Edudorm Facebook

Evolution of cybercrime

    Cybercrime has doubled its development in the recent months and in the present day; it is regarded as one of the four biggest crime perils that are spreading across the world. It involves a variety of crimes and has therefore taken different forms that range from less severe to more severe and pricey attacks.  They are believed to cause forgery, fraud, and bullying. It utilizes the internet and the computer. This paper will, therefore, seek to present and explore cyber-bullying and how it has evolved over time. It will also seek to explore how technological advancement has contributed to increasing cyber-bullying.

    Cyber-bullying is a relatively new type of bullying that is gaining more and more notice in research and in media in regards to the recent events. Cyber-bullying is an observable fact that children and teenagers are increasingly using so as to intimidate others. The development of cyberspace intimidation has been identified to date far back as 1999. It is quite difficult to examine the extent of a cyber-bullying trend. This problem is not only confined to the US but it affects all people across the globe. There is a growing alarm raised by parents, teachers and the public in general about the teenagers’ harassment through the internet. Unfortunately, I am quite difficult to come up with interventions is due to the fact that the motivations and goals that empower the cyber bullies are comparatively unknown (Norden 2013).

    Throughout history, America has been formed by the public’s right to freedom of expression. Bullying has evolved from several insensitive comments communicated face to face to a multimedia relation that can be conveyed through multiple electronic devices.  Technology progression and innovations such as the internet have forever changed the human interaction. Traditionally, bullying was introduced in 1503s and it basically referred to the act of abusing someone either physically or even verbally with the intent of attaining superiority and power over the other victim. However, cyber-bullying has transformed over time and it has developed elements where it allows the bully to disguise his identity behind the computer. Thus it is much more difficult to recognize bullies in cyberspace. This element of bullies masking their identities offers them with a chance to say anything to the victim without thorough consideration of any repercussions. The violation of student’s 1st amendment rights is what initially ignited heated arguments concerning institutions restricting what the scholars would say or do on or off the institutions ground (Donegan 2012). The brutality caused by cyber-bullying on a national scale has led to many legislators to step in and combat the issue. After several suicides by several victims, several states have tried to implement laws for punishing those who would be convicted of a cyber-bullying crime.

            Technology has greatly contributed towards the development of cyber-bullying. It has presented new problems in combating bullying in our society. a large number of the entire world population, have phones and technological devices such as laptops and computers (Donegan 2012) . Thus people have easier access to the internet and as a result, cyber-bullying have become a big issue as it impacts a large group of people. In the present day, cyber-bullies have a new weapon that is the internet, which they are using to intimidate. Therefore, as technology is evolving, there are high chances that cyber-bullying is proliferating.

 

 

 

 

References

Donegan, R. (2012). Bullying and cyberbullying: History, statistics, law, prevention and   analysis. The Elon Journal of Undergraduate Research in Communications, 3(1), 33-42.

Norden, S. (2013). How the internet has changed the face of crime (Doctoral dissertation,             FLORIDA GULF COAST UNIVERSITY).

598 Words  2 Pages

Hate crime

    According to the New York Times published an article in 2008, a Queens’s judge released three detectives who had been brought before the court for the allegations of murder of a black American man, Sean Bell. On the eve of Mr. Bells wedding, these detectives shot him after having an argument. The setting free of these three detectives by Queens’s judge was not accepted by many people as they felt that these detectives had committed a severe hate crime against the victim. The people accused the judge of bias. This is because she failed to press any charges against these detectives even after it was clear that they had fired up fifty shots at Bell’s car thus killing Mr. Bell and his two friends. Much of the argument was sparked by the surprising decision that the judge made as she justified her decision by indicating that she felt that there was completely no cause to rule that the detectives were guilty. This is something that has raised so many questions and heated arguments about racial hate crimes and prejudice element of judges when it comes to such verdicts (Wilson 2008).

    It is important to understand the nature and characteristics of hate crimes as it is vital in the recognition of such crimes. Hate crimes have diverse characteristics that include, these crimes are characterized by a complete dislike of someone and discrimination. The persons responsible for practicing hate crimes have an extreme bitterness that is prompted by preconceived notion against a given ethnic group or other social groups. Hate crimes are also characterized by attacks that are prompted by other frustrations. Another characteristic of this crime is that an act that an amount to an offense under the law is committed (Perry et al 2009).

Another component of this crime is that an act is often undertaken with a particular intention which is often regarded as bias. It is this characteristic that distinguishes this crime from other types of crimes.

    The fact the Bell is black; the offenders selected him on the foundation of what they represent rather than who they are. This is to mean that the detectives did not necessarily hate Bell as a person but their criminal act clearly shows that they did this act simply because Bell represented the black American society. The message that was delivered was intended to reach not only Mr. Bell and his friends but the entire black society of which the victims are members. It is as a result of this element that the case prompted outrage from the entire black community in New York (Wilson 2008). Thus the killing was intended to convey a message of prejudice to the rest of the black community. The detectives used deadly force and justified their act indicating that they were in danger and they thought that someone amongst those who were with Bill in the car had a gun. Contrary to this, the scene was clear and there were no guns or firearms that were recovered (Wilson 2008).

    Basing on the discussion above, it is clear that hate crimes are acts committed by other people simply because they are different from the offenders. It is therefore important for legislation to stress on the significance of upholding social order and respect for all people regardless of where they come from and their ethnic group. Hate crimes against the black American people in United States has however remained far much more numerous as compared to other hate crimes.

            In conclusion, hate crimes are detrimental to the development of the society. This is because they have widespread consequences not only to the individuals but also to the entire society especially the society from the victims’ side.

References

 Wilson M. (2008). 3 Detectives Acquitted in Bell Shooting. Retrieved from:

            http://www.nytimes.com/2008/04/26/nyregion/26BELL.html

Top of Form

Perry, B., Levin, B., Iganski, P., Blazak, R., & Lawrence, F. M. (2009). Hate crimes. Westport,   Conn: Praeger Publishers.

Bottom of Form

 

662 Words  2 Pages

Summary of Ted Bundy’s case

 He was popularly known as Ted. He was born in the year 1946 and died in the year 1989. Ted Bundy was a rapist and a necrophilia. He was electrocuted on an electric chair after he was found guilty of the charges pressed against him in the year 1989. (Rockefeller, 2015).

Ted Bundy was an individual who took the lives of many women .Ted Bundy accepted that he had murdered a total of 36 young females in different areas in the 1970s.Although experts find this hard to believe. Experts estimate that he might have killed more than thirty six women, approximately one hundred women or more than one hundred. Hence the exact number of women Ted Bundy killed will never be exactly known. (Rockefeller, 2015).

Most people argue that he begun killing women around 1974.During this period, a lot of women went missing in areas like Seattle and Oregon. The public started speculating on the murders. People claimed before the women went missing, they were escorted by a man that had black hair and was handsome. This fit the description of Ted Bundy. (Rockefeller, 2015).

 The theory of routine activity can be used to analyze Ted Bundy. In order for a crime to take place, there must be three things that need to be involved: motivated perpetrator in this case Ted Bundy, a victim that fits into the offender’s choice and the absence of a protector or guardian. This theory is consistent with the murders that Ted Bundy was convicted of .Ted Bundy singled out his victim based on their physical appearance and lured them by impersonating authorities such as police officers so that he can easily gain their trust. He sometimes pretended to be a disabled man. (CRJ3024 W3reading.docx).

 Ted Bundy background and method of killing

He was the illegitimate son of a lady whose immediate family was not pleased by the fact that she became pregnant before getting married. The grand parents of Ted Bundy took him in as their own child to cover the shame that had been brought to the family by their granddaughter. They deceived Ted and the community that he was their own son and that Ted’s mother was his elder sibling .Ted discovered the truth when he was thirteen years old. An old cousin showed him the evidence that proved that his elder sister was actually her mother .Ted was angry with his mother for withholding the truth from him for such a long time. This truth might have affected his childhood and experts speculate that it might have been the turning point of his life .Experts also claim that her mother’s role was reduced to that of a sister and therefore she was not totally emotionally involved with him. This influenced the character that would later make him a serial killer. Previous research have revealed that between the ages of one year to seven years old, a mother plays a vital role in the life of their children. This is the same period that a child is taught virtues such as loving others. Ted was separated from his grandfather who played the role of his father when he was moved to Washington State. This might have affected him socially. (Rockefeller, 2015).

Ted Bundy was a very clever man who was well educated. But at early age he had already shown signs that would later materialize and make him a serial killer. His typology describes Ted Bundy as antisocial and would spy on vulnerable women. He also had juvenile record that were waved off when he reached 18.Ted Bundy had traits of a narcissist and therefore was not insane. Due to this his victims were mainly young beautiful women. Bundy would pretend to be disable and walked on crutches as he targeted his victims .He would then use his charisma and ‘disability’ to influence  and lure the unaware victim into a car. He impersonated administrative figures such policemen to easily gain trust from the victims. In 1974, in the month of November, Carol Dench, an eighteen year old girl was shopping at a mall in in Utah .Ted Bundy approached her and showed her a badge. He then went on to lie to her about how there was someone who was trying to illegally break into her car .Ted Bundy then challenged her to accompany him to her vehicle to confirm if there been any mischief. He then requested her to head into the police station to make a statement which she obliged. He used a Volkswagen to drive her to the police station. While inside the car, he forcefully handcuffed her. She struggled and managed to escape. (Michaud, Aynesworth & Bundy, 2000).

 

How Ted Bundy selected his victims.

Ted Bundy did not wait for a perfect opportunity for him to strike and take women of around streets. He actually broke doors of various houses and dormitories and let himself in .He would then proceed to rape and kill young women and girls within the confines of the same rooms that were meant to protect them. On one night in January 1974, Ted Bundy broke into a lower room of the bedroom of a young eighteen year old girl. He then used a metal rod to beat her to death and raped her. Although the girl survived the attack, she was left with a brain damage and in a coma (Michaud, Aynesworth & Bundy, 2000).

Most of Ted Bundy’s victims were women between the ages of 12 and twenty nine years old. The women were either college students or studied at the university. Ted Bundy avoided murdering people that he knew on a personal level. He killed innocent women that he did not know. The physical appearance of most of his victim had were:  brown hair that reached their shoulders and was separated in the middle. Experts believe that he chose his victims based entirely on their physical appearance. Although Bundy himself claimed that he only kills women who he finds very appealing. Their attractiveness was the only common thing his victims shared. In his own perspective young and slender women who had brown hair and well educated were appealing to him (Michaud, Aynesworth & Bundy, 2000).

There are certain factors that the victims might have done to provoke ted Bundy. This can be explained by demographic of victimization. ‘Demographics of victimization’ simply means that there are certain factors that contribute to crime. Crime is very incidental but there are certain factors that can put an individual at more risk of becoming a victim of a certain crime. One of these factors is life choices or the manner in which a person decides to behave. For example, an individual who is at low risk will be very keen on their environment. Among adolescents and the youths demographic of victimization is much higher. Day to day patterns can put anyone at risk of becoming a victim of crime. An area can be linked to demographics of victimization in terms of frequency or amount of crimes carried out in that particular area .Although some crimes are committed in all places, there are some locations that have a higher level of crime than the rest. (CRJ3024 W3reading.docx).

 

 

Typology of Ted Bundy

Ted Bundy was not insane but a man of sound mind. He was a psychopath who suffered from what is commonly known as ‘anti-social personality disorder’. He had very strong narcissism traits. The rare combination of narcissism and ‘anti-social personality disorder’ categorizes him as a serial murderer. This personality disorder is not specific and is neither defined as insane in the psychiatric areas and the legal structure. Such psychopaths either serve a life in prison or face the death penalty (Michaud, Aynesworth & Bundy, 2000).

Most of the serial killers that fall under this category have often had either a neglected childhood or have been abused in their childhood days. A familiar character of ted Bundy and other serial killer that fall under this category have always wanted to control everything that happens around them (CRJ3024 W3reading.docx).

Ted Bundy was an organized serial killer. Organized serial killers selects their victims by luring them in using tricks and they dispose of bodies of the victims in selected places. They are very hard to catch. On the other hand disorganized serial killers are not very meticulous planners and they do put an effort to conceal their acts. Their victims fall prey due to being in the wrong place at the wrong time. They are also not intelligent. Some serial killers can be both organized and disorganized in some of their killings. (CRJ3024 W3reading.docx).

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

(CRJ3024 W3reading.docx).

Michaud, S. G., Aynesworth, H., & Bundy, T. (2000). Ted Bundy: Conversations with a killer. Irving, TX

Rockefeller, J. D. (2015). The shocking true story of Ted Bundy: The most notorious American serial killer of 1970's.

 

 

 

 

1488 Words  5 Pages

Theories of crime

Crimes, especially around the malls, have increased and this is a case that must be looked into with the urgency. Considering the crime triangle as a way of solving the ever emerging cases of crime, this can help reduce the cases. The desire of a person to commit a crime cannot be manipulated or stopped by a person since the criminal has already made up the mind to commit the crime. The ability to commit the crime is not unstoppable by normal means since there are many ways a crime can be done and this reduces the chances of sabotaging the crime.  It is only through offering an alternative to a crime that a criminal might stop committing the crime. Educating the society on the essence of being able to look for other ways to survive other than crime is important.

Criminals can be given an opportunity to stop the crimes through offering jobs and other ways of making a living (Wortley & Townsley, 2016). Prevention measures such as acknowledging the facts that crimes do not pay or earn a person better living are very important. The offenders need to be educated on other ways of living other than crime. It is wrong to rob or kills a person for money hard earned. The targeted areas such as the malls need to apply some level of security such as having a security body take charge of the parking lots to prevent robbery. The society also needs to be aware of the areas that are prone to crime. In such areas, everyone should try and avoid such hidden and often dark places which offer perfect opportunities for ambush.

According to the neutralization theory, the act of breaking the rules is regarded as a way of life to some cultures. The juvenile who identify the actions is in most cases never willing to report them as they seem normal activities. The interesting thing is that the crimes are never executed in their community as it is against the culture. This indicates that the offenders are well aware of what they do therefore possess the ability to know what is wrong or right. Denial of injury indicates that the offenders never caused any harm through their actions even though the actions were wrong and against the law (Strutton et al., 2015).  Denial of being responsible is another technique where the offender uses substances at the time of committing the crime and therefore denies the idea of being involved in the crime. Denial of being a victim is used to justify an action and term it as not a wrong thing otherwise the offended party would not be there. In such a case, the offenders bring evidence of the action terming it as a two-sided kind of activity. The individuals condemning the activities of the juvenile are condemned in the sense that every action has its course and consequence. Getting loyalty is never easy and some of the offenders justify their actions as an order to gain respect to the targets.

Loughner was a man who committed many counts of murder which could be related to the idea of him being a drug addict and a drug abuser. Based on this case, traditional criminology and the psychological state have an influence on the victim. He was responsible for several accounts in the community college of committing certain activities which led to his expulsion from the school (Boser et al., 2014). Such actions indicate that he was capable and had motives to commit a crime. The judge should not force Loughner for medication since he pleaded guilty to the actions he committed. Loughner was never insane since he claimed responsible for his actions. The mental checkups placed him fit to stand the trials and by this, the judgment done is according to the sentence he should serve in prison.

 

 

References

Boser, B. L., & Lake, R. A. (2014). " Enduring" Incivility: Sarah Palin and the Tucson Tragedy. Rhetoric & Public Affairs17(4), 619-651.  

Strutton, D., Vitell, S. J., Pelton, L. E., & Grove, S. J. (2015). The Efficacy of the ‘Techniques of Neutralization’as a Means to Explain Unethical Sales Behavior: A Preliminary Investigation. In Proceedings of the 1993 Academy of Marketing Science (AMS) Annual Conference (pp. 301-307). Springer, Cham.

Wortley, R. K., & Townsley, M. (Eds.). (2016). Environmental criminology and crime analysis (Vol. 18). Taylor & Francis.

736 Words  2 Pages

Crime Statistics Project

Uniform Crime Reports (UCR) and National Crime Victimization Survey (NCVS) are two statistical initiatives utilized by the American justice department to measure the extent, nature, and occurrence of a given crime in the country (Lynch & Addington, 2007). These are two programs that differ in several ways but still continuously offers valuable data after the complementary information that they provide is utilized for a thorough understanding of crimes in the country entirely. Despite the fact that the two initiatives have their similarities as well as differences the gathered data can differ in regard to the rate of crime amid UCR and NCVs in different ways (Lynch & Addington, 2007). To begin with, UCR gathers information that is then recorded by law enforcers or police officers. In an account that this is a more summarized system, the acquire crime occurrence degree that is submitted by the agencies to the Federal Bureau of Investigation (FBI) will show the gathered offenses within the first part (Lynch & Addington, 2007). The first part crimes might incorporate robbery, rape, killing, manslaughter out of negligence, arson among many others. The arrest information that is submitted to UCR, on the other hand, will show the essential aspects of the offenders such as age, race, and gender. On the other hand, NCVS gathers data using an experimental survey that asks the participants on whether they have been a victim of such crimes as recorded by UCR like rape, assault, robbery, snatching amid much more ( Lynch & Addington, 2007). For this exercise to be effective and practical, the survey primarily focuses on gathering information in regard to the association amid a victim and the offenders. This data is specifically centered on the time when the crimes were conducted, geographic location, offender’s individualities, protective actions that each took based on the actions of the offender, resulting impacts like injury, property loss and if the victim make any reports of the incidence to the police and the response acquired (Lynch & Addington, 2007).

The data that is gathered by UCR and NCVS is related in some ways accounting that they mainly focus their investigation efforts on similar crimes (Lauritsen, 2005). The information that they gather is dependent on estimates and customized characteristics of the crime such as age, gender, and race. The differences are however based on the data that each of them acquires. This is considered by the faults that mainly inhibits the reliability, accuracy, and quality of the approximations (Lauritsen, 2005). Those interviews that are primarily performed by NCVS, for instance, is mainly grounded on household’s samples and their general estimations that might be a primary subject to the matter (Lauritsen, 2005). UCR, on the other hand, is accounted as a more deliberate initiative and most of the reporting departments might fail to file their reports within a specified periods.

The strategies that UCR and NCVS utilize in calculating the number of crimes that have occurred also differ in regard to certain crimes (Lauritsen, 2005). In that UCR mainly calculates all its first section crimes based on per capital grounds that is based on the number of offenses committed in every a hundred thousand persons (Lynch & Addington, 2007). On the other hand, NCVS normally estimates property related criminalities level for every one thousand households. This, therefore, implies that for every criminality that is measured by NVCS thus is a projection for the entire nation. If a different sample was to be taken, the likelihood is high of the resulting estimations demonstrating a more distinct difference (Lynch & Addington, 2007). NCVS information is thus just considered to be particularly genuine f the tendency in information gathering for each year shows little variations. For UCR, information is normally grounded on a real estimation of the recorded offenses to the police agencies across the nation. However, in distinct circumstances, projections are conducted for the agencies that offer partial information. The probability of mistakes that occurs from such projections is thus high (Lynch & Addington, 2007).

Both initiatives collect data that is based on similar crimes such as robbery, theft, and rape. Similarly, for certain offenses the NCVS and UCR accommodating similar regulations (Press, 2010).  Both initiatives offer the information in every year in their respective findings. An additional similarity is that all the programs are fundamental (Lauritsen, 2005). Despite the fact that both programs are mainly guided by different purposes the acquired data is utilized comparatively to justify as well as generate strategies for combating crimes based on the acquired estimations (Press, 2010). Their similarity and yet dissimilar nature are brought about by the fact that the programs understand that similar strategies or there are no accurate approaches for measuring data regarding comprehensive features of crimes and so each of them focuses on its customized strategies. UCR is acknowledged for being highly effective since it focuses on monthly information that is acquired from law enforcer’s recordings (Press, 2010). However, the system is weakened by the fact that law offenders are not mandated to make reports. In addition, the reports are based on the recorded arrests but exclude the crimes that the offenders have been sentenced in regard. Both programs conduct their research based on a selected samples rather than the general one and thus, creates assumption from it (Press, 2010).

 

 

 

 

References

Janet L. Lauritsen, (2005). Social and Scientific Influences on the Measurement of Criminal Victimization. Journal of Quantitative Criminology. 21(.3): 245-266.

Lynch, J.P., & Addington, L.A. (2007). Understanding Crime Statistics: Revisiting the Divergence of the NCVS and UCR. Cambridge studies in criminology. Cambridge University Press.

Press, B. (2010). Crime in the United States 2010. Lanham: Rowman & Littlefield Pub. Group.

946 Words  3 Pages

Criminology Project

Introduction

Criminology refers to the simple criminality study as a more social incidence that incorporates the outcomes, prevention, sources, respective penalties and types of criminality and criminal conduct in addition to the effect and growth of policies (Miller, 2014). Criminology gained popularity in the 19th century when the social growth aspect in the public sector tried to establish the personality of offenders to create more effective approaches to crime prevention and discouragement (Miller, 2014). In this perspective, several different thoughts schools within the criminology study arose that incorporated two of the well-established and acknowledge schools of thoughts in the contemporary society being positivist school that is center on the offender and the classical school which centers on the committed crime (Miller, 2014). In my opinion, amid the classical and positivist criminal theory, the positivist school of thought is closer to my personal crime causation theory. My choice explains the incidents of crime by focusing on the external and internal forces that pressure one to settle for criminal activities beyond their control.

While the classical philosophy adopts that crime is the result of a free will based on the science of human conduct, the positivist theory asserts that crime is caused by inner and outer forces that determine behavioral options and that criminal tendency of not within the control of an individual (Anderson, 2014). Both theories effectively justify the incidents of crime but I feel that positivist theory is closer to my experience and knowledge regarding crimes. In that, for some individuals, criminal behaviors are within them due to inheritance or family links that might have been involved in such behaviors. On the other hand, the social and the economic setting as external forces are responsible for most of criminal behaviors (Anderson, 2014). In that individuals learn such behaviors from the settings that they are raised in. For instance most individuals from the low socio-economic setting which are characterized by poverty and high rate of unemployment survival are only for the fit and in most times crime is their only option. This, therefore, makes it clear on how the external and the biological forces influence criminality which is beyond the control of the individuals (Anderson, 2014).

Positivist crime theory explains all crimes occurrences by focusing on the offenders rather than the offenses that have been committed (Bohm, 2010). This theory argues that the behavior of humans is prepared in advance and is completely driven by individual’s distinctions and biological characteristics. In other words, the thing that influences an individual towards a given crime is not a subject of free will since it is a force that they cannot control. The theory attempted to prove the thesis by noting that criminal offenders are different from those that are not criminals (Bohm, 2010). On the other hand, the classical theory assumes that individuals have voluntary will in making decisions and that penalty has the potential of discouraging crime as long as it is committed without any postponement and is suit and in quantity to the conducted crime (Bohm, 2010). This theory notes that despite the fact that humans are involved in crimes while seeking pleasure they are rational in nature. In addition, despite the fact that people act for their personal gain they have the potential to judging and utilizing more suitable strategies in regard to a given scenario. In other words, people are in general guided by morals and have the freedom to select well or wrong (Bohm, 2010).

Since positivist theory asserts that some behaviors are out of the will of the offenders it is rather apparent that some behaviors cannot be avoided or prevented (Vito & Maahs, 2017). This thought school acquires a rather distinct position since it seeks to create a more reasonable independence to quantify the choices and criminal behavior. This school assumes particularly that criminality behavior is mainly caused by social as well as psychological forces that tend to make some people to be more connected and focused on criminality as compared to others. It cannot be objected that people differ in regard to the crimes that they settle for and this is attributed to the social and psychological differences (Miller, 2014). In other words individuals are naturally good, however, as a result of their surroundings and social background, they ultimately become bad within this social settings. This is because such behaviors can also be learned in the surrounding and assumed to be good. This demonstrates that the classical theory that asserts that morals are the basis of judgment is faulty since morals differ from a single setting to the other (Anderson, 2014). For this reason, the positivist theory disapproved the classical perspective that holds that all crimes are a result of choices and cautious assessment of the disadvantages and benefits.

In conclusion, the positivist theory is more close to my personal theory of crime causes. In that, I believe that criminality behaviors are shaped by both the psychological and social settings that one is exposed to. Unlike the classical theory which asserts that individuals have the option of judging situations and settling for the best choice in most cases, such decisions are beyond the general control of an individual.

 

 

 

 

 

References

Anderson, J. F. (2014). Criminological Theories. Sudbury: Jones & Bartlett Learning, LLC.

Bohm, R. M. (2010). A primer on crime and delinquency theory. Belmont, Calif: Wadsworth.

Miller, J. M. (2014). The encyclopedia of theoretical criminology. Wiley Blackwell.

Vito, G. F., & Maahs, J. R. (2017). Criminology: Theory, research, and policy. Jones & Bartlett.

919 Words  3 Pages

ELLIS_CRIME STORY

The Safety and security of staff and Students has been an obligation always undertaken by the University of Alaska. I had an opportunity to interview Lieutenant Michael Becker, an officer at UAA Police Department about the state of crime in UAA community and more specifically, whether cases of violent behavior have increased or decreased. The officer’s view was that even though crime rate related to violence has increased in Anchorage’s urban center, the same cannot be said of University of Alaska.  I also asked him how a person on campus can report crime cases to which he responded that one can contact the 911 hotline for help. In addition, the officer said that one may contact or call the UAA Campus police with immediate effect of any crime.

 

 In case the crime is non-life threatening, the officer provided 786-7711, which one can call. Furthermore, I inquired from the Lieutenant about the role of police after a crime has been reported. He stated that that the UAA Police Department offers the necessary resources and assistance in investigation of the breach of campus policy.  Another question to the officer regarded criteria used in prioritizing case reports to which Lt. Beckner said that crimes that are life threatening such as sexual and physical assaults and robbery are addressed first by UAA. Thus also involves providing escorts to any student that may need their help.

 

 Another issue that arose during the interview is the assurance by the department that students being investigated on account of crime against another person in same classroom or campus will be separated through a non-contact order.  I also sought to know the last time sexual assault crime was reported. The officer said that such reports involved two cases in 2015, one in 2016 and none has been reported in 2016. The officer observed that crime had dropped on campus as compared to previous year. At the conclusion of the interview, I asked Lt. Becker about how a follow up on victims is conducted by Police Department. In his words, a personal talk with the victim is done by the officer and when they can’t be reached a call is made to them. The contact with the victim may proceed to six months.

 

 

375 Words  1 Pages

Correctional Management

The operations of correctional facilities differ, based on the type of correctional facility, and the services which the facility offers. In this case, this section will basically look at the differences between a jail and a prison.

A jail and a prison are different, in the sense that they offer services which are somehow similar, but they are not similar (Stohr, Walsh & Hemmens, 2009). A jail is a facility which is used to detain suspects, or those who have committed short-term offenses. On the other hand, a prison is a facility which is used to hold criminals who have committed serious crimes, for long-term sentences (Carlson & Garrett, 2013).

Prisons are supposed to have prison wardens, who should be well trained, in order to deal with a huge number of prisoners (Hanser, 2012). Prisoners mainly house a minimum of 10,000 inmates, who work under the watchful eyes of prison wardens. Prison wardens are supposed to be trained, on how to read and interpret prisoner’s psychology, thus understanding their behaviour, and non-verbal cues. In addition, they need also be well trained on how to handle violent criminals, and this can be through playing mind games (Carlson & Garrett, 2013). For instance, a prisoner warden may act as a friend to an inmate, whereby he would then use the relationship as a means of spying on what the prisoners are planning. Secondly, prison wardens are supposed to have attained a bachelor’s degree, in either social work, or a bachelor of administration justice. Having a degree in these courses, allows a prison warden to have the knowledge of dealing with criminals (Lavigne et al, 2010).

When it comes to jails, they hold small numbers of prisoners, with a maximum of 5,000 inmates. Jail wardens are not required to be highly learned, and for one to become a jail warden, then he or she must be a holder of a high school certificate (Carlson & Garrett, 2013). In addition, a jail warden may not be required to have psychological knowledge on how to handle the inmates. Due to the low number of inmates which a jail holds, it may not be required of a jail warden to have high educational knowledge (Lavigne et al, 2010).

In prisons, prison wardens are supposed to constantly monitor and check the operations of the inmates (Stohr, Walsh & Hemmens, 2009). They are also supposed to oversee support staffs which is associated with prison programs such as, education work, infirmary, and mental health. Similarly, wardens are also supposed to check if all prison materials are in good condition, and in case of any breakages, they should inform the prison administrator (Lavigne et al, 2010). In addition, they are also supposed to participate in budget setting, where all wardens are supposed to review the expenditures and evaluate the successes and necessity of prison programs (Hanser, 2012).

In jails, jail wardens are supposed to monitor the activities of the jail, however, they do not participate in setting the budget (Carlson & Garrett, 2013). Their main job is to offer maximum security in the jail, and to also oversee the transportation of inmates to other facilities. They also protect the wellbeing of other staff members in the facility, from any forms of attack, through ensuring maximum security (Stohr, Walsh & Hemmens, 2009).         

Prisons need to work with other organization, in order to ensure prisoners are well rehabilitated. This therefore requires different organizations which include health organizations, educational organizations, religious organizations, and non-governmental organizations to work closely with prisons (Lavigne et al, 2010). These organizations work hand in hand with prisons, thus allowing prisoners to change their behaviour. For instance, educational organizations may include State Universities, whose main aim might be to provide educational aid to the prisoners. Prisoners therefore undertake courses in the prison, which are provided by the university (Carlson & Garrett, 2013). The university provides lecturers, who will be responsible for teaching the inmates. This consequently allows prison to be able to offer different courses, whereby prisoners can easily continue with their studies without any problems whatsoever (Hanser, 2012).    

Medical institutions, may also partner with the prison, thus providing medical assistance to the prisoners. In case of any health crisis in the prison, medical institutions may send in nurses to offer support to the inmates (Hanser, 2012). In addition, a doctor from a medical institution may be sent after a certain period of time, to check on how the inmates are faring, and if their medical condition is also good. Religious organizations also work hand in hand with the prison, to ensure that prisoners are taught on how to lead religious lives (Carlson & Garrett, 2013). Most prisoners tend to change their behaviour, hence most of them end up being saved into Christianity or Islam, depending on their religions. Religious institutions provide Godly teachings to the inmates, making them to feel loved, hence inspiring them to change their behaviours. Finally, non-governmental organizations may offer assistance such as physical training to the prisoners in order to keep their bodies fit. It is therefore essential for a prison facility to work hand in hand with these organizations, in order to ensure the inmates are well rehabilitated (Stohr, Walsh & Hemmens, 2009).

            The main objective of a prison is to rehabilitate a prisoner, however, other key functions need to be performed, to ensure prisoners serve their term (Lavigne et al, 2010). This includes: provision of medical care, education, food and a place to sleep, and basic training areas. Prisoners, as people also need to be fed, and this requires a prison to have a kitchen (Carlson & Garrett, 2013). In the kitchen, food can be prepared for the prisoners. However, the facility does not need to hire professional cooks, since the wardens can pick professional cooks among the inmates, who will be tasked with the mandate of cooking.

            A dispensary within the prison will also be required, since most inmates end up in fights which results in huge injuries (Stohr, Walsh & Hemmens, 2009). In addition, in case of a disease outbreak, the treatment would be administered within the prison. The dispensary will therefore require professional nurses, and they may be four or five in number. Similarly, a place to sleep would also be necessary, and this therefore leads to the creation of cells of two, where prisoners are supposed to sleep (Lavigne et al, 2010). The cells should be equipped with beds and beddings. This ensures the inmates do not form a group, whereby they can plan and execute any forms of attacks.

            Finally, prisons need to have training areas, where they can be trained on how to do different tasks, and this may include carpentry, mechanical engineering and drawing. These form of training is usually offered to the prisoners, to allow them to change their behaviour (Carlson & Garrett, 2013). In addition, they are also required to gain such skills from the prison, so that when they move out of prison, they can be able to use such skills to earn a living. The prison need therefore be equipped with facilities which can be used to train the prisoners on how to do such things effectively (Stohr, Walsh & Hemmens, 2009).          

Prison management is not an easy task, since it involves a lot of supervisory challenges (Lavigne et al, 2010). Due to the high numbers of inmates in the prison, the wardens may not be able to handle them easily. Most inmates understand the advantage which they have is in numbers only, hence they may use their numbers as a means of disrupting the plans of the prison. When assigned tasks such as cleaning a certain section, they may not clean the section, and instead from groups where they can plan on how to sneak out of the prison. In addition, the prisoners may attempt or even attack the wardens, hence hurting them seriously. Most prisoners particularly the hard-core prisoners may threaten the wardens, thus instilling fear in them (Stohr, Walsh & Hemmens, 2009).

In order to deal with these issues, it will be necessary for the prison management to separate the inmates, in such a way that they cannot form groups. In addition, the activities of the prisoners should also be monitored, and this can be done through mounting cameras in the prison cells, thus capturing the activities which are taking place (Carlson & Garrett, 2013). Moreover, prisoners should not be allowed to walk in groups, and the management of the prison should also create enmity between the prisoners, making it hard for them to collaborate and execute an attack. Finally, the management of the prison should also invest in new ways of protecting and preventing prisoners from coming up with new plans (Stohr, Walsh & Hemmens, 2009). The activities can be monitored through looking for small pieces of papers either in dustbins, whereby the wardens can look for information concerning prisoners, and the plans which they may be planning to execute.

Reference

Carlson, P. M., & Garrett, J. S. (2013). Prison and Jail Administration. Sudbury: Jones & Bartlett Learning, LLC.

Stohr, M. K., Walsh, A., & Hemmens, C. (2009). Corrections: A text/reader. Los Angeles: Sage.

Lavigne, D., Janiyan, S., Straraap, S., & Erenkov, A. (2010). The definitive guide to PC-BSD. Berkeley, Calif.: Apress.

Hanser, R. D. (2012). Introduction to corrections. London: SAGE.

Cullen, F. T., Jonson, C. L., & Stohr, M. K. (2014). The American prison: Imagining a different future.

1577 Words  5 Pages

            Survey Proposal

            Background

            Racial disparity in crimes and sentencing has been an intensifying debate subject in the society for years (Slyke & Bales, 2012). Globally, America is ranked as the leader in terms of the highest incarceration populace with 25 percent of the global custodial populace (Slyke & Bales, 2012). Close to 65 percent of the incarcerated populace is comprised of the ethnic minorities (Deflem, 2017). Despite the rising concerns the prevalence has been on the rise which has grown to not only a social but also an economic issue (Deflem, 2017).

Research Question: What are the major causes of crime and sentencing disparities?

Hypothesis: Socio-economic and racial status hold a noteworthy effect on sentencing consequences and crimes disparity.

            Study Population

            The researcher wishes to conduct the investigation on a selected sample of about a hundred participants. In that, this will include prison inmates, prison officers as well as administrators from comparable prisons. The selected population will be that which reflects identical disparity sentencing as well as criminal conduct features in relation to race and crime type (Babbie, 2008). A sampling of the populace will be done through the use of random sampling in order to ensure that the there is no discrimination and that accuracy and dependability are enhanced.

Research Questions Sample

  1. What is the root cause of sentencing disparity?
  2. Do you believe that sentencing and crime differences are fueled by socio-economic as well as racial forces?
  3. How does socio-economic status impact crimes and sentencing?
  4. Mention some of the probable interventions that can be applied in controlling crime and sentencing disparity?
  5. Is communal policing capable of lowering crime disparities and sentencing? (Yes or No).
  6. Is the society affected by crime disparity? If Yes how?
  7. Do the existing sentencing and criminal disparity demonstrate the inability of the justice system or inequality?
  8. Does sentencing disparity encourage racial or social discrimination? How?
  9. Is sentencing disparity derived from unequal treatment of equally situated persons on the basis of their status?
  10. Has the government done enough to address the issue?

            Survey Technique and its Advantages

            The research will mainly utilize mail survey which will involve sending self-administered questionnaires to the respondents. The questionnaires will be returned to the researcher’s address after filling. The technique is suitable for the study given that it is objected at collecting large information within the shortest time (Babbie, 2008). It is easier to maintain the confidentiality of the respondents and also to acquire consent prior to conducting the research. The strategy is also considerably less expensive as compared to all the other modes of gathering information. In addition, when more data has been gathered this implies that the analysis process is simplified and the researcher cannot divert from the set objectives (Babbie, 2008).

            The mail questionnaire survey was selected on the ground that it will ensure that the respondents agree to participate in the study given that the filling can be done at any given time and location (Babbie, 2008). The technique is characterized by fewer restrictions given that the respondents will have adequate time to review the questions as well as develop strategic answers (Babbie, 2008). This will not only result in truthfulness but also accuracy. In that, the filling is most likely to consume less than half an hour which will create more time for the researcher to analyze the responses. Based on the existing time and resources limitation the technique is the most appropriate for this investigation.

 

 

 

 

 

 

 

 

 

 

 

 

References

Babbie, E. R. (2008). The basics of social research. Belmont, CA: Thomson/Wadsworth.

Deflem, M. (2017). Race, ethnicity and law. Emerald Publishing.

Shanna V. Slyke, William D. Bales. (2012). Punishment & Society. Pp. 217-246. Vol 14. Issue 2.

609 Words  2 Pages

Quantitative Analysis 3-Insight into Analysis

The article regarding property and aggressive crimes rate by Cancino, Varano, Schafer, & Enriquez (2007) utilized regression technique as an arithmetical tool for the analysis of the association amid different variables. The viable that were being measured are possessions and violent crimes, social disorganization and anomie theory. Aggressive and property crimes are the dependent variables while social organization represents the independent ones which can be manipulated in changing the general outcome (Cancino, Varano, Schafer, & Enriquez, 2007). The research established that the collaboration amid alcohol density and concentrated socio-economic challenges are the most significant and directly associated with the general rise of property and aggressive crimes (Cancino, Varano, Schafer, & Enriquez, 2007). The regression model also established that the collaboration amid welfare liberality and rigorous challenges are significantly and undesirably related with the general outcomes (Cancino, Varano, Schafer, & Enriquez, 2007).

From the article, it is clear that regression analysis is mainly suitable when attempting to generate or establish a relationship amid different variables. In this context, the model is not suitable for a direct investigation that does not have comparable variables. Regression analysis helps in determining issues that revolve around the raised issues and mainly asserts on the expected outcomes. In that, the approach is utilized in demonstrating the direct effect of a single variable on another which is mainly applied in statistical nature. The relationship that is established helps in demonstrating how a certain variable affect the outcome of a subject, in this case, being a crime (Bachman & Schutt, 2017). In this context, it is not possible to establish the causes as well as the effect of these crimes without establishing the existing relationship amid the major variables.

Reference

Bachman, R., & Schutt, R. K. (2017). The Practice of Research in Criminology and Criminal Justice (6th Ed.). Thousand Oaks, CA: Sage.

Cancino, J., Varano, S., Schafer, J. A., & Enriquez, R. (2007). An ecological assessment of property and violent crime rates across a Latino urban landscape: The role of social disorganization and institutional anomie theory. Western Criminology Review8(1), 69–87.

 

349 Words  1 Pages

            Applying Theory to Criminal Justice Events

The selected theory is social disorganization and the crime type to be analyzed by the criminal justice theory is robbery. Social disorganization is a theory that holds that an individual’s physical as well as social surroundings are mainly accountable for the behavioral options that an individual settles for (Bachman & Schutt, 2017). At the center of the theory, it asserts that one’s location is of great significance when predicting unlawful conduct. It is noted that in areas with the utmost criminal conduct there are at least several mutual issues such as poverty, bodily decay, and high diversity in regard to ethnicity and cultures (Miller, 2009). It is highly argued that the misbehavior in such surroundings is not as a result of individual’s will rather it is an ordinary reaction by ordinary persons to irregular pressures (Miller, 2009). Social disorganization is a theory that is mainly utilized in the analysis of forcefulness of crime that seems normal to certain areas.

Social disorganization can be utilized in analyzing robbery crimes in specified locations. This is because the theory asserts that deviant conduct is highly likely to occur in those communities where the responsible social institutions like schools, churches and justice systems fail in the application of resistor over the existing populace (Teasdale, 2016). Unlike all other theories, this theory is more focused on the surrounding rather than individual in its attempts to explain why certain locations normally experience more crimes when equated to others. Questionably, the efficiency of a specified community relies on the operative utilization of resources, abilities as well as authority in solving issues which result in enhancing the general life’s superiority in the quest of discouraging criminal actions (Teasdale, 2016).

Social disorganization theory, therefore, contends that due to failures in regard to networking capabilities and skills of organizations in certain communities, certain neighborhoods are bound to experience more crimes via a social mandate collapse and the absence of social policies obedience (Teasdale, 2016). Social disorganization theory is therefore suitable for analyzing robbery given that it is high in certain communities. In that for the most communities that are characterized by high levels of ethnic diversity and low socio-economic levels the rate of crimes is usually high based on the inefficiency that is experienced while attempting to control the populace. In addition, those areas are associated with high levels of unemployment and illiteracy levels which fuel delinquency development (Teasdale, 2016). In this context, the behaviors are not as a cause of individuals choices but are mainly influenced by environmental pressures.

Social disorganization is appropriate for analyzing robbery as a crime. This involves taking someone’s property with the intention of depriving by inserting fear or violence (Pratt, Gau, & Franklin, 2011). The fear of violence subjected via robbery can best be analyzed by the theory given that it is fueled by the surrounding. In areas where social norms are already broken this means that breaking laws becomes a norm among the populace. The theory is therefore appropriate for robbery analysis given that such behaviors are mainly fueled by poverty, unemployment and high levels of illiteracy which are higher in certain communities while not in others (Pratt, Gau, & Franklin, 2011). In this context, it can be stated that the socio-economic situation in this communities pushes the ordinary individuals to engage in irregular actions as a means of survival or living. It is the surrounding that shapes their behaviors in general rather than individuality.

 

 

References

Bachman, R., & Schutt, R. K. (2017). The practice of research in criminology and criminal         justice. Thousand Oaks, CA: Sage.

Miller, J. M. (2009). 21st century criminology: A reference handbook. Thousand Oaks, Calif:      Sage.

Pratt, T. C., Gau, J. M., & Franklin, T. W. (2011). Key ideas in criminology and criminal justice.             Los Angeles: SAGE.

Teasdale, B. (2016). Preventing crime and violence. Place of publication not identified: Springer             International Pu.

 

                                       

649 Words  2 Pages

            Forensic Science

Introduction

Forensic science can best be described as the application of science to legal substances. Forensic being a Latin term is utilized in suggesting of a form of collection activity that is nearly related to assessment (Gaensslen & Larsen 2013). Today, forensic is utilized to demonstrate the relationship amid law and science which is emphasized by two components. To begin with, forensic science is objected at creating information and findings which are ultimately utilized in legal cases. Second, forensic investigators are mainly focused in individualization, in that they are oriented at acquiring proof that a certain individual or thing is unique when equated to those from an equal class (Marthie Grobler, 2014). For instance, the capability to differentiate and identify an individual from a wider populace can be categorized as individualization. Forensic science derives from various sectors which include statistics, geography, and science and so on which concentrates mainly on the tangible or bodily confirmation gathered from a criminality scene. Today, forensic science stand to be of the essence in the assessment of evidence gathered from criminality scenes which are useful in the coming up with dependable verdicts that can be utilized in legal procedures. This paper will, therefore, present an examination of forensic science history and concepts in relation to Ms. Mary’s case study.

Forensic Science History

The roots of forensic science can be traced back from the late 19th and the early 20th century. Operations such as forensic pathology, toxicology, biology and fingerprints assessments commenced when individuals began to exploit the manner in which life operates. The discovery led to the identification of the significance and importance that the particular scientific knowledge would potentially improve illegal and crime investigations. A Spanish medic, known as M.J Bonaventure Orfila become the first most forensic pathologist, which equals a medic assessor involved in performing forensic toxicology examination while creating tests for the determination of the differing species for which different blood types were derived from (Bell, 2008). The initial forensic science development occurred across the European states such as Italy and Germany (Gaensslen & Larsen, 2013). Based on the progress, several initial institutions began to associate with medical facilities and eventually took the obligation of forensic studies.

In the earliest years of the 20th century, several medical authorized laboratories were established throughout the United States (Gaensslen & Larsen, 2013). This trend was, however, saddened given that it failed to continue as there was not much to support its continuity. With the passage of time, forensic toxicologists and pathologists joined the local and national government workforces where they started to operate in close collaboration with crime detectives. The medical assessors in the sector were mainly focused on offering adequate assistance to investigators in the quest of determining the general status and situation of death, which failed to fit within the outcomes of natural sources. Thus, the 20th century developed the start of fingerprint utilizations as a general mode of evidence and crime causes in America (Gaensslen & Larsen, 2013). The first operating forensic laboratory was initiated in 1923 by August Vollmer the chief of the police department in Los Angeles at that period (Gaensslen & Larsen, 2013). His operation was mainly fueled by the fact that he was highly interested in forensic science developments and law application. In the most recent the sheriff in the county opened an additional governmental forensic lab to assist in the operations and offer even more services that seek to improve the legal proceedings.

The forensic research center is currently, situated in Virginia, Quantico where there is various local laboratory that has been established throughout the United States to help in the investigations. During this period there are several developments which occurred like the establishment of the universally known bullet evaluation using an optical microscope that occurred back in the 1920s (Bell, 2008). In addition, the development of blood grouping approach in 1931, voice print documentation soberness examinations using Breathalyzer, and X-ray technology (Bell, 2008). More so, in 1980s DNA identification as proof developed and it was utilized in linking the suspected persons to the committed crime as well as acquitting individuals to their charges midst liberating an innocent person from the subjected sentencing for the crime that they never committed (Bell, 2008). DNA summarizing utilization in court proceedings was interrogated back in 1987 and the profiling results created a fresh order of control for the forensic laboratory in ensuring that the appropriate documentation criteria which are accurate and consistent are utilized (Bell, 2008). The first most Database DNA confirmation was developed in 1994 which marked a significant shift within the science legal field.

The Actions of the Initial Response to Your Crime Scene and What Processing Steps

In the occurrence of domestic abuse or sexual assault, there is a necessity to conduct an assault evaluation by the medical experts (Gaensslen & Larsen 2013). In this context, any evidence piece gathered during the evaluation should be gathered, organized and kept safely. This evidence is utilized in linking the crime to the individual who committed the crime. In this case, the home that belongs to Billy Mary’s grandson is the criminality scene. In this case, it is essential to record the time the crime occurred for the intention of thorough investigation from the given documentation. This means that the criminality scene should be covered to ensure that unauthorized people do not tamper with any kind of evidence from the location. In that, then the criminality scene should be protected from any hazardous content, unpermitted persons or even suspects implying that his presence should be out of the scene (Paiva, et al., 2017). The blockades are then situated around the scene section in creating control of the surrounding. After the scene has been guarded a thorough survey of the homestead should be acquired which might include taking a video plot in a reliable and accurate manner to provide firm grounds for analysis. The video would be required to cover the whole area including the inner setting prior to any clearance. Photos of both the inner and the outer section must be joined while acquiring separated pictures of every section. Any form of visual evidence should be protected and recorded photographically while taking cautious and protective isolation measure of the home both from the exterior and interior setting (Paiva, et al., 2017).

Based on the status of the crime and the fact that the victim had been consistently calling for help, this shows that there was no defilement of the 4th amendment privilege. The house belonged to Billy, but it was the place where Mary resided and had been paying for a mortgage with the monetary support acquired from the government. On the other hand, despite their relation, Susan and Billy treated her as a mere servant which included cleaning despite her age. Under this situation, it is obvious that she had the right to allow the investigation to be conducted. This case, therefore, falls under domestic and sexual abuse and therefore there is no necessity for the police to acquire a warrant given that there is already an existing potential cause for the investigation. Thus, any evidence piece that can be of assistance in the case should be documented thoroughly following the collection and a detailed analysis (Paiva, et al., 2017). The home survey led to the discovery of blood as indication around the backside of the door. This is an adequate indication of her claim that Billy had dragged her and harassed her sexually in the backyard. Based on the situation of the cut that she had acquired which led to the acquisition of medical stitching their trail of blood is adequate evidence.

Identify, Collect, Preserve, and Analysis of At Least Three Different Pieces of Evidence        from the Case

All the kinds of evidence that can serve for the efficiency of the case need to be gathered, recorded and explored thoroughly (Wall, 2009). One piece of evidence based on the case is that there is blood that was observed on the doorway since Mary had been dragged where she acquired the cut across the stairs into the backyard. After acquiring medical attention she was forced to acquire an 18 stitch on the cut which therefore shows that some blood stains has been left of that scene. Despite the fact that a significant period was wasted prior to the taking place of the assault evaluation, the bruises that she acquired due to the dragging and the semen found on the vaginal section can thus be utilized as evidence against Billy. It is also noted that she had acquired a tearing around the vaginal section which is situated in a section where an individual conducting bodily cleaning using a rough thing cannot reach.

Evidence Analysis

The blood spots, bruises, semen and a tear around the vaginal section can, therefore, serve as the major evidence pieces in demonstrating that Mary had already been assaulted. The bruises that she acquired from the assault can, therefore, be shown with the general utilization of the photographs taken by the examiners at the criminality scene. In addition, the bruises can be a prime proof that her grandson grabbed, dragged and assaulted her based on the analysis of the fingerprints comparison. Her homestead photographs can in this context be utilized as a form of evidence given that the surrounding seems to have been distorted by the assault which involved the general utilization of force. In that, she is able to recall the main events that occurred during the period such as Billy removing her socks and therefore, her testimony being a rationale victim can be utilized as an essential proof in the legal proceedings.

According to Wall, (2009) blood and semen proof in this context should be dehydrated thoroughly to avoid any distortion. In that based on evidence, the prime rule of any liquid such as blood and all the other biological fluid proof is to certain that any presence of stain is dried but not eliminated prior to being covered and stored as evidence. In that, the evidence needs to be in good form and after being gathered should be covered and stored in plastic packages or a container that prevents the air from getting inside thus ensuring that the samples are in the same state as when they were acquired. The acquired evidence should then be analyzed in the laboratory. The analysis is essential given that it helps in determining whether the acquired fluid samples acquired from the criminality scene are related to either Billy or Ms. Mary.

Summary of the Significant Findings for Crime Scene Reconstruction

In a forensic investigation, it should be noted that the capability to determine the manner that the crime was performed is more significant than trying to establish those that performed it (Gaensslen, & Larsen, 2013). In that after determining the major related concepts and acquiring major evidence then it becomes easier to establish those that are involved. Numerous photographs were acquired from the criminality scene in different angles to ensure that every evidence piece is captured. Mary was, therefore, able to examine the presented photos in connecting with her memory of the occurrence. For instance, she was able to recall that Billy removed her socks and dropped them on the ground something that a photo can adequately proof. With the general assistance of investigators and forensic professionals, the rebuilding of the crime offers some visual assistance in relation to the statement made by Mary.

As an aged victim, her testimony confirmed that despite her condition, her mind was in order given that she had the capability to provide thorough evidence on the particular period when Billy had decided to torture her by subjecting pain prior to slaying her. It is apparent that due to her age she is fragile and characterized by different aging issues such as poor eyesight and low hearing issues but as a person, she understands that the event was illegal but she did not have any option. She sustained a fighting spirit because she did not wish to die. Post the incidence her body was fully covered in bruises and emotional issues in addition to the broken rib. The most saddening thing is the mental torture that she was subjected to in the five year period that she had lived with the family. Based on the documented findings it is apparent that the assault is not a thing that individuals would independently commit to self but it is a form of an attack by another. Interestingly, despite the visual and analyzed evidence Mary was forced to struggle to acquire a verdict against Billy, but with the assistance of a significant support, the abuser was ultimately sentenced to forty years.

Conclusion

In summing up, rape and physical abuse cases are difficult to prove if the examinations are not conducted within the shortest framework. In addition, most individuals shy away from such cases given that they are shameful and are in most cases conducted by those that are close. Mary is among the few that stands to their ground to ensure that justice is applied despite the involved challenges. Forensic science offers technical assistance in the investigation of the most pressing issues such as rape. Forensic science development has enhanced legal investigation given that efficiency has been created with simplicity given that it is easier to gather both tangles and untangle evidence. It cannot be denied that forensic science is of undoubted significance to the criminal investigation sector based on the changing aspects of how modern crimes are committed. With the complexity of contemporary crimes, forensic science has worked to ensure that efficiency and technological growth are balanced. From the case, it is apparent that forensic analysis played an essential part towards the legal success and verdict against the offender.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Antonis Mouhtaropoulos, Chang-Tsun Li and Marthie Grobler. (2014). Digital Forensic Readiness: Are We There Yet? Journal of International Commercial Law and Technology Vol.9, No.3.

Bell, S. (2008). Crime and circumstance: Investigating the history of forensic science. Westport, Conn: Praeger.

Gaensslen, R.E & Larsen A.K. (2013).  Introductory To Forensic Science. Bridgepoint Education, Inc.

He wouldn’t turn me loose: The sexual assault case of 96-year-old Miss Mary. Retrieved from https://fod.infobase.com/OnDemandEmbed.aspx?Token=49099&aid=18596&Plt=FOD&loid=0&w=640&h=480&ref

Viana KA, Daher A, Maia LC, Costa PS, Martins CdC, Paiva SM, et al. (2017). What is the level of evidence for the amnestic effects of sedatives in pediatric patients? A systematic review and meta-analyses. PLoS ONE 12(7): e0180248. https://doi.org/10.1371/journal.pone.0180248

Wall, W. (2009). Forensic Science in Court: The Role of the Expert Witness. Book Review. International Journal of Police Science & Management Volume 14 Number 1. Wiley–Blackwell; 2009; 176 pp.; ISBN: 978-0-470-98577-9

2450 Words  8 Pages

Identity Theft

Abstract

Identity theft is a scenario where a person steals any details of another person and uses them as theirs for personal gain. For example, a person took advantage of another person’s hard work by stealing bank credit cards and used it to withdraw the cash from the bank without the consent of the owner (Zucker, 2010). This amounts to identity theft and neither the bank nor the owner recognized the thief before he or she committed the crime.

Introduction

There are several measures being taken into considerations by the criminal researchers and authors on ways to curb identity theft. Businesses have the responsibility of ensuring that the customers are not prone to identity theft and should at all times be able to spot out thieves. The process of identity theft involves some three simple steps (Mancini, 2010). Accessing the computers, social media accounts and going through victims emails is the first step. The second step involves the misuse of personal information to get the financial advantage which in turn leaves a person broke and in trouble with the authorities. The third and final stage is when the victim has discovered that there are some anomalies in the account after the thief has committed fraud (Zucker, 2010). Discovering the act takes less time but getting the full information on the level of activities done by the thief could take more than six months. Most victims are notified by the financial institutions of some unclear and irregular activities in their accounts which are where they know they have been robbed.

Conclusion

Identity theft is now becoming one of the most dangerous and an uprising form of criminal activity that has left many people broke and others in serious financial situations (Mancini, 2010). Dealing with identity theft is difficult especially due to the many activities that follow after an identity theft such as murder, fraud and other serious crimes. Several measures have been put in place such as facial recognition systems in the banks and other target locations to ensure that such acts are reduced.

 

 

 

 

 

 

 

 

 

 

 

 

 

References

 

House of cards. (cover story). Consumer Reports [serial online]. June 2011;76(6):23. Available from: MasterFILE Premier, Ipswich, MA. Accessed April 22, 2016.

Mancini, J. (2010). Why Aren't Credit Card Companies Responsible for Identity Theft?

Protect yourself from identity and credit fraud. Consumer Reports Money Adviser [serial online]. January 2015;12(1):6-7. Available from: Business Source Complete, Ipswich, MA. Accessed April 15, 2016.

Zucker, B. (2010). Counteracting Identity Fraud in the Information Age: The Identity Theft and Assumption Deterrence Act. nternational Review of Law, Computers & Technology, 13 (2), 183-192.

434 Words  1 Pages

Page 5 of 8

Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...