Open Access. Powered by Scholars. Published by Universities.®

Criminology and Criminal Justice Commons

Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 70

Full-Text Articles in Criminology and Criminal Justice

A Comparison Between A Terrorist Leader And A Lone-Wolf Operative In Bangladesh, Fatema Islam Dec 2023

A Comparison Between A Terrorist Leader And A Lone-Wolf Operative In Bangladesh, Fatema Islam

Journal of Terrorism Studies

The article compares the biography and terrorist portrait of two terrorists of Bangladesh: Mufti Abdul Hannan, a pioneer leader of the prominent terrorist organization Huji-B, and a lone wolf operative named Faizul Hasan. The study reveals the existence of the multifaceted dynamics of the leader (Mufti) and lone wolf (Faizul) encompassing organizational affiliation, operational independence, radicalization processes, motivations, objectives, and the scale of their operations. The study also finds that the pattern of operation of a terrorist leader (Mufti) and the lone wolf terrorist (Faizul) differed significantly in terms of planning, execution, and level of organizational support. While the terrorist …


The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt Jan 2023

The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt

Posters-at-the-Capitol

Current legislation and policies are not effective enough to fight human trafficking as it continues to change and evolve worldwide. Human trafficking is not just sex trafficking; labor trafficking, organ trafficking, people smuggling, and forced criminal activities. This evolving and changing global issue continues to grow into a highly profitable "business." Overseas, many countries struggle to handle this issue, and some countries do not handle it at all. The United States has a major human trafficking problem that will continue to worsen unless there is a change in the government. The U.S. Congress should be more focused on the growing …


Identifying The Main Causes For Support Of Crime Control Theater Forms, And Understanding How To Correct The Public’S Perception, Erisjames M. Elliott Jan 2023

Identifying The Main Causes For Support Of Crime Control Theater Forms, And Understanding How To Correct The Public’S Perception, Erisjames M. Elliott

CMC Senior Theses

Much research has been completed on the forms of crime control theater (CCT), and the impact that the existence of CCT laws have on society. Research on CCT laws has shown that they are definitively unsuccessful in providing the safety they were created to provide. This thesis will utilize completed research to explain the main psychological phenomena holding people back from decreasing their support for CCT laws. It will also describe proven methods of correcting misinformation in order to change the perceptions of people who support crime control theater laws, and provide suggestions for how research should be continued.


Exploring Change And Stability In Counterterrorism Policy, Prosecution, And Sentencing Of Terrorists In America Over The Last Three Decades In The United States, Georgianna Grace Bettis Dec 2022

Exploring Change And Stability In Counterterrorism Policy, Prosecution, And Sentencing Of Terrorists In America Over The Last Three Decades In The United States, Georgianna Grace Bettis

Graduate Theses and Dissertations

The purpose of the current study is to investigate the effects of legislation changes on how terrorists are adjudicated in American federal courts. The overarching question is: how have prosecutorial and sentencing outcomes changed in response to homeland security policy shifts over the last few decades? The project examines the impact of policy on changes to terrorists’ sentencing in three time periods, marked by three major events: The 1993 World Trade Center Attack, the 1995 Oklahoma City Bombing, and the attack on the Twin Towers (9/11/2001). In addition to terrorists’ demographic and background attributes (i.e., gender, age, terrorism category), the …


America: The World’S Police—How The Defund The Police Movement Frames An Analysis For Defunding The Military, Anya Kreider May 2022

America: The World’S Police—How The Defund The Police Movement Frames An Analysis For Defunding The Military, Anya Kreider

The Scholar: St. Mary's Law Review on Race and Social Justice

In this article, the author examines the tenets of the Defund the Police movement and applies them to the American military to make the argument that not only should the police be defunded, but so should the American military. The purpose of this piece is to push the conversation regarding policing beyond American borders to examine American influence internationally. The article incorporates various Critical Race Theories to explore the intersection of policing and the military. The Defund the Police Movement also provides a framework for critiquing the American military because the American police and military are inextricably connected. Part I …


Anger In The Overlooked: A Gendered Analysis Of The January 6, 2021 Capitol Hill Breach, Elizabeth Bender May 2022

Anger In The Overlooked: A Gendered Analysis Of The January 6, 2021 Capitol Hill Breach, Elizabeth Bender

Theses/Capstones/Creative Projects

The violence seen at the U.S. Capitol Building on January 6, 2021 has sparked concern at the threat of domestic violent extremism (DVE) within the United States. Over 700 individuals have been federally charged in connection with the events of January 6 including almost 100 women. Women’s involvement in DVE is underestimated and understudied. This project utilized a corpus of over 1,000 court documents to content code variables relating to violence and DVE affiliation for the individuals who have been federally charged in relation to January 6th. The results of the coding process were then used to compare the rates …


Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia Jan 2022

Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …


Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison Feb 2021

Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison

EBCS Articles

Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username …


Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum Jan 2021

Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum

EBCS Articles

Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing environments may change computer users’ behaviors, this study tests the effectiveness of CPTED based approaches in mitigating system trespassing events. Findings from this randomized controlled field trial demonstrate that specific CPTED strategies can mitigate hacking events by: reducing the number of concurrent activities on the target computer, attenuating the number of commands typed in the attacked computer, and …


From The Legal Literature: Is Progressive Prosecution Possible?, Francesca Laguardia Jan 2021

From The Legal Literature: Is Progressive Prosecution Possible?, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia Jan 2021

The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.


The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia Jan 2021

The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.


Bio-Spatial Policing In Theory And Practice: Examining Impacts And Resistance Through Mobilities And Children's Everyday Life, Emily Kaufman Jan 2021

Bio-Spatial Policing In Theory And Practice: Examining Impacts And Resistance Through Mobilities And Children's Everyday Life, Emily Kaufman

Theses and Dissertations--Geography

Despite decades of reforms and technological innovations, increasing evidence shows that state securitization disproportionately harms already racially, spatially, and socio-economically marginalized communities. My research investigates uneven impacts of state securitization, from punitive welfare programs to school surveillance to policing. Across sites, I focus on scales, voices and the everyday lived experiences often left out of scholarly discourse and sensational media. In the current climate of growing awareness and scholarship on police violence, my dissertation addresses three less-studied areas: 1) the interplay between racial, gendered, spatial, and technified police practices; 2) how these practices impact the everyday lives of those racially …


The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques Nov 2020

The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques

EBCS Articles

Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …


Homicide And Drug Trafficking In Impoverished Communities In Brazil, Elenice De Souza De Souza Oliveira, Braulio Figueiredo Alves Da Silva, Flavio Luiz Sapori, Gabriela Gomes Cardoso Sep 2020

Homicide And Drug Trafficking In Impoverished Communities In Brazil, Elenice De Souza De Souza Oliveira, Braulio Figueiredo Alves Da Silva, Flavio Luiz Sapori, Gabriela Gomes Cardoso

Department of Justice Studies Faculty Scholarship and Creative Works

Many studies demonstrate that homicides are heavily concentrated in impoverished neighborhoods, but not all socially disadvantaged neighborhoods are hotbeds of violence. Conducted in Belo Horizonte, Brazil, this study hypothesizes that the association between high rates of homicide and impoverished areas is influenced by the emergence of a specific type of street drug-dealing common to favelas (slums). The study applies econometric techniques to police data on homicides and drug arrests from 2008 to 2011, as well as 2010 Census data, to test its hypothesis. The findings provide insight into the development of crime prevention policies in areas of high social vulnerability.


Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon Mar 2020

Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon

EBCS Articles

The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …


Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah Mar 2020

Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah

EBCS Articles

The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …


From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia Jan 2020

From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


From The Legal Literature: Automating Police, Francesca Laguardia Jan 2020

From The Legal Literature: Automating Police, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia Jan 2020

From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia Jan 2020

From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


Agony Of Delayed Justice, Ahmed Saeed Jun 2019

Agony Of Delayed Justice, Ahmed Saeed

MSJ Capstone Projects

Martin Luther King Jr in his famous letter from a Birmingham jail wrote that justice too long delayed is justice denied. King said so to highlight that justice for African-Americans had been delayed for far too long. (King, 1963) According to ancient Latin maxim, ‘to delay justice is injustice’ but in the land of pure, delayed justice is a new normal. Courts in Pakistan have a backlog of 1.9 million pending cases to be adjudicated. Some of these cases have been pending for three or four decades.


Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin May 2019

Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin

MSU Graduate Theses

This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.


Improving Information Sharing: Local Fusion Centers And Their Role In The Intelligence Cycle, Alexis Spall May 2019

Improving Information Sharing: Local Fusion Centers And Their Role In The Intelligence Cycle, Alexis Spall

Master in Management for Public Safety and Homeland Security Professionals Master's Projects

Abstract

My Master’s Project focuses on local fusion centers and the need for improved information sharing practices among law enforcement partners. After the tragic event of September 11th in 2001, the Department of Homeland Security and the Department of Justice recognized a communication gap between law enforcement agencies and a lack of effective information sharing efforts. Fusion centers play a significant role in supporting both criminal and terrorist investigations due to their ability to act as a conduit between various law enforcement partners. Due to their important responsibilities as information sharing hubs that provide valuable analysis and dissemination of …


Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani Jan 2019

Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani

EBCS Articles

Although a relatively simple form of hacking, website defacement can have severe consequences both for the websites that are attacked and the reputation of their owners. However, criminological research has yet to fully explore the causes and correlates of website defacement. We consider whether variables derived from routine activity theory can be applied to understanding website defacement. Specifically, using a sample of websites that were targeted by hackers in 2017 across the world, we examine the relationship between a country’s structural characteristics and the frequency of website defacement reported for the country. We find that website defacements are less likely …


Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo Jan 2019

Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo

EBCS Articles

The classical view of an information system is that it represents and reflects physical reality. We suggest this classical view is increasingly obsolete: digital technologies are now creating and shaping physical reality. We call this phenomenon the ontological reversal. The ontological reversal is where the digital version is created first, and the physical version second (if needed). This ontological reversal challenges us to think about the role of humans and technology in society. It also challenges us to think about our role as IS scholars in this digital world and what it means for our research agendas.


Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park Jan 2019

Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park

EBCS Articles

Adopting the criminal event perspective, we explore how online fraudsters make use of urgency cues in their interactions with potential victims throughout the progression of an online nonpayment fraud attempt. Integrating claims from the ‘Interpersonal-Deception Theory’ with situational explanations of crime, we investigate whether fraudsters’ presentations of verbal cues of urgency during the early stages of a criminal event are followed by a consistent presentation of verbal and non-verbal urgency cues. To answer this question, we posted a large number of ‘for-sale’ advertisements over a classified-ad website and interacted with online fraudsters and legitimate users who responded to our ads …


Terrorism In The Middle East: Implications On Egyptian Travel And Tourism, Tamer Z.F Mohamed, Tamer S. Elseyoufi Dec 2018

Terrorism In The Middle East: Implications On Egyptian Travel And Tourism, Tamer Z.F Mohamed, Tamer S. Elseyoufi

International Journal of Religious Tourism and Pilgrimage

This paper attempts to shed the light on challenging issues affecting travel and tourism industry especially in the Middle East such as political, socio-economic and security instability. Due to its geopolitical and historical importance, the paper focuses on the situation in Egypt as a descriptive case study. The methodology relies on historical review and impact assessment to understand the roots and extended branches of instability in the Middle East that led to the Arab Spring, by focusing on the Egyptian case in the last half century. The assessment explains the negative effect of Western and Egyptian policy on extending the …


United States Human Trafficking Task Force, Michael A. Palazzi Iv May 2018

United States Human Trafficking Task Force, Michael A. Palazzi Iv

Master in Management for Public Safety and Homeland Security Professionals Master's Projects

Human Trafficking is a multi-billion-dollar industry which is both a domestic and foreign issue for the United States government. The purpose of this paper is to address the issues such as: lack of a centralized task force, lack of funding and an introduction of a new method of investigation which utilizes intelligence to fight human trafficking. The results found through research and interviews with federal agents have shown that a federal task force utilizing federal, state, and local law enforcement along with nongovernmental organizations (NGO’s) and government would have a positive, profound effect against human trafficking. It is recommended that …


The New American Slavery: Capitalism And The Ghettoization Of American Prisons As A Profitable Corporate Business, David A. Liburd Sep 2017

The New American Slavery: Capitalism And The Ghettoization Of American Prisons As A Profitable Corporate Business, David A. Liburd

Dissertations, Theses, and Capstone Projects

The labor of enslaved Africans and Black Americans played a large part in the history of colonial America, with the American plantation being the epicenter for all that was to be produced. While the two have never been completely tied together, capitalism and modern day slavery have been linked with one another. Some analysis sees slavery as a remote form of capitalism, a substitute, to an antiquated form of labor in the modern world.

Slave plantations adopted a new concentration in size and management, referred to by W.E. DuBois as a change "from a family institution to an industrial system."1 …