CJA 325 Week 3 Exploring Organized Crime Worksheet Latest
- Price : $18.00 | $10.00

- CJA 325 Week 3 Exploring Organized Crime Worksheet .docx
CJA 325 Week 3 Exploring Organized Crime Worksheet Latest
Use your textbook,
Organized Crime (11th ed.), and
outside research to complete each section of this worksheet. Organized crime 11th edition
Chapter 5,6,9
Section 1: Organized Crime Groups
Outlaw Motorcycle groups in the United States have captured
the imagination of the American public as well as the attention of law
enforcement at the local and federal level.
Complete the
following chart by comparing and contrasting each of the listed groups. Include
the origin of each group, the areas of the United States in which these groups operate, their business
interests, colors and patches, their structure, the requirements for joining
each group, and any rituals associated with each group.
Categories |
Hells Angels |
Pagan’s |
Bandidos |
Outlaws |
History/Origins |
·
Founded
in 1948 ·
Fontana
Area, San Bernardino, CA ·
1957
– HQ moved to Oakland, CA |
|
|
|
Geographic Area of Operations/Scope |
|
|
|
|
Business/Criminal Interests |
|
|
|
|
Structure/Membership Requirements |
|
|
|
|
Colors/Patches/Rituals |
|
|
|
|
There is a growing trend toward a
nexus or cooperation between organized crime groups and terrorist groups.
Terrorist groups may take advantage of the specialized skills of an organized
crime group. For example, Hezbollah has established bases in Latin America and
has worked with Mexican drug trafficking organizations to smuggle people and
launder money to finance terrorism. Sometimes the terrorist group may
incorporate organized criminal activity, such as kidnapping for ransom or
narcotics trafficking, as a funding mechanism for their terrorist activities.
For example, the Al-Qa’ida in the Lands of the Islamic Maghreb (AQIM) in
Algeria used kidnapping for ransom to finance their operations.
Create a list of
the ten most prominent terrorist organizations worldwide and their country of
origin or operation.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Choose one group
from your list above and write a 350-
to 525-word essay below in which you explore the political, social, and
financial motivations of this group. In funding its operations, does this group
incorporate the services of other terrorist groups or organized crime groups?
Does this group employ tactics or strategies in its fund-raising that include
organized criminal activity? Explain your answer.
Essay response:
Section 3: Cyber Terrorism
Cyberterrorism could be a
critical threat to national security and public policy. Cyberterrorism
is the use of technology to bring about
political, religious, or ideological goals by actions that result in disabling
or deleting critical infrastructure data or information. Cyberterrorism is
different from cybercrime, such as identity theft or fraud, because it is
designed to attack and impact society or a city or nation and not just an
individual. Cyberterrorism often involves lone wolf incidents rather than the
work of an organized terrorist organization. (“Cyber
Terror.” William Tafoya. November 1, 2011. FBI.gov.)
Write a 350- to 525-word
essay below in which you discuss at least one previous cyberterrorism attack
and hypothesize on the future of such attacks. Where do vulnerabilities lie in
the infrastructure of the United States that may create opportunities for
cyberterrorists? What technological tools could terrorists use for future
attacks? How can the U.S. government reduce the risk for such attacks? Explain
your answer.
Essay response: