Colin Ferguson

Please read final project doc. attachment, need assistance creating an outline for the Colin Ferguson Case

Law Enforcement and Society

DNA collection is one of the layers in an overall crime control strategy, and police see expansion of that layer (to all or most criminal offenders) as a “sure thing” for criminal apprehension. You saw an example of the “stop and spit” program and voluntary collection in one of the assets this week; the presumption being that if police have all this DNA, then they can catch more offenders should the opportunity arise. However, we also know that not all people come into police contact at the same rate. There has been much literature about the difference in traffic stops between races and genders so let’s not forget that now and combine the two components of information.
Discuss the impact of DNA collection programs (alternatively, locate a specific DNA collection program from a department and explain it). Are DNA collection programs beneficial, or harmful? Do they impact certain populations more than others?
Cite at least one source above the materials already provided to you in this course. This should be the equivalent of at least two pages typed double-spaced with Times New Roman font 12

week 7 341 R. Lincoln

please give a response to my classmate’s discussion post listed.
After reviewing all of the famous FBI cases, i have chosen the one of Aldrich Ames. This man was arrested for spying on the Russians after working with the CIA for 31 years. He was specialized in Russian intellgience as he spoke russian. While working for the CIA, he would continue to meet with KGB, including a Russian diplomat assigned in Rome (FBI). Meanwhile, he was paid 1.88 million by the KBG for the information provided. The investigators assigned to monitor Ames were doing surviellance for about 10 months. Investigators even noticed a chalk mark made on the mailbox belonging to Ames that indicated his intentions to meet with Russians in Columbia. Finally a plan to arrest him was made. Ames confessed to working for the Russians for over a decade before his arrest.
The evidence that seemed to tip off the CIA that he was a mole was his lavish lifestyle that he was living. It was noted that he had a $540,000 house in Virginia in th 80’s which was lots of money and also drove a Jaguar. Ames was also adminstered polygraphs at the CIA and seem to have displayed deceptive answers but still passed as the examiners were listed as friendly. Ames was seen multiple time with his KGB handlers which identifed his as a mole. He was under constant surveillance which consisted of 24/7 watch. His car was also bugged to track his movements.
I could see in today’s world that an investigator would handle the investigation the same. The very first tip off is the living above means. The CIA do not tend to hire those who are rich or well-off as they do not want to work for the FBI. This should lead into possible digging of finiance like what happened here. Ames family was not rich, so this money must be made by other means. Next is the surviellance. In today’s world, with the access to internet, a different type of surviellance would have to be used and that would be spying on internet and social media accounts. The results would be the same in today’s world.
References:
Britannica, . (2019). Aldrich Ames. Encyclopædia Britannica. Retrieved October 26, 2022, from https://www.britannica.com/biography/Aldrich-Ames
GOV, F. (2016, May 18). Aldrich Ames. FBI. Retrieved October 26, 2022, from https://www.fbi.gov/history/famous-cases/aldrich-ames

week 7 341 L.morgan

please give a response to my classmate’s discussion post listed. Melissa Virus
In 1999, a programmer named David Lee Smith hacked AOL (America Online) and used it to upload a file on a newsgroup. The file was named “alt.sex” and it promised free passwords to fee-based websites that offered adult content. Upon downloading the document, a virus was unleashed and spread. This virus would take over Microsoft Word and then used it to escalate and hijack their email system, Microsoft Outlook and send messages to the first 50 mailing lists. The emails contained attachments with this virus, and it operated as an automated chain letter. Email servers became overloaded, and some had to be shut down entirely including some at Microsoft. One million email accounts were affected, and Internet traffic became very slow. The damage of this virus was an estimate of 80 million for the cleanup and repair of systems. A very important piece of evidence became from a tip from a representative of AOL and working with the FBI and law enforcement, they were able to trace the electronic fingerprints on the virus back to Smith, who got arrested in April 1999. This virus showed how hard it is to trace any virus back to its source and without cooperation, the suspect might not have ever been identified. Mark Stevens, the operations manager for Monmouth Internet provided law enforcement with a list of names of their customers who used a specific IP address to send and receive information to the Internet. Among those names, David L. Smith was on there. Officials also believed that Mr. Smith was another known hacker called VicodinES but Paul Loriquet, a spokesman for Mr. Stevens, denied the claim. Richard Smith, a software developer from Cambridge Mass., alerted FBI officials that Mr. Smith’s name appeared in documents found in a website in Florida that was related to VicodinES. To this day, he still believes they are the same person. Without the tip from the AOL worker and tracing back the virus, law enforcement would’ve caught the wrong person since they believed that VicondinES was a certain individual whose account got stolen/hacked.
An investigator being assigned to this case today would handle it differently in terms of documentation and presentation since more cyberlaws have been implemented and the proper chain of custody needs to be maintained so evidence is admissible in court. Evidence in a cybercrime can range from computers, cellphones, automobile navigation system, video game consoles, or any other networked device. Cybercrime investigators work with internet service providers, telecommunications, and network companies to see which websites and protocols were used in the crime. This technique is also useful for monitoring future activities through digital surveillance. Investigators must seek permission to conduct these types of activities through search warrants.
https://www.fbi.gov/history/famous-cases/melissa-virus
https://www.justice.gov/archive/criminal/cybercrime/press-releases/2002/melissaSent.htm
Information Security: The Melissa Computer Virus Demonstrates Urgent Need for Stronger Protection Over Systems and Sensitive Data: T-AIMD-99-146. (1999). GAO Reports, 1.
Kocieniewski, David. (1999) Melissa Virus Suspect Caught. The New York Times. https://archive.nytimes.com/www.nytimes.com/library/tech/99/04/biztech/articles/03melissa.html
Nelson, M., & Briody, D. (1999). IT managers regroup after Melissa hits. InfoWorld, 21(14), 1.

week 7 345 dawn

please give a response to my classmate’s discussion post listed. Exercise #1
According to statistics, workplace violence is on the rise, with nearly 1.5 million assaults occurring annually (Vuleta, 2021). In fact, the second leading cause of death in the workplace is violence (Vuleta, 2021). ASIS developed a three prong “standard” organizations can follow to help keep a safe working environment with relation to work place violence (ASIS, 2011).
The first step is develop and implement a “workplace violence prevention and intervention program” (ASIS, 2011). Important factors security managers need to incorporate to prevent workplace violence is to adopt a “zero tolerance” workplace violence policy. Policies should address the organizations overall security objectives, people, property, and information (ASIS, 2009). In addition, the “zero tolerance” on violence policy should include a statement of the company’s commitment to maintaining a safe working environment free from violence and intimidation, along with the definition of workplace violence (Phillis, et. al., 2022). The policy should be disseminated to all employees, to include the disciplinary action for violating it. Furthermore employees should receive adequate training on what constitutes as workplace violence, how to prevent it, and best ways to remain safe when it occurs (Phillis, et. al., 2022).
Next is having a “threat management protocol” (ASIS, 2011). An important factor is developing procedures that prevent workplace violence. The American Society for Industrial Security (ASIS) advises “security procedures” explain responsibility for particular security concerns and demonstrate to employees that security rules were considerately developed (ASIS, 2009). Each procedure should align with a policy (ASIS, 2009). The procedures aid in the uniform enforcement of security rules (ASIS, 2009). For a “zero tolerance” workplace policy one of the procedures may include when and specifically how to report workplace violence. As a security manager, educating yourself on the signs of workplace violence could help anticipate an attack. Security managers should know the history who is working for them, and if the employee possess characteristics for violence.
Lastly are developing “practices that can assist the organization in effectively managing post-incident issues”(ASIS, 2011). After a critical incident occurs it is vital for security manager to conduct an after action review. The review helps identify issues in the response and what corrective action(s) could be taken in the future to mitigate the risks Employees who are not physically injured from the incident, may still suffer emotional distress. In workplaces employees spend a great deal of time with one another and friendships likely occur. To overcome this challenge, the security manager or designee should reach out to employees to check their mental wellbeing and needs after a workplace violence incident regardless of the severity (Phillis, et. al., 2016). The U.S. Department of Labor’s Office of Disability Employment Policy offers resources to employers to help employees suffering from emotional illnesses, such as post-traumatic stress disorder (Phillis, et. al., 2016). Another free resource could be reaching out to local churches for assistance. After a critical incident, churches may have chaplains available to be sent out to the location afterwards for spiritual and religious support. To guarantee employees continuous support, the employer could contract with an “employee assistance program” (EAP). The employer-sponsored service is designed to assist employees in locating help for personal or family problems, including mental health issues, or financial or legal concerns event (Phillis, et. al., 2016). EAPs provide assessments and referrals to employees to provide them with the support they need. These programs can be very effective when employees have experienced a traumatic event (Phillis, et. al., 2016).
As for roles in workplace security, it is every employee’s responsibility, regardless of position, to prevent, educate themselves, and report any suspicion or incident of workplace violence. It is the security department’s role to offer refresher trainings on workplace violence and perform routine compliance checks on the policy and procedure and updates as applicable.
In conclusion, workplace violence is on the rise and often unpredictable. However, security managers can help reduce the risk of violence by identifying the businesses’ vulnerabilities and developing appropriate security measures to address them. Businesses should have concise policies and procedures written, distributed, and taught to all employees on how to prevent, stop, and report violence within the workplace.
Referenced
American Society for Industrial Security. (2009). Facilities Physical Security Measures. https://learn.umgc.edu/. Retrieved October 6, 2022, from https://learn.umgc.edu/content/enforced/849420-001434-01-2228-OL2-6981/CCJS%20345.Facilities%20Physical%20Security%20Measures.pdf?_&d2lSessionVal=MUZzUPLZtUE5tgXpZHGJ1XSmA
American Society for Industrial Security. (2011, September 2). Workplace Violence Prevention and Intervention. A S I S I N T E R N A T I O N A L. Retrieved November 1, 2022, from https://learn.umgc.edu/content/enforced/849420-001434-01-2228-OL2-6981/Workplace%20Violence%20Prevention%20and%20Intervention.pdf?_&d2lSessionVal=NR2DaCa1BeJjkmGV4oPAhgBMN
Phillis, M., Schmidt, J., & Lowell, J. (2016, June 16). When tragedy strikes: How employers can assist employees affected by mass shootings and disasters. Littler Mendelson P.C. Retrieved October 7, 2022, from https://www.littler.com/publication-press/publication/when-tragedy-strikes-how-employers-can-assist-employees-affected-mass
Vuleta, B. (2021, October 22). 27+ Alarming Workplace Violence Statistics. Find Best Law Jobs in the US in 2022. Retrieved October 3, 2022, from https://legaljobs.io/blog/workplace-violence-statistics/
Exercise #2
Only about one-fifth of organizations in the United States, Europe, and India have fully converged physical security, cybersecurity, and business continuity (Gips, 2020). With benefits like cost saving, single point contact, and developing staff with a better range of abilities why are many companies reluctant to converge security divisions.
Marshall Sanders, vice president of corporate security and Chief Security Officer (CSO) of Level3 Communication defines “convergence as the integration of logical security, information security, physical and personnel security; business continuity; disaster recovery; and safety risk management” (Slater, 2005). One corporate benefit of convergence is cost savings. With bringing the security operations under one umbrella, duplication of efforts are reduced and different security functions in the same organization aren’t fighting over resources or tasks. Another benefit is the CSO is a single point of contact for the CEO, board of directors, contractors, external business partners and employees for security related communications. Another benefit of convergence is having one strategic mission between all security divisions, which strengthens collaboration. Lastly, convergence can lead to a more versatile security staff. For example rather than having 2 divisions working separately on external and internal investigations, the units are combined under the same leadership and investigators can be cross-trained for all types of investigations.
On the other hand, they are disadvantages to convergence. One is finding staff competent to work in cyber, physical and BC. In the chance you find an individual talented enough to cross-train, they usually require a higher salary. Another disadvantage of convergence is the loss of jobs when management functions are condensed. According to ASIS, depending on CSO selection a new organizational arrangement may cause a bitterness between security leaders and staff (Gips, 2020).
In conclusion, I do believe in convergence if for nothing more than it saves time and money by less duplication of efforts across multiple divisions.
Here’s the end quote: “Everything that rises must converge” does apply to security—only the security function hasn’t yet risen high enough in the corporate hierarchy” (Gips, 2020).
Referenced
Gips, M. (2020, January). Research Finds Full Convergence Is Far from Commonplace. ASIS Homepage. Retrieved October 31, 2022, from https://www.asisonline.org/security-management-magazine/articles/2020/01/is-security-converging/#:~:text=A%20few%20negative%20consequences%20of,converged%20staff%20(25%20percent).
Slater, D. (2005, December 5). Physical and IT security convergence: The basics. CSO Online. Retrieved October 31, 2022, from https://www.csoonline.com/article/2117824/physical-and-it-security-convergence–the-basics.html

week 7 341 R. Lincoln

please give a response to my classmate’s discussion post listed.
After reviewing all of the famous FBI cases, i have chosen the one of Aldrich Ames. This man was arrested for spying on the Russians after working with the CIA for 31 years. He was specialized in Russian intellgience as he spoke russian. While working for the CIA, he would continue to meet with KGB, including a Russian diplomat assigned in Rome (FBI). Meanwhile, he was paid 1.88 million by the KBG for the information provided. The investigators assigned to monitor Ames were doing surviellance for about 10 months. Investigators even noticed a chalk mark made on the mailbox belonging to Ames that indicated his intentions to meet with Russians in Columbia. Finally a plan to arrest him was made. Ames confessed to working for the Russians for over a decade before his arrest.
The evidence that seemed to tip off the CIA that he was a mole was his lavish lifestyle that he was living. It was noted that he had a $540,000 house in Virginia in th 80’s which was lots of money and also drove a Jaguar. Ames was also adminstered polygraphs at the CIA and seem to have displayed deceptive answers but still passed as the examiners were listed as friendly. Ames was seen multiple time with his KGB handlers which identifed his as a mole. He was under constant surveillance which consisted of 24/7 watch. His car was also bugged to track his movements.
I could see in today’s world that an investigator would handle the investigation the same. The very first tip off is the living above means. The CIA do not tend to hire those who are rich or well-off as they do not want to work for the FBI. This should lead into possible digging of finiance like what happened here. Ames family was not rich, so this money must be made by other means. Next is the surviellance. In today’s world, with the access to internet, a different type of surviellance would have to be used and that would be spying on internet and social media accounts. The results would be the same in today’s world.
References:
Britannica, . (2019). Aldrich Ames. Encyclopædia Britannica. Retrieved October 26, 2022, from https://www.britannica.com/biography/Aldrich-Ames
GOV, F. (2016, May 18). Aldrich Ames. FBI. Retrieved October 26, 2022, from https://www.fbi.gov/history/famous-cases/aldrich-ames