SlideShare a Scribd company logo
CJA 426 Module 1 Assignment 3 Terrorist
Motivation
For more classes visit
www.snaptutorial.com
Terrorism exists for various reasons. For some individuals, the issue of
terrorism is rooted in a clash of ideology. Others contend that terrorism
is a "clash of civilizations." (Fiala, 2007, p. 165).
With the fight against terrorism launched in Afghanistan, Iraq, and the
Middle East, many in the Muslim world feel that America is evil and
that its ways are misguided. In fact, some say that you need look no
further than the Abu Ghraib scandal, where administrative evil was
displayed (Adams, Balfour, & Reed, 2006, p. 680).
In addition, experts would argue that many terrorist attacks are not
conducted by crazy people, but rather by intelligent and religiously
motivated individuals who could be seen as martyrs (Guss, Tuason, &
Teixeira, 2007, p. 417).
Tasks:
Prepare a 3- to 4-page report to answer the following questions.
Analyze and explain the differences in ideology that might force an
individual to commit a terroristic act?
Do you think terrorists could be viewed as martyrs? Why?
Do you think people who are willing to give their life for their cause are
sane and rational or insane and irrational? Why?
References:
Adams, G., Balfour, D., & Reed, G. (2006). Abu Ghraib, administrative
evil, and moral inversion: The value of "putting cruelty first." Public
Administrative Review, 66(5), 680–693.
Fiala, A. (2007). Crusades, just wars, and the Bush doctrine. Peace
Review: A Journal of Social Justice, 19(2), 165–172.
Guss, C. D., Tuason, M. T., & Teixeira, V. B. (2007). A cultural–
psychological theory of contemporary Islamic martyrdom. Journal for
the Theory of Social Behavior, 37(4),
415–445.
****************************************************
CJA 426 Module 2 Assignment 2 No Fly List
For more classes visit
www.snaptutorial.com
The No Fly List is created and maintained by the US government's
Terrorist Screening Center (TSC) to screen those individuals who are
not permitted to travel in a commercial aircraft within or outside the
United States (Ross, 2010).
The No Fly List is different from the Terrorist Watch List, which is a
much bigger list of people suspected of involvement in terrorist acts
(Ross, 2010).
Nevertheless, the No Fly List has been criticized on grounds of violating
civil liberties and on due process grounds, due, in part, to the potential
for ethnic, religious, economic, political, or racial profiling and
discrimination (Friscolanti & Patriquin, 2008, p. 50).
In addition, the No Fly List contains the names of people who are dead,
prisoners, and at least 1,000 duplicate names—that is, people with
similar names as those on the No Fly List are stopped for questioning
when they have no nexus with terrorism (Donnelly, 2004, p. 17).
Tasks:
Prepare a 3- to 4-page report to answer the following questions:
Do you consider the No Fly List as discriminatory in nature and
violating an individual's civil rights? Why?
Do you agree with the statement, "the No Fly List is one of the best lines
oz defense" (Ross, 2010)? Why?
Do you agree to the statement, "the No Fly List is costly, prone to false
positives, and easily defeated" (Ross, 2010)? Why?
References:
Donnelly, S. B. (2004, October). Should the No-Fly List be grounded?
Time, 16, p. 17. Retrieved from
http://www.time.com/time/magazine/article/0,9171,995387,00.html
Friscolanti, M., & Patriquin, M. (2008). Caught in the no-fly web.
Maclean's, 121(37), 50–52.
Ross, B. (2010). Why no-fly? Nightline ABC, p.1–1.
****************************************************
CJA 426 Module 3 Assignment 2 LASA 1
Security Proposal for Centervale
For more classes visit
www.snaptutorial.com
The city of Centervale has submitted a proposal to the state to host the
next political convention for a major political party. The site for this
convention will be the Centervale Convention Center. Until now, the
facility has been used for trade shows and local concerts.
The facility is a large circular building with a domelike roof. The fire
code for the building is slated at 900 people. Visitors enter the center
through nine sets of double doors made of glass that are situated at the
front of the building. Behind the center is a loading dock with a set of
double doors and parking for two large trucks. One can access the stage
through the loading dock without being seen by visitors. The center is
multileveled, with seats that extend upward.
From the main entrance, people can access their seats through two sets
of staircases or one bank of elevators. The center has a closed circuit
television (CCTV) that was installed in 1993 and an alarm system was
added in 1998. Both the CCTV and alarms are focused on the doors of
the center. The center has a team of security for hire during events—they
have received no training beyond basic crowd management.
For each event, visitors can purchase tickets from the center's ticket
booth. The booth is enclosed in glass and is located at the front of the
building, centered between the sets of entrance doors. Workers in the
ticket booth enter with a key or by knocking until other workers open the
door. The workers' door into the ticket booth is off the main concourse
of the visitors' entrance to the center. The center manager's office has a
door with cipher lock and passcoded cash safe. The passcode to both
locks is given to the head of security for each event. An armored vehicle
from a secure money transport company comes two hours before an
event and three hours after an event to empty the contents of the safe.
Tasks:
Based on this description given above, you have been asked by the Chief
of Police, the Mayor's office, and the Convention Center Manager to
review, assess, and draft the security proposal for the facility.
After your evaluation, you will complete a 4–6 page security risk
assessment report with recommendations for change based on your
analysis and findings.
Using APA in-text citations and three external sources that are referred
to on a corresponding reference page, conduct a security risk assessment
of the Convention Center. You will review the physical layout of the
site, the vulnerabilities, and potential risk areas.
You are supposed to conduct the assessment from the point of view of a
private security agent. Your investigation of the property must include
an assessment of asset protection and potential threats or vulnerabilities.
Your assessment should:
Include the techniques that you use during your investigation. Describe
the techniques used and why you chose to use them.
Conduct a security risk assessment of the Convention Center as a private
security agent. Assess the protection of assets at this location, potential
threats, or vulnerabilities. Would your assessment be only for the
Convention Center, or should it encompass other sites that could impact
the center's needs?
Create a plan of recommendations for improving the property in terms of
safety, financial protection, and overall security. What benefits do you
think would result from your proposed changes?
Explore some of the current issues facing the private security and
investigation industry. What impact do these issues have on
investigation practices?
Analyze why it is important to conduct legal and ethical private
investigation and security practices. What consequences may occur if
illegal or unethical practices are followed?
****************************************************
CJA 426 Module 4 Assignment 2 Weapons of
Mass Destruction
For more classes visit
www.snaptutorial.com
Elaborate on and explain some of the delivery systems that can be used
to deploy WMD. Provide some examples of WMD.
Analyze and explain the counterterrorism tactics the United States can
employ to evade the detonation of a WMD.
Discuss some of the considerations for responders when responding to a
potential WMD situation.
****************************************************
CJA 426 Module 5 Assignment 1 LASA 2
Centervale and Counterterrorism
For more classes visit
www.snaptutorial.com
It's 4:15 p.m., and a "Breaking News" alert flashes across the television
channels. Jim Jones, one of the local news anchors, interrupts the
regularly scheduled program with devastating news: The city of
Gainsville, a high-profile and very prosperous neighboring city, has
suffered a terrorist attack.
Jones reads the report, "Ladies and gentlemen, I have some terrible
news. Moments ago, two college students, believed to be part of an
unidentified terrorist group, launched an attack on the city of Gainsville.
The details of the attack are still being collected, but what we know now
is that they have struck at the heart of Gainsville. The Channel 12 news
station was the first to be attacked. Reports are coming in that a man
posing as a member of the cleaning staff gained entry into the lobby of
the building, removed an AK-47 from a trash bin, and began to fire
indiscriminately. As the wounded victims of this tragic event were
rushed to the hospital for care, a woman posing as a sick patient in
Gainsville Memorial Hospital emergency room removed her jacket,
revealing a vest covered in C-4 explosives, seconds before committing
suicide by setting off the bomb, killing and injuring several people. The
tragedies are just unfolding, and local, state, and federal law
enforcement agencies are all on the scene. We are on location at Channel
12 and at Gainsville Memorial . . ."
The mayor of Centervale is concerned that there may be more attacks on
the way because Centervale is home to one of the largest nuclear power
plants in the country. Some of the Centervale city officials are concerned
about the cost of protecting Centervale's nuclear plant in conjunction
with other important structures. Internal conflicts have arisen between
some county commissioners on the issue of how to fairly allocate funds
to Centervale's structures that are under threat, such as the airport and
water systems.
As part of the mayor's Terrorism Assessment and Response Team, your
first report assessed the risk to a particularly high-profile venue in
Centervale. Now, it has become critical to work with a second team,
which is analyzing information to assess the threat and the
counterterrorism efforts toward protecting Centervale's nuclear power
plant.
A formal report on the group's analysis will be given to your supervisor,
the mayor, city officials, and other key stakeholders in a few hours. You
are provided with a list of criteria for the report, and you begin your
search by looking at the US Department of State's 2003 Global
Terrorism Report, located on this
website:http://www.state.gov/documents/organization/31912.pdf
Use the Argosy University's online library to obtain additional resources
to complete your report.
The City of Centervale is counting on your report to help assess the
complexities of this situation and any potential risk to Centervale's
nuclear power plant.
Here's What You Need to Do . . .
Prepare a report (8- to10-page) considering the following points:
Perform research on women suicide bombers in the United States.
Evaluate how likely Centervale is to experience a female suicide
bomber. Discuss where female suicide bombers are common and what
other roles females from nations that support terrorism may play in
terrorist operations in the United States.
Research the cost of counterterrorism in a post-9/11 era. Has the cost to
protect the nation's nuclear power plants risen since 9/11? Explain why
the general public could interpret blowing up nuclear power plants,
generally speaking, as weapons of mass destruction (WMD). Based on
your research, suggest a method to protect Centervale's nuclear power
plant from attack without bankrupting the city.
Research the political aspects of terrorism and the differences of
opinions that stakeholders might have when it comes to strategies for
protecting Centervale's most important venues. Explain how terrorism
destabilizes a government. Further, explain how the manner in which a
city's government handles a terrorist attack (i.e., New York City)
influences its mayor's or city official's political position.
Recommend a cost-effective antiterrorism training solution for the
Centervale Police Department. Discuss how the training can be a
proactive approach to deterrence and a reactive approach to an attack.
****************************************************

More Related Content

Similar to Cja 426 Technology levels--snaptutorial.com

Global Warming Persuasive Essay. How to write an essay on global warming. Gl...
Global Warming Persuasive Essay.  How to write an essay on global warming. Gl...Global Warming Persuasive Essay.  How to write an essay on global warming. Gl...
Global Warming Persuasive Essay. How to write an essay on global warming. Gl...
Morgan Daniels
 
Admission Essay Writing Service
Admission Essay Writing ServiceAdmission Essay Writing Service
Admission Essay Writing Service
Liana Anderson
 
Free dhs ied search procedures workshop in washington
Free dhs ied search procedures workshop in washingtonFree dhs ied search procedures workshop in washington
Free dhs ied search procedures workshop in washington
David Jimenez
 
Journal of Physical Security 7(1)
Journal of Physical Security 7(1)Journal of Physical Security 7(1)
Journal of Physical Security 7(1)
Roger Johnston
 
Journal of Physical Security 7(3)
Journal of Physical Security 7(3)Journal of Physical Security 7(3)
Journal of Physical Security 7(3)
Roger Johnston
 
CSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_ExerciseCSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_Exercise
Connie Uthoff
 
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
VinaOconner450
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Nicola Marae Allain, PhD
 
Interdisciplinary IT Security
Interdisciplinary IT SecurityInterdisciplinary IT Security
Interdisciplinary IT Security
ashiyan
 
EXAM NOTES for the Certified in Homeland Security
 EXAM NOTES for the Certified in Homeland Security EXAM NOTES for the Certified in Homeland Security
EXAM NOTES for the Certified in Homeland Security
David Sweigert
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
Kunihiro Maeda
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Aimee Shuck
 
Introduction in 2015, the office of personnel management (opm) w
Introduction in 2015, the office of personnel management (opm) wIntroduction in 2015, the office of personnel management (opm) w
Introduction in 2015, the office of personnel management (opm) w
niraj57
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
Murray Security Services
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
David Sweigert
 
Title slide delete this and enter your title slide information.
Title slide delete this and enter your title slide information.Title slide delete this and enter your title slide information.
Title slide delete this and enter your title slide information.
TakishaPeck109
 
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part .docx
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part   .docxFinal Exam Part OneCNT 3604Due June 22. 2017Take Home Part   .docx
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part .docx
ssuser454af01
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
SusanaFurman449
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
Julie Davis
 

Similar to Cja 426 Technology levels--snaptutorial.com (19)

Global Warming Persuasive Essay. How to write an essay on global warming. Gl...
Global Warming Persuasive Essay.  How to write an essay on global warming. Gl...Global Warming Persuasive Essay.  How to write an essay on global warming. Gl...
Global Warming Persuasive Essay. How to write an essay on global warming. Gl...
 
Admission Essay Writing Service
Admission Essay Writing ServiceAdmission Essay Writing Service
Admission Essay Writing Service
 
Free dhs ied search procedures workshop in washington
Free dhs ied search procedures workshop in washingtonFree dhs ied search procedures workshop in washington
Free dhs ied search procedures workshop in washington
 
Journal of Physical Security 7(1)
Journal of Physical Security 7(1)Journal of Physical Security 7(1)
Journal of Physical Security 7(1)
 
Journal of Physical Security 7(3)
Journal of Physical Security 7(3)Journal of Physical Security 7(3)
Journal of Physical Security 7(3)
 
CSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_ExerciseCSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_Exercise
 
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
CJ509 Unit 5 DQPart 1 Topic TerrorismCritically discuss
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
 
Interdisciplinary IT Security
Interdisciplinary IT SecurityInterdisciplinary IT Security
Interdisciplinary IT Security
 
EXAM NOTES for the Certified in Homeland Security
 EXAM NOTES for the Certified in Homeland Security EXAM NOTES for the Certified in Homeland Security
EXAM NOTES for the Certified in Homeland Security
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Introduction in 2015, the office of personnel management (opm) w
Introduction in 2015, the office of personnel management (opm) wIntroduction in 2015, the office of personnel management (opm) w
Introduction in 2015, the office of personnel management (opm) w
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 
Title slide delete this and enter your title slide information.
Title slide delete this and enter your title slide information.Title slide delete this and enter your title slide information.
Title slide delete this and enter your title slide information.
 
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part .docx
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part   .docxFinal Exam Part OneCNT 3604Due June 22. 2017Take Home Part   .docx
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part .docx
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 

Recently uploaded

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Cja 426 Technology levels--snaptutorial.com

  • 1. CJA 426 Module 1 Assignment 3 Terrorist Motivation For more classes visit www.snaptutorial.com Terrorism exists for various reasons. For some individuals, the issue of terrorism is rooted in a clash of ideology. Others contend that terrorism is a "clash of civilizations." (Fiala, 2007, p. 165). With the fight against terrorism launched in Afghanistan, Iraq, and the Middle East, many in the Muslim world feel that America is evil and that its ways are misguided. In fact, some say that you need look no further than the Abu Ghraib scandal, where administrative evil was displayed (Adams, Balfour, & Reed, 2006, p. 680). In addition, experts would argue that many terrorist attacks are not conducted by crazy people, but rather by intelligent and religiously motivated individuals who could be seen as martyrs (Guss, Tuason, & Teixeira, 2007, p. 417). Tasks: Prepare a 3- to 4-page report to answer the following questions. Analyze and explain the differences in ideology that might force an individual to commit a terroristic act?
  • 2. Do you think terrorists could be viewed as martyrs? Why? Do you think people who are willing to give their life for their cause are sane and rational or insane and irrational? Why? References: Adams, G., Balfour, D., & Reed, G. (2006). Abu Ghraib, administrative evil, and moral inversion: The value of "putting cruelty first." Public Administrative Review, 66(5), 680–693. Fiala, A. (2007). Crusades, just wars, and the Bush doctrine. Peace Review: A Journal of Social Justice, 19(2), 165–172. Guss, C. D., Tuason, M. T., & Teixeira, V. B. (2007). A cultural– psychological theory of contemporary Islamic martyrdom. Journal for the Theory of Social Behavior, 37(4), 415–445. **************************************************** CJA 426 Module 2 Assignment 2 No Fly List
  • 3. For more classes visit www.snaptutorial.com The No Fly List is created and maintained by the US government's Terrorist Screening Center (TSC) to screen those individuals who are not permitted to travel in a commercial aircraft within or outside the United States (Ross, 2010). The No Fly List is different from the Terrorist Watch List, which is a much bigger list of people suspected of involvement in terrorist acts (Ross, 2010). Nevertheless, the No Fly List has been criticized on grounds of violating civil liberties and on due process grounds, due, in part, to the potential for ethnic, religious, economic, political, or racial profiling and discrimination (Friscolanti & Patriquin, 2008, p. 50). In addition, the No Fly List contains the names of people who are dead, prisoners, and at least 1,000 duplicate names—that is, people with similar names as those on the No Fly List are stopped for questioning when they have no nexus with terrorism (Donnelly, 2004, p. 17). Tasks: Prepare a 3- to 4-page report to answer the following questions: Do you consider the No Fly List as discriminatory in nature and violating an individual's civil rights? Why?
  • 4. Do you agree with the statement, "the No Fly List is one of the best lines oz defense" (Ross, 2010)? Why? Do you agree to the statement, "the No Fly List is costly, prone to false positives, and easily defeated" (Ross, 2010)? Why? References: Donnelly, S. B. (2004, October). Should the No-Fly List be grounded? Time, 16, p. 17. Retrieved from http://www.time.com/time/magazine/article/0,9171,995387,00.html Friscolanti, M., & Patriquin, M. (2008). Caught in the no-fly web. Maclean's, 121(37), 50–52. Ross, B. (2010). Why no-fly? Nightline ABC, p.1–1. **************************************************** CJA 426 Module 3 Assignment 2 LASA 1 Security Proposal for Centervale For more classes visit www.snaptutorial.com
  • 5. The city of Centervale has submitted a proposal to the state to host the next political convention for a major political party. The site for this convention will be the Centervale Convention Center. Until now, the facility has been used for trade shows and local concerts. The facility is a large circular building with a domelike roof. The fire code for the building is slated at 900 people. Visitors enter the center through nine sets of double doors made of glass that are situated at the front of the building. Behind the center is a loading dock with a set of double doors and parking for two large trucks. One can access the stage through the loading dock without being seen by visitors. The center is multileveled, with seats that extend upward. From the main entrance, people can access their seats through two sets of staircases or one bank of elevators. The center has a closed circuit television (CCTV) that was installed in 1993 and an alarm system was added in 1998. Both the CCTV and alarms are focused on the doors of the center. The center has a team of security for hire during events—they have received no training beyond basic crowd management. For each event, visitors can purchase tickets from the center's ticket booth. The booth is enclosed in glass and is located at the front of the building, centered between the sets of entrance doors. Workers in the ticket booth enter with a key or by knocking until other workers open the door. The workers' door into the ticket booth is off the main concourse of the visitors' entrance to the center. The center manager's office has a door with cipher lock and passcoded cash safe. The passcode to both locks is given to the head of security for each event. An armored vehicle from a secure money transport company comes two hours before an event and three hours after an event to empty the contents of the safe. Tasks:
  • 6. Based on this description given above, you have been asked by the Chief of Police, the Mayor's office, and the Convention Center Manager to review, assess, and draft the security proposal for the facility. After your evaluation, you will complete a 4–6 page security risk assessment report with recommendations for change based on your analysis and findings. Using APA in-text citations and three external sources that are referred to on a corresponding reference page, conduct a security risk assessment of the Convention Center. You will review the physical layout of the site, the vulnerabilities, and potential risk areas. You are supposed to conduct the assessment from the point of view of a private security agent. Your investigation of the property must include an assessment of asset protection and potential threats or vulnerabilities. Your assessment should: Include the techniques that you use during your investigation. Describe the techniques used and why you chose to use them. Conduct a security risk assessment of the Convention Center as a private security agent. Assess the protection of assets at this location, potential threats, or vulnerabilities. Would your assessment be only for the Convention Center, or should it encompass other sites that could impact the center's needs? Create a plan of recommendations for improving the property in terms of safety, financial protection, and overall security. What benefits do you think would result from your proposed changes? Explore some of the current issues facing the private security and investigation industry. What impact do these issues have on investigation practices?
  • 7. Analyze why it is important to conduct legal and ethical private investigation and security practices. What consequences may occur if illegal or unethical practices are followed? **************************************************** CJA 426 Module 4 Assignment 2 Weapons of Mass Destruction For more classes visit www.snaptutorial.com Elaborate on and explain some of the delivery systems that can be used to deploy WMD. Provide some examples of WMD. Analyze and explain the counterterrorism tactics the United States can employ to evade the detonation of a WMD. Discuss some of the considerations for responders when responding to a potential WMD situation. ****************************************************
  • 8. CJA 426 Module 5 Assignment 1 LASA 2 Centervale and Counterterrorism For more classes visit www.snaptutorial.com It's 4:15 p.m., and a "Breaking News" alert flashes across the television channels. Jim Jones, one of the local news anchors, interrupts the regularly scheduled program with devastating news: The city of Gainsville, a high-profile and very prosperous neighboring city, has suffered a terrorist attack. Jones reads the report, "Ladies and gentlemen, I have some terrible news. Moments ago, two college students, believed to be part of an unidentified terrorist group, launched an attack on the city of Gainsville. The details of the attack are still being collected, but what we know now is that they have struck at the heart of Gainsville. The Channel 12 news station was the first to be attacked. Reports are coming in that a man posing as a member of the cleaning staff gained entry into the lobby of the building, removed an AK-47 from a trash bin, and began to fire indiscriminately. As the wounded victims of this tragic event were rushed to the hospital for care, a woman posing as a sick patient in Gainsville Memorial Hospital emergency room removed her jacket, revealing a vest covered in C-4 explosives, seconds before committing suicide by setting off the bomb, killing and injuring several people. The tragedies are just unfolding, and local, state, and federal law
  • 9. enforcement agencies are all on the scene. We are on location at Channel 12 and at Gainsville Memorial . . ." The mayor of Centervale is concerned that there may be more attacks on the way because Centervale is home to one of the largest nuclear power plants in the country. Some of the Centervale city officials are concerned about the cost of protecting Centervale's nuclear plant in conjunction with other important structures. Internal conflicts have arisen between some county commissioners on the issue of how to fairly allocate funds to Centervale's structures that are under threat, such as the airport and water systems. As part of the mayor's Terrorism Assessment and Response Team, your first report assessed the risk to a particularly high-profile venue in Centervale. Now, it has become critical to work with a second team, which is analyzing information to assess the threat and the counterterrorism efforts toward protecting Centervale's nuclear power plant. A formal report on the group's analysis will be given to your supervisor, the mayor, city officials, and other key stakeholders in a few hours. You are provided with a list of criteria for the report, and you begin your search by looking at the US Department of State's 2003 Global Terrorism Report, located on this website:http://www.state.gov/documents/organization/31912.pdf Use the Argosy University's online library to obtain additional resources to complete your report. The City of Centervale is counting on your report to help assess the complexities of this situation and any potential risk to Centervale's nuclear power plant.
  • 10. Here's What You Need to Do . . . Prepare a report (8- to10-page) considering the following points: Perform research on women suicide bombers in the United States. Evaluate how likely Centervale is to experience a female suicide bomber. Discuss where female suicide bombers are common and what other roles females from nations that support terrorism may play in terrorist operations in the United States. Research the cost of counterterrorism in a post-9/11 era. Has the cost to protect the nation's nuclear power plants risen since 9/11? Explain why the general public could interpret blowing up nuclear power plants, generally speaking, as weapons of mass destruction (WMD). Based on your research, suggest a method to protect Centervale's nuclear power plant from attack without bankrupting the city. Research the political aspects of terrorism and the differences of opinions that stakeholders might have when it comes to strategies for protecting Centervale's most important venues. Explain how terrorism destabilizes a government. Further, explain how the manner in which a city's government handles a terrorist attack (i.e., New York City) influences its mayor's or city official's political position. Recommend a cost-effective antiterrorism training solution for the Centervale Police Department. Discuss how the training can be a proactive approach to deterrence and a reactive approach to an attack. ****************************************************