge to evaluate the current policies and practices in determining if the US is synchronized in effectively fighting transnational crimes, the committee realizes that the
  • 9. conceptualization of transnational crime will require interagency coordination with international cooperation. Adding to the challenge of loyalty and total commitment is geographic regions and politics. Clapper’s testimony to Congress in 2012 emphasized that illicit networks have been fundamental in the growth of transnational crimes that has led to profitable terrorist networks; subsequently, increasing the threats to US national security. The research study focuses on two specific transnational crimes, illicit drug trafficking and cyber-laundering. The first of several literature reviews to support this research study in the area of illicit drug trafficking is a thorough analysis of US drug policy by David Boyum and Peter Reuter in 2005, An Analytic Assessment of US Drug Policy. The review of this literature supports the claims that policies targeting the prohibition of drugs are universally ineffective. The constant development of illicit drugs and its distributions are staying ahead of policies and counterdrugs programs designed to combat such activity. Although drugs growth in quantity are geographically limited, the sophistication involved in
  • 10. establishing an illicit transnational drug trafficking network makes the fight against these crimes more challenging. Another key point to highlight from the review is that US policies along with tougher laws will not materially reduce the use or illegal sale of drugs. The study within this literature exclusively discusses the need for drug treatment services that is in short supply. The ability to treat drug users is a key aspect in fighting the war on drugs; however, some US policies do not address the root issue or concern. The absence of US policies to target this area is a gap requiring lawmakers and politicians attention. The identified gap contributes to the research findings and establish ground for later discussions. Drug Policy in Understanding America: The Anatomy of a Exceptional Nation by Jonathan P. Caulkins and Mark A. R. Kleiman, 2008, highlights the counterdrug initiatives carried out by the US. The literature supports the study in many ways; but, specifically in such a way to magnify discussions surrounding US policies. In accordance to this literature, the US fight on
  • 11. 4 illicit drugs has led to more arrest and imprisonments than its European partners. A sense of relevancy is established in this literature that aid the conceptualization of illegal drug trafficking. The US parallels countries like Columbia and Nigeria in comparison to its severe drug problem. The literature focuses many efforts on comparing the US with other countries throughout the world to highlight the use of illicit drugs. The results of studies performed are anything less than stunning. Combating the trafficking of transnational illicit drug exhausts many US resources that include equipment, money, and people. Before the US could actually identify the chaos associated with its leading illicit drug, cocaine, Americans embraced the illicit drug before its exposures. Other countries simply watch the effects that it took throughout the US before trying the drug. To this extent, other countries did not have the capability in availability for cocaine.
  • 12. The US have large Colombian immigrants communities in Florida and New York and with so much legal trade occurring in these areas, the literature suggests that the capability to effectively hide the illegal trafficking of cocaine is almost seamless. The Congressional Research Service study focusing on the illegal drug trade in Africa has direct ties to the US policies designed to combat illicit transnational drugs trafficking. The majority of the illicit drug growth and trafficking in Africa is directed towards South America and European countries according to Liana S. Wyler and Nicolas Cook in their 2009 congressional research Illegal Drug Trade in Africa: Trends and U.S. Policy. However, other illegal products such as heroin and precursors required to make illicit drugs do enter the various borders of the US. The issue that is revealed in the literature is the threat to US policy and its interests both at home and abroad. Because of the enormous illegal drug production environments throughout the western portion of Africa, US policies combating transnational
  • 13. illicit drug trafficking faces an uphill battle. The challenge becomes even more complex when terrorist organizations occupy various parts of the region for safe havens. Additionally, the revelations of US policies being in its early stages or formative stages are exposed during this study. The study further suggests that there is not a solid commitment or coordination on roles from both the US and the international community’s counternarcotic agencies. Continued support that suggests the US policies for combating illicit drug trafficking are ineffective comes from a review of the updated 2006 Congressional Research Service Report for Congress, International Drug Trade and U.S. Foreign Policy by Raphael F. Perl. The literature discusses the rise in production of opium, marijuana, and coca. Subsequently, a key point that 5 relates to this study is the emphasis of concern relating to incontrollable consumption that
  • 14. contributes to further discussions throughout the research. In pursuit to establish the perfect anti- drug control policies, the US finds itself in a political storm that results from contradictions of national policy interests. The relevance of this literature to the study is significant because the findings proves invaluable in that the links between drug and terrorist organization are brought to the forefront. Additionally, another gap in US policy is exposed that sets the stage for follow on discussions throughout the research. The multiple programs that are discussed within this literature contributes to the confirmation of findings relative to this research study. The Federal Bureau of Investigations (FBI) describes the greatest cyber threats to be the illegal acquiring of assets, sensitive data such as economic information or military classified intelligence. Gordon M. Snow’s 2011 article, Federal Bureau of Investigation: The cybersecurity threat, focuses on the cyber threats to the US private sector, supply chain, and critical infrastructure. The article suggests that the US critical infrastructure will not be 100% intrusion
  • 15. free; thereby, always being available for anyone with the ability and means to gain access. There are tremendous economic losses resulting from cyber threats. Although, the FBI constantly changes its methods in dealing with cybercrimes, so does terrorist organizations. Innovation of new cyber technology improves national and international relations. Unfortunately, this same advance technology becomes available or can be gain through illicit means by terrorist organizations. The article clearly make a point to address the theft of intellectual property and supply chain issues that can be interrupted by terrorist organizations. The threat, although specifically discussed targeting US interests, is not an isolated threat for one nation. The growing cyber threat is an international issue with improvements in the availability and the ingenuity placed in creating malicious software that makes current national security policies an issue. Transnational crimes such as cyber laundering can be hidden through multiple layers of cyber access points created by automation increase requirements. Another issue is that with
  • 16. internal support given to adversaries by recruiting business and intellectual individuals, as suggested by the article, the damages caused by cybercrimes will continue to grow, making it impractical to calculate. Information gained from this article contributes to further analysis of US policies targeting cyber-laundering. Lieutenant Colonel John W. Brennan’s 2012 literature United States Counter Terrorism Cyber Law Policy, Enabling or Disabling recognizes the need for political lawmakers and 6 national decision-makers to place emphasis on the modification to current US policies. This study was conducted to determine if US counter terrorism cyber laws and policies were enabling or disabling government initiatives to counter the fight on terrorism in cyberspace. There appear to be no optimization on the use of national counter terrorism assets according to the study; to include, a lack of policies update that are designed to
  • 17. effectively support government officials. Although there are US strategies such as the 2011 International Strategy for Cyber Space, the study emphasizes the need to initiate a comprehensive sourcing for domestic and international law. The failure to take these actions will continue to hinder the professionals from performing their jobs effectively whom are the very ones the strategy is designed to support. The gap that is created resulting from inconsistencies between national security, counter terrorism and its cyber strategies, and the laws and policies currently established enables terrorist organizations to occupy and operate cybercrimes successfully; including, cyber laundering. The review of this document increases the awareness of US policies that are not fully supported by domestic or international law. A 2008 report to Congress by Clay Wilson, Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress, reveals the modernization and sophistication of cybercrime. The report supports this research in that evidence is provided that support gaps
  • 18. within current US policies targeting cyber-laundering. Additionally, the literature specifically bridges the two researched transnational crimes, illicit drug trafficking and cyber-laundering. The article points out the fact that normal business practices for some IT business consists of developing more advance computer codes for the sole purpose to be utilized for cybercrimes. The illicit profits are recognized as being extraordinary. Modern technologies continue to surpass policy for law enforcement. Complications of coordination among agencies of different nations, also with clashing national policies about crime in cyberspace, cultivate to the benefit of cybercriminals who can select to function from geographic locations where penalties may not exist for some forms of cybercrime. Value is added to the research with the insertion of specifics from this literature because it magnifies the complexities that must be taken into consideration during the establishment of new US policies or the modification of current US policies. Cyber-laundering techniques that are utilized by criminals or terrorist organizations are
  • 19. discussed in Wojciech Filipkowski’s 2008 article Cyber Laundering: An Analysis of Typology and Techniques. The purpose of this literature is to add examples and highlight symptoms of 7 cyber laundering. Additionally, facts and evidence revealed in this literature substantiate many claims within this research. Policies and laws that are tailored to human beings may exist in both the physical natural environment and the cyber environment. Unfortunately, the authority to enforce policies and laws amongst digital profiles in the cyber environment is not a simple task. The ability to exchange or transfer currency in a digital environment swiftly, easily, securely, and mostly anonymously are all great attributes of the use of the Internet. The issue arise in the increase use of these same attributes by terrorist organizations for both illicit drug trafficking and illicit cyber-laundering.
  • 20. 8 Bibliography Albanese, J. (2012) Deciphering the Linkages between Organized Crime and Transnational Crime. Journal of International Affairs, Vol
  • 21. 66(Issue 1), pp. 1-16 Bahgat, G. (1999) Iran and Terrorism: The Transatlantic Responses. Studies in Conflict &Terrorism. 22(2), 141-152. doi:10.1080/105761099265801 Brennan, J. (2012) United States Counter Terrorism Cyber Law and Policy, Enabling or Disabling? Retrieved from http://nsfp.web.unc.edu/files/2012/09/Brennan_united-states- counter-terrorism- cyber-law-and-policy.pdf Boyum, D. and Reuter, P. (2005) An Analytic Assessment of U.S. Drug Policy. Washington, DC. Aei Press. Caulkins, J. and Kleiman, M. (2008) Drug Policy in Understanding America: The Anatomy of a Exceptional Nation, eds Peter H. Schuck & James Q. Wilson, 563- 953. New York: Public Affairs Costanza, W. (2001) Hizballah and its Mission in Latin America. Cyber Laundering: The Risks to On-line Banking and E- Commerce Companies.
  • 22. Retrieved May 29, 2008 from Stop money laundering! International conference (London, February, 2002) Web site: http://www.antimoneylaundering.ukf.net/papers/solicitor.htm Doyle, C. (2002) The USA PATRIOT Act: A Legal Analysis. Retrieved from http://www.fas.org/irp/crs/RL31377.pdf Ephron, D., Reno, J., Sparks, J., & Hosenball, M. (2006) Hezbollah’s Men Inside America. Newsweek, 148(7), 24-25 Filipowski, W. (2008). Cyber laundering: An analysis of typology and techniques. International Journal of Criminal Justice Sciences, Vol 3(Issue 1), pp. 15-27, doi: ISSN: 0973-5089 Finckenauer, J., and K. Chin. “Asian Transnational Organized Crime and Its Impact on the United States.” Final report for the National Institute of Justice, Washington, DC: U.S. Department of Justice, National Institute of Justice, 2006, NCJ 213310. Finklea, K. and Theohary, C. (2013). Cybercrime: Conceptual Issues for Congress and
  • 23. U.S. Law Enforcement. Retrieved from http://jltp.uiuc.edu/recdevs/raghavan.pdf 9 Hathaway, O., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W. and Spiegel, J. (2011). The Law of Cyber-Attack. Retrieved from http://www.law.yale.edu/documents/pdf/cglc/LawOfCyberAttac k.pdf Paraschiv, G. (2013). Conceptualizing Transnational Organized Crime. Economic, Management, and Financial Markets, Vol 8(Issue 2), pp. 173-178, ISSN 1842-3191 Perl, R. (2006). International Drug Trade and U.S. Foreign Policy. Retrieved from http://www.au.af.mil/au/awc/awcgate/crs/rl33582.pdf Raghavan, T. (2003). In Fear of Cyberterrorism: An Analysis of
  • 24. the Congressional Response. Retrieved from http://jltp.uiuc.edu/recdevs/raghavan.pdf Rollins, J. and Wyler, L. (2013). Terrorism and transnational crime: Foreign policy issues for congress. Retrieved from http://fas.org/sgp/crs/terror/R41004.pdf Rollins, J. and Wyler, L. (2010). International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress. Retrieved from http://www.fas.org/sgp/crs/terror/R41004-2010.pdf Saint-Claire, S. (2011). Overview and Analysis on Cyber Terrorism. Retrieved from http://www.iiuedu.eu/press/journals/sds/SDS_2011/DET_Article 2.pdf Snow, G. (2011). Federal Bureau of Investigation: The cybersecurity threat. Retrieved from http://www.fbi.gov/news/testimony/cybersecurity-responding- to- the-threat-of-cyber-crime-and-terrorism Solicitor General Canada (1998). Electronic Money Laundering: An
  • 25. Environmental Scan. Retrieved May 29, 2008 from the Department of Justice (Canada) Retrieved from: http://www.justice.gc.ca/eng/pi/rs/rep- rap/1998/wd98_9-dt98_9/wd98_9.pdf The White House. (2010). Cyberspace Policy Review: Assuring a trusted and resilient information and communications infrastructure. Retrieved from http://www.whitehouse.gov/assets/documents/Cyberspace_Polic y_Review_final.p df Whine, M. (2010). Cyberspace-A New Medium for Communication, Command, and Control by Extremists. Studies in Conflict & Terrorism, Vol 22(Issue 3), pp. 231- 245, doi: 10.1080/105761099265748 Wilson, C. (2008). Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Retrieved from https://www.fas.org/sgp/crs/terror/RL32114.pdf 10
  • 26. Wyler, L. & Cook, N. (2009). Illegal Drug Trade in Africa: Trends and U.S. Policy Retrieved from http://www.fas.org/sgp/crs/row/R40838.pdf 1 13 Do not put page number on your title page. Remove your last name from the header. WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE THREAT TO THE NATION’S CYBER SYSTEMS A Master Thesis Submitted to the Faculty Comment by Chris: Change to “of”. Of American Public University By In Partial Fulfillment of the Requirements for the degree Comment by Chris: Change to “of”. Of Master of Arts March 2016 American Public University Charles Town, WV
  • 27. Ahmad, R. & Yunos, Z. A dynamic cyber terrorism framework. International Journal of Computer Science and Information Security, 10(2), 149-158. Contrary to traditional warfare, today's battlefield go beyond national borders since cyber space has increased the scope. Even the most important department the nation’s security, the defense, is under constant threat from terrorists. Enemies of the US are devising ways of cracking down the country’s valued information system especially the Defense Department. The availability of hacking tools has increased over time as well as the quality. Unlike the weapons of conventional warfare, tools for cyber warfare are accessible and undergoing constant sophistication. As a matter of fact, a country or organization with limited technology, staff, and funding and defense infrastructure is able to wreak havoc on short notice from any region in the world. As a matter of fact, there have been cases of attacks on the nation’s defense information systems, stock exchange among others. Subsequently, the US security departments should remain sober through so as to protect citizens at all times. Brenner, Susan W. Cybercrime. Santa Barbara, Calif.: Praeger, 2010. The author explains what cyber-crime is, and the need for everyone to be concerned about it, including the common citizen computer, is either used as a tool or target in cyber criminality. Furthermore, cyber-crime has not only led to a relatively new form of crime but has also led to the
  • 28. transformation of committing traditional crimes. The only effective way of fighting cybercrime is waging a common battle involving all stakeholders; the public, law enforcement, private and public sectors as well as regional and international allies. Given the increased global interconnectedness today, online communication has led to the emergence of new risks. This communication surpasses physical barriers leading to a struggle on international legal framework since each nation is only able to regulate communication within its jurisdiction. The legal implications surrounding cyber-crime benefits criminals who have actually formed networks comparable to terrorist groups. The emergence of cyber terrorism is a clear indication of the constant evolution of cybercrime hence need for a dynamic international framework to tackle it effectively. Merton, Robert King. Social Theory and Social Structure, n.d. Numerous theories have been constructed to explain crime among them Robert Merton’s strain theory. He coined his theory based on the concept of the “American Dream” which piles pressure on individuals. Deviant subcultures emerge in the society when there is too much emphasis on success but limited means of achieving. Some of the highlighted flaws of the society include the inability to access quality education, inadequate employment opportunities among others. This theory is relevant to this study in that, cybercrime, a relatively new crime must have emerged as a result of social and economic factors. Although it can be argued that technology has led to the occurrence of cybercrime, a bad intent comes into play in the occurrence of any crime. People react to a number of ways when pressure is placed upon then to succeed. Conformists will stick to the institutionalized means of success, Ritualists lose sight of success but stick to legal means of making a living. Furthermore, innovators accept the institutionalized goal of success but create their own means of achieving it. Retreatism occurs when people reject the emphasis of success and means of achieving it. Finally, Rebellion is a mode of
  • 29. adaptation whereby an individual rejects both the culturally accepted goals as well as means of achieving it but replace them with new means of success. Drawing reference from this theory, a good number of individuals engage in cybercrime for profit which can be translated as a means of achieving success. Khaddar, Majid. War and Peace in the Law of Islam. Clark, NJ: Lawbook Exchange, 2007. Globalization and modern technology have made criminal activity more common, easier to commit but hard to detect hence more lucrative. Since perpetrators of cybercrime come from a wide spectrum of society, profit driven crimes remain of importance to perpetrators the same way business is to owners. The author gives an articulate analysis of modern doctrines regarding war and peace and its adaptation to contemporary conditions. Crime in the 21st century has really evolved thus understanding crime in its very nature as it is in the society. Criminals are always on the lookout for valuable information to steal it for a competitive edge or financial gain. Defense to counter cybercrime is evolving just the same way cybercrime is undergoing sophistication. Therefore, the best way to protect oneself or business organization from falling victims is ensuring that the latest defenses are kept in place. Four main ways of ensuring data security are highlighted namely, raising awareness by the public and training staff, ensuring that software used is updated, ensuring firewalls are correctly configured and retaining security expertise within forms to ensure that threats are addressed as they occur. Jaishankar, K. Cyber Criminology. Boca Raton, FL: CRC Press, 2011. Victims of crime require special care other than punishing perpetrators or restoring justice. This is because crimes inclusive cybercrime have detrimental effects on individuals since it entails loss of personal identification, monetary loss, and low productivity. Due to the anonymity assured in the perpetration, victimization through information networks is on the rise.
  • 30. According to the literature, an individual’s lifestyle patterns and act as a predisposing factor to victimization. Depending on the type of attack, there exist two ways of becoming victim namely direct or indirect attack. A direct attack happens when an individual’s action is necessary for the course of attack such as opening an email attachment, visiting websites infected with malware among others. Indirect victimization occurs when an individual’s information is obtained by cyber criminals from cyber systems belonging to service providers such as e-shops among others. Consequently, individuals whose lifestyle entails a lot of activity using the internet such as communication, business, and shopping, entertainment among others has a higher susceptibility than less active individuals in the virtual world. Press, Bernan. Crime in the United States 2009. Lanham: Rowman & Littlefield Pub. Group, 2009. The author provides findings released by the FBI annually from its Uniform Crime Reporting Program (UCRRP). Numerous forms of crimes are advanced in the publication and are grouped into various categories such as race, sex, and age of victims and offenders. The age of committing cybercrime is said to be 17 years in the United States while the victim age is open. However, youths are among the most vulnerable groups with distributed denial of service, cyber stalking, hacking and child soliciting and abuse the most likely forms of attacks. It’s important to have a clear picture of the state of cyber criminality in the nation before embarking on devising means of curbing it. It’s a fact that cyber systems in the United states area under risk of cyber-attacks more than ever since the inception of the internet in 1989. A less generalized approach is the better option in dealing with the menace posed by cybercrime so as to deal with each group based on specific demographic factors to prevent offending as well victimization. Holt, Thomas J, and Adam M Bossler. Cybercrime In Progress. Theory And Prevention Of Technology-Enabled Offenses, n.d.
  • 31. Perpetrators of cybercrime are not necessarily knowledgeable in the technical front. This is because they can purchase software or malware needed in perpetration of these crime which come along with guides and tips of use. Further there is ready information in the internet as well people willing to help them out. Furthermore, there exists ready-made malicious software for download. These factors reduce the hardship in obtaining tools of perpetration thus make cybercrime a risk worth taking. The relevance of this literature lies within the essence of educating the community to protect themselves. Enhancing the capability of government agencies in the fight against crime, cultivating an approach whose main focus is intelligence gathering are some of the proposed methods of fighting cyber criminality. Moreover, ensuring an effective court system and improving international collaboration are also very vital. Given that the US incurs loss of business as well as taxation revenues, a good prevention investment is worth it. Benner, Eric. "Apple Fights Order To Unlock San Bernardino Gunman’S iPhone". Nytimes.Com. Last modified 2016. Accessed March 3, 2016. http://www.nytimes.com/2016/02/18/technology/apple-timothy- cook-fbi-san-bernardino.html. More often than not, the question of civil rights and prevention of cyber criminality raise questions. Human rights and justice and justice should not be suspended even in times of war as this removes their very essence. As a matter of a great psychologist argued that justice is not a natural phenomenon and would not exist if people coexisted harmoniously. Therefore, its existence seeks to serve a given purpose which should not be ignored under any circumstances. The relevance of this literature to the research question is enormous. Criminals will always leave a trail of evidence on electronic gadgets when used in the perpetration of crimes. ‘Therefore, law enforcement may want to have unchallenged authority to access any gadget they wish even in the course of justice. This would, however, put individual’s
  • 32. right of privacy. On the contrary, this move may be seen as protecting terrorists and cyber criminals by ensuring that the road to detection full of hardships. This is a very critical in the US right now and should be given undivided attention because a solution today is an achievement today and the future in the war against cyber-attacks and cyber terrorism. Clough, J. Principles of cybercrime. Cambridge, UK: Cambridge University Press, 2010. The view that technology has exceeded our humanity is somehow true in the contemporary world. It is actually impossible to determine the scale of cybercrime problem. Technology is depicted as far reaching with an estimated figure of over 1.6 billion people accessing the internet. Furthermore, more people access computers which are being designed to be user-friendly and easier to use. Consequently, software is being produced and advanced at a high rate thus the problem of bugs which can be exploited inevitable. Cybercrime is a problem being faced by all countries with causal factors being more or less similar. Therefore, a multi- dimensional move is the best approach in dealing with cybercrime. Understanding the unique factors affecting a particular nation cannot be overlooked either way. According to this literature, a clear definition of cybercrime needs to be formed as the first step towards securing a legal backing to this problem. In a nutshell, gaps in law must be eliminated. Goodman, M. Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It. New York [New York]: Doubleday, 2015. The author benefits the world by going to an extent of explaining how digital devices that are often ignored in the explanation of cybercrime act as a soft target for criminals. Such devices and services include 3d printers, home automation, mobile payment, facial recognition, GPS, driverless cars among others. He, therefore, gives the world a call that every single gadget deserve to be handled with care in terms of security
  • 33. This literature secured lots of recommendation for people trying to understand online security as well as resultant crime issues due to its detailed information. If people understand the underlying factors and issues within the topic of cybercrime, they become empowered and better placed to collaborate with the nation’s law enforcement agencies in the fight to secure the nations cyber systems. The exhaustive coverage of this literature shows that due to the fact that everything is interconnected in the virtual world, everyone is at risk of falling victim hence the way forward not taking anything for granted. Kirwan, G., & Power, A. The psychology of cybercrime: Concepts and principles. Hershey, PA: Information Science Reference, 2012. This literature suggests that there exists a relationship between cybercrime and abnormal psychology. The most prominent disorders are anti-social personality disorder, narcissism, compulsive disorder, addictive behavior and Asperger syndrome. The author rightly advances a new scope relevant to this study when he states that when hackers ensure anonymity, they avoid labeling hence cultivate a perception that their actions are not deviant. The psychological profiling of cyber criminals stands to benefit the academic community, legal system, private sector and national security sector. Fighting any form of crime requires having prior knowledge of what crime entails regarding its nature of perpetration, target groups, predisposing factor, demographic factors in perpetration and offending among other factors. Therefore proving that psychological factors indeed cause perpetration of cybercrimes within this study shall be of great help in assisting suspects and offenders undergo proper reformation given the high rates of recidivism in our nation. In other words, by understanding the motivating factors crime, better prevention, detection and intervention of such activities can be instituted. Kirwan, G., & Power, A. Cybercrime: The psychology of online offenders. Cambridge University, 2013. The author takes a very reserved point of view
  • 34. in understanding the psychology of cyber criminals. This literature shows the difficulty in relating the two aspects as it would be to determine who would be a CEO of a multinational company, a serial killer, an al Qaeda jihadist among others based on psychological profile. However, in spite of the challenges stated, employers would mainly be negligent not to take into account factors if any showing that certain candidates possess a high risk of being cyber criminals. Although little hope of relating the two phenomena is depicted, this view can be overruled using the already existing statistics of how psychological factors cause perpetration. Individuals who want to experience the feeling of power and control will undoubtedly focus on cybercrime as an alternative to traditional crimes. Whereas some will commit computer related for fun, out of boredom, the thrill involved and peer pressure, a right minded individual will avoid it at all cost since they are aware that it will in one way or another lead to pain to someone else. In fact, mental incapacity is strongly exhibited to youths who will cause suffering to their peers- people they know and interact with everybody. O'Brien, M., & Yar, M. Criminology: The key concepts. London: Routledge, (2008). The contemporary world utilizes a multi-dimensional approach to the concepts, institution, and approaches fundamental to the study of crime. Issues advanced in this context include but not limited to policing and the justice system, types of crime, terrorism, war crimes, social issues and criminal psychology. Although much has been done in the US in addressing cybercrime based on the above-stated concepts, a lot needs to be done because cybercrime is far from being understood leave alone proper combating. The education system needs to be fully involved in socializing the young generation into a healthy lifestyle amidst the vigorous technological advancements. Addressing the root cause of crime is the best way towards achieving a crime free society hence taking a similar approach with cybercrime will reduce it greatly if not
  • 35. total elimination. Ensuring that at least a general concept of addressing the root cause of cybercrime in all preventive measures employed to protect US cyber systems will end any conflicts playing a part in causation of cybercrime namely societal, personal, political, intrastate, and interstate conflicts. Ruan, K. Cybercrime and cloud forensics: Applications for investigation processes. Hershey, PA: Information Science Reference, 2013. Our infrastructure is structured around computers. Individuals with malicious can somehow cripple health, transport and communication sectors effortlessly. There has been a shift from human labor to computers in the wake of modernization and globalization. Since most crimes leave trails behind them, it’s important to know how to unearth these trails in the process of investigation. Investigation here does not only involve a perpetrators computer or digital gadget but entails relating all factors at hand to determine any information network that could have been used as a secondary tool. Computer forensics have been very effective so far given the high level of knowledge and technicality involved. A considerable amount of data is able to be analyzed in a fast and efficient way. Further, more valuable data can be retrieved and be used in courts as evidence against perpetrators. Nonetheless, computer forensic analysts have been criticized for constructing findings in such a way that it’s admissible in court. Your Annotated Bibliography was good. Your sampling of the 14 references you chose will provide a solid foundation for your literature review. As I indicate in Week 6’s assignment and announcement, your annotations on the authors or articles that you chose will form a part of your lit review. This annotated bibliography is NOT a Literature Review. The next part is LINKING the themes that you identified in your annotations. Each article will have links or common themes and as your write, you are likely to develop new or additional ideas of
  • 36. interest. Linking your reviews is accomplished by the theme of your paper and linking similar threads. I like that each of your annotated themes supports your topic and provides a firm foundation that is rooted in the literature. Remember, you can also drill down into each bibliography for further resources. You should aim for 25 to 50 references total for your final paper. I look forward to seeing your initial Lit Review!! Chris Criteria Exemplary 16-20 Accomplished 11-15 Developing 6-10 Beginning 0-5 Total Synthesis of Knowledge 17 Foundation of Knowledge 17 Application of Knowledge 16 Organization of Ideas/Format 15
  • 37. Writing and Research Skill 15 Total 50 30 80