Sunday, November 2, 2014

School Essay: Dead Man Incorporated




Dead Man Incorporated
Leslie K. Penny
Research Assignment #6.1
Chancellor University










Dead Man Incorporated
            If all the known gangs in the US were lumped together as a whole, we would have a huge army of readily available thugs with no qualms to begin anarchy.  The only benefit from gangs is that they DON'T all act as one.  Some are allies but most despise the other.  As a whole, according to the FBI, gangs represent 1.4 million of our population that covers 33,000 different gangs (Michael, 2012).  The following essay will concentrate on one gang, Dead Man Incorporated, and answer the following questions: when and where the gang originated; what qualifications are needed to be a member; who they are aligned with and who they have as enemies; the most recent newsworthy event about the group; and in what prisons they seem to pose the biggest problem.
            Dead Man Incorporated originated in the Maryland Correctional System in the late 1990's (Dead Man Inc) and founded by Perry Roark (42) who, just this year, plead guilty "to conspiracy to participating in" the "violent racketeering enterprise", Dead Man Incorporated, and confessed to being the "Supreme Commander" since its inception in 2000 (The FBI: Federal Bureau of Investigation, 2012).  This writer is finding conflicting years of DMI's inception from several references.  According to gangs.org, DMI is the third largest gang in Maryland and have the same anti-religious and anti-government beliefs the same as the Black Guerilla Family and also created a similar "white off-shoot" gang.
            In order to gain membership into Dead Man Incorporated, one must go through a formal process via a written application and must undergo a back ground check (Dead Man Inc).  At one point, only white's were allowed to join DMI but as the gang grew on the outside of prison, non-whites were introduced into the pack, however an order was eventually issued that all non-whites had to remove themselves from the gang by April 2009 or face the consequences (Walker, 2012).  DMI doesn't except homosexuals, rapists, and snitches (Power Over All).   Once an applicant has been approved, the member is "held to a strict, written code; the consequences of violations of that code are fatal" (Dead Man Inc).  Other members were basically absorbed from smaller gangs making DMI larger as time went on and are recognized for their violence against inmates and staff and, allegedly, will do contract murders for the Black Guerilla family (Walker, 2012).  
            According to StrHATEtalk.com, DMI's enemies are all prison gangs in general and their allies are Black Guerilla Family and Aryan Brotherhood of Texas (Power Over All).  However, if a spinoff group called, Power Over All, takes over DMI then their enemies would be the Black Guerilla Family and their allies would be the Aryan Brotherhood of Texas, the Neo-Nazi Skinhead, and the Mexican Mafia.  Time will tell if the POA branch based in a correctional facility in Texas will take over the DMI.  POA was originated by James Sweeney who was once a right hand man for Perry Roark.   When Federal and State Law Enforcement tried to break up DMI they inadvertently gave DMI the opportunity to spread.  The original founder, Perry Roark, stayed in Maryland while James Sweeney was sent to Texas and, another right hand man, Brian Jordan, was sent to a correctional facility in Louisiana (Power Over All). 
            As mentioned earlier, the most recent newsworthy event regarding DMI was a guilty plea by  the gangs leader, Perry Roark, aka: Rock, Pops, Slim, and Saho the Ghost on charges of federal racketeering, murder and drug charges(The FBI: Federal Bureau of Investigation, 2012).  Ironically, Roark was scheduled to be released from state prison but will now spend the rest of his life in federal prison instead for leading DMI and arranging murders, admitting "that he conspired to conduct the affairs of DMI through a pattern of criminal activity from 2000 to present, including: murder and threats to commit murder, armed robbery, drug trafficking, and extortion" (The FBI: Federal Bureau of Investigation, 2012). 
            The FBI site goes on to say that DMI members and associates smuggled drugs, tobacco, cell phones, and other contraband into prisons by concealing them on inmates visitors.  The contraband cell phones were used by DMI gang members in prison to coordinate further "smuggling of contraband into prison, to disseminate information about arrests and releases of members and associates, to warn of investigation, to publicize the identities of persons believed to be cooperating with law enforcement, and to order assaults and murders of such persons as well as enemies of DMI" (The FBI: Federal Bureau of Investigation, 2012). 
            To conclude, even though DMI hasn't the reputation of gangs such as the Aryan Brotherhood, they are still a gang just the same, causing havoc where ever they go.  Now that the leader, ironically,  is serving time for the rest of his life in the very prison DMI posed the biggest problem, another leader will most certainly take his place and ensure the gangs survival.  We learned the origins of DMI as well as the means to join the gang, those that aren't allowed to join and the gangs enemies and allies.  We also learned that a gang leader isn't indestructible and can be taken down. 





Works Cited

(2012). Retrieved 10 13, 2012, from The FBI: Federal Bureau of Investigation: http://www.fbi.gov/baltimore/press-releases/2012/founder-of-violent-dead-man-incorporated-gang-pleads-guilty-to-federal-racketeering-murder-and-drug-charges
Dead Man Inc. (n.d.). Retrieved 10 13, 2012, from Gangs.org: http://gangs.umd.edu/Gangs/DeadManInc.aspx
Michael. (2012, 01 20). There are 1.4 Million Gang Members in the United States and more Pour into the Country Every Singe Day. Retrieved 10 13, 2012, from The American Dream: http://endoftheamericandream.com/archives/1-4-million-gang-members-and-more-pour-into-the-united-states-every-single-day
Power Over All. (n.d.). Retrieved 10 13, 2012, from StrHATE Talk: http://www.strhatetalk.com/Power_Over_All.html
Walker, R. (2012, February 22). Dead Man Inc Prison Gang-DMI. Retrieved Oct 12, 2012, from Gangs or Us: http://www.gangsorus.com/dead_man_inc_prison_gang.htm


              

School Essay: Crime in the U.S.



Crime in the U.S.
Leslie K. Penny
Research Assignment #1.1
Chancellor University






Crime in the U.S.
            The Uniform Crime report offers a "periodic nationwide assessment of reported crimes" throughout the US (Uniform Crime Reporting Program Resource Guide, 2010).  With the information the UCR provides as well as the FBI website, one can answer the following questions: when the UCR is made available for public view each year, how the report is used and how data is collected; how much arson and murders occurred in the city of Cleveland in the most recent report; out of  Cleveland and Columbus, which city had the most motor vehicle thefts; was Cleveland's homicide rate up or down over the previous year and, lastly, a comparison of the figures acquired with the total arson's, motor vehicle thefts, and homicides nationally; what states have higher crime statistics than Ohio.  
            According to the Federal Bureau of Investigation, the UCR has several different publications that are released throughout the year, such as Hate Crime Statistics(released May 2012), Crime in the United States (released Sept. 2012), and Law Enforcement Officers Killed and Assaulted (released Oct. 2012) (UCR Publication Schedule).  But the Preliminary Annual Uniform Crime Report from January to December of 2011 was released on June of 2012 and the release of the Preliminary Semiannual Uniform Crime Report from January to June of 2012, is December 2012 (UCR Publication Schedule).  However, that information is not available so the most recent UCR is the 2010 version. 
            The UCR is used to supply crime data that would aid law enforcement agencies in tracking the variations in local, state and national crime rates.  According to Shane Hall, an eHow contributor,  Criminologists as well as other researchers, the media and the public use the information in the UCR for many purposes such as enabling officials to monitor changes  in the crime rates over periods of time, to study crime rates across regions and to conduct research.  Data is collected through a combined effort on the part of the City, County, State, Tribal, and Federal Law Enforcement agencies to put forward a nationwide analysis of crime (Data Quality Guidelines).  The site referenced above also provides procedures the SCMU use for data quality such as checking data for "logical consistency, for reasonableness, ensures adherence to sound estimation methodologies, ensure adherence to monetary submission to standards for stolen and recovered property, and ensure that other statistical edit functions are processed within established parameter" (Data Quality Guidelines).  There are also auditors who conduct sporadic reviews of UCR crime data collected and reported by the Program's data contributors as well as training to make certain the uniformity in reporting the nation's crime data and special studies conducted (Data Quality Guidelines) . 
            According to the latest edition of the UCR, the 2010 edition, the city of Cleveland had 378 cases of arson and 81 cases of murder and non-negligent manslaughter (Crime in the United States, 2010).   Cleveland's homicide rate was down compared to the previous year of 86 in 2009 (Crime in the United States, 2009).  The city with more vehicle thefts was Columbus with 403, while Cleveland had 378 vehicle thefts (Crime in the United States, 2010).  
            The following is a list of states that have a higher crime statistic than Ohio in reference to homicides: Pennsylvania, Texas, New York, Michigan, Louisiana, Illinois, Georgia, Florida and California.  When it comes to motor vehicle thefts, the following states had a higher total than Ohio: Florida, Georgia, Texas, Arizona, California, Washington, Illinois and Michigan.  According to the FBI website, "The FBI does not include estimates for arson's because the degree of reporting arson offenses varies from agency to agency" (Arson, 2010).  One could go through each city in each state adding up all the arson stats individually, however, it would be a timely endeavor. 
            To conclude, the resources researched, especially the FBI website, offered the answers needed to comply with this assignment.  In doing so, the opportunity presented itself to see what all the UCR provides, who uses this information, how the information is collected, who collects it and a more in-depth look of arson, murder, and vehicle theft in all the states.  This writer has the opportunity to move all over the United States, using this website to get an idea of the crime rate for each potential state is very interesting and eye opening. 











Works Cited

Arson. (2010). Retrieved 09 07, 2012, from The FBI: Federal Bureau of Investigation: http://www.fbi.gov/about-us/cjis/ucr/crime-in-the-u.s/2010/crime-in-the-u.s.-2010/property-crime/arsonmain
Crime in the United States. (2009). Retrieved 09 07, 2012, from Department of Justice Federal Bureau of Investigation: http://www2.fbi.gov/ucr/cius2009/data/table_08_oh.html
Crime in the United States. (2010). Retrieved 09 07, 2012, from The FBI: Federal Bureau of Investigation: http://www.fbi.gov/about-us/cjis/ucr/crime-in-the-u.s/2010/crime-in-the-u.s.-2010/tables/table-8/10tbl08oh.xls
Data Quality Guidelines. (n.d.). Retrieved 09 07, 2012, from The FBI: Federal Bureau of Investigation: http://www.fbi.gov/about-us/cjis/ucr/data_quality_guidelines
Hall, S. (n.d.). What is the Uniform Crime Report? Retrieved 09 07, 2012, from eHow: Discover the expert in you: http://www.ehow.com/about_6516240_uniform-crime-report_.html
UCR Publication Schedule. (n.d.). Retrieved 09 07, 2012, from The FBI: Federal Bureau of Investigation: http://www.fbi.gov/about-us/cjis/ucr/publication-schedule
Uniform Crime Reporting Program Resource Guide. (2010). Retrieved 09 07, 2012, from NACJD: National Archive of Criminal Justice Data: http://www.icpsr.umich.edu/icpsrweb/content/NACJD/guides/ucr.html





School Essay: Cyber-Stalking and Bullying, it is All Around us



Cyber-Stalking and Bullying, it is All Around us
Leslie K. Penny
Course Project Part II
Chancellor University







Abstract
The following essay opens up with the sad and unfortunate suicide of a cyber-bullied teen victim, Amanda Todd.  Just one example of the many adolescents that have ended their lives due to bullying.   The essay then moves into a definition of both cyber-bullying and cyber-stalking as well as a theory that seems useful for this crime, offense prevalence and weather cyber-bullying is state wide issue or global issue.   A couple specific cyber-statutes from New York state that prohibit cyber-bullying and cyber-stalking is explained, whether juveniles can commit the offense, as well as one legal case regarding cyber-bullying and, lastly, prevention tactics for those who find themselves in a situation where they are being bullied. 










Cyber-Stalking and Bullying, it is All Around us
            "Every day, I think, why am I still here?  I'm stuck.  What's left of me now? Nothing stops.  I have Nobody.  I need someone" (Ng, 2012).  Those are the words of 15 year old, Amanda Todd.  Words that will live on forever via the internet, her family, and those that will never forget,  as her unfortunate legacy.  After years of cyber-bullying and several moves to new school districts trying to escape her tormentors and the regrettable nude picture she let a stranger take of her over the internet years previously where she says in distress "I can never get that photo back...It's out there forever", she took matters into her hands, permanently ending the hold her aggressors had on her life by committing suicide (Ng, 2012).
            Amanda's story is just one of many innocent youths that have taken suicide as a route to escape their cyber-bullies/cyber-stalkers and the pain they faced each day.  This epidemic of bullies and stalkers using the internet as a tool for destruction continues to escalate at an alarming rate and will be discussed in more detail later in this essay.  A definition of cyber-stalking and cyber-bullying will be provided as well as a theory for the reasoning behind the behavior of cyber-bullies and stalkers, offense prevalence will be explained along with the offense limitations, either it be solely in the US or globally, any specific cyber-statutes from New York state that prohibit the conduct, whether juveniles can commit the offense,  and one legal or investigative issue regarding cyber-bullying and cyber-stalking will be given.  Lastly, prevention of cyber-bullying and future trends will be covered. 
            According to the book, Digital Crime and Digital Terrorism, the behavior of cyber-bullying cannot always be defined but the book credits the National Crime Prevention Council for defining cyber-bullying as "when the internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person", which applies to text messages, emails, instant messaging and social networking sites such as Facebook (Robert W. Taylor, 2011).  Cyber stalking can be defined as when an individual repeatedly contacts another via any of the online devices mentioned above to the point where it turns into harassment and continues to follow that individual no matter where they are physically by using the internet as means of communication .  (Roome, 2011).  Characteristics of cyber-bullying and stalking behavior includes manipulation and control of the bully over the victim; the bully constantly picks out faults and picking people out on inconsequential matters; the bully undermines the victims ability and worth, their professional status by demeaning them, the bully repeatedly criticizes the victim by distorting facts and with the use of threats (Roome, 2011). 
            Speaking of a cyber-bully  and cyber-stalker characteristics leads to the question of the behavior and why they do what they do.  One thing to bear in mind is that much of the cyber-bullying we see today is coming from adolescents directed at fellow adolescents and this essay concentrates on that age group.  There are theories that surround why youths attack other youths.  Perhaps, adolescents find it fun or attackers are reaching for the attention it provides and negative camaraderie with others who jump on the bullying bandwagon, for retaliation purposes or simply, as the saying goes, misery loves company mentality (Veenstra, 2009). 
            There is a viable theory, called the Routine Activity Theory,  that may provide some answers as to why adolescents behave this way (Veenstra, 2009).  According to Cyber-bullying: an explanatory analysis, the theory "assumes that for deviant behavior to occur there must be a convergence in time and space of three minimal elements: a likely offender, a suitable target and the absence of a capable guardian" (Veenstra, 2009).  With that being said, and it is very obvious as we make our way into 2013, that the more access adolescents have to the internet and more time they spend on it, the higher the prevalence of cyber-bullying and cyber-stalking is, especially where social networking sites and chat rooms are concerned, mainly because "youths seem to be suitable targets" and the need for more parental intervention is a must to help detach the victims from the world that the internet has on them (Veenstra, 2009).  Ways to detach the victim and even the instigator is just one click away and it's called blocking, which can apply to emails, IMs or text messages; limiting the access to adolescents media devices (as hard as that may sound but their safety is paramount in these situations); by becoming more aware and involved in the cyber world our youth live in; and by utilizing the web for resources and support information (Cyber-bullying, 2012) 
            As mentioned previously, the prevalence of cyber-bullying and cyber-stalking is extensive and for one to assume it is limited to just one particular part of the world is asinine.  This is happening all over the world where there is internet capabilities.   According to cyber-law expert, Parry Aftab, who works to spread cyber safety, "at least 40 percent of high school students have been cyber bullied while in high school, and that figure is nearly double among middle school students (Koebler, 2011).  Further proof coming from a 2010 government report called "Indicators of School Crime and Safety: 2010, gave the estimate of 4% of students ranging in the age from 12-18 admitted to being cyber-bullied in 2007 and another government report claims that roughly 18% of high school administrators have confirmed that they had to deal with cyber bullying as much as once a week or more (Koebler, 2011).  And as with any offense, many of these instances aren't reported, meaning the stats could potentially be even higher. 
            Thankfully, the law is beginning to catch up with the cyber world in regards to those that commit cyber-bullying and cyber-stalking.  In the state of New York we have the "Dignity for All Students Act" which says "all students in public schools have an environment free of harassment and discrimination based on actual or perceived race, national origin, ethnic group, religion, disability, sexual orientation, gender or sex (Patchin, 2012).  The article goes on to say that " harassment shall mean the creation of a hostile environment by conduct or by verbal threats, intimidation or abuse that has or would have the effect or unreasonably and substantially interfering with a student's educations performance, opportunities or benefits, or mental, emotional or physical well-being; or conduct, verbal threats, intimidation or abuse that reasonably causes or would reasonably be expected to cause a student to fear for his or physical safety; etc. (Patchin, 2012).
            The article states that "Dignity for All Students Act" will be taking effect in July of next year and that legislature "recognizes that most cyber-bullying originates off-campus, but nonetheless affects the school environment and disrupts the educational process, impeding the ability of students to learn and too often causing devastating effects on students' health and well-being, including behavior that occurs off school property and creates or would foreseeably create a risk of substantial disruption within the school environment..." (Patchin, 2012).
            New York also has the Commissioner's Regulation 100.2 (1) and Education Law 2801-a witch "requires each board of education to adopt and enforce a code of conduct, which includes disciplinary measures to be taken in incidents involving the use of physical force or harassment.  Requires school safety plans to contain strategies for improving communication among students and between students and staff and reporting of potentially violent incidents, such as creating a forum or designating a mentor for students concerned with bullying or violence and establishing anonymous reporting mechanisms for school violence" (Patchin, 2012).

            Returning back to the sad journey and unfortunate end of Amanda Todd, there might be a smidgen of light at the end of her tunnel.  With her death comes those that want to cease cyber-bullying and the death of the innocent in full force.  There are a few reports online that the individual who harassed and sexually exploited Amanda Todd has been identified but there is no proof of that at this time.  It seems like a needle in a haystack, investigating who the bully is behind her suicide but the outcome could be a lot more positive in the future as cyber-bullying and cyber stalking laws become more prevalent in our society.  
            Which leads me to a young man by the name of Tyler Clementi who, in Sept of 2010, jumped to his death from the George Washington Bridge after learning his University roommate had secretly used a laptop web cam to record him having relations with another individual and then distributed it online for all to see and comment on (Dhaurn Ravi, 2012) .  The offender, Dharun Ravi, was charged not with Tyler Clementi's death but instead with "tampering with evidence and witnesses for tying to change Twitter and text messages in which he encouraged others to watch the webcam" (Dhaurn Ravi, 2012).  He was only sentenced to 30 days in jail, those of which he only served 20, three years of probation, 300 hours of community service as well as counseling for cyber-bullying and a $10,000 probation fee (Dhaurn Ravi, 2012). 
            Along with the preventative measures mentioned earlier in this essay, there are many ways to assist in handling and stopping bullying over the internet, one being by just not responding.  According Debbie Roome's article, What is Cyber-Bullying and Stalking, simply not responding to emails, texts and messages via social networking sites will thwart the bully and if not, then keeping all record of communication such as messages, emails and texts in a document file with dates and times will be very beneficial to investigators if that is deemed necessary (Roome, 2011).  In the very least, letting someone know of what's going on or asking for help is essential in rectifying the situation and giving the victim the quality of life they should be living. 
            To conclude, as we further advance in our technology, this writer believes we will advance in cyber-bullying and cyber stalking laws as well.  This subject has already gained great momentum over the past few years but it is very unfortunate that it is mainly because of the suicides so many of our youths have committed.   More programs will be formed, adapted, altered to perform the best for all cyber-bullied victims out there and to possibly help reform bullies themselves.  But most of this quest is in the hands of the adolescents.  They have to be ones to reach out and we have to be available in their time of need. 

 












Works Cited

Cyber-bullying. (2012). Retrieved 12 21, 2012, from KidsHealth: http://kidshealth.org/parent/positive/talk/cyberbullying.html#
Dhaurn Ravi. (2012, 06 21). Retrieved 12 12, 2012, from The New York Times: http://topics.nytimes.com/top/reference/timestopics/people/r/dharun_ravi/index.html
Koebler, J. (2011, 06 03). Cyber Bullying Growing More Malicious, Experts Say. Retrieved 12 21, 2012, from US NEWS: http://www.usnews.com/education/blogs/high-school-notes/2011/06/03/cyber-bullying-growing-more-malicious-experts-say
Ng, C. (2012, 10 12). Bullied Teen Leaves Behind Chilling YouTube Video. Retrieved 12 21, 2012, from ABC NEWS: http://abcnews.go.com/International/bullied-teen-amanda-todd-leaves-chilling-youtube-video/story?id=17463266#.UNSkTHedzRh
Patchin, S. H. (2012, November). State Cyber-bullying Laws. Retrieved 12 21, 2012, from Cyber-bullying.us: http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf
Robert W. Taylor, E. J. (2011). Digital Crime and Digital Terrorism. Upper Saddle River: Perason/Prentice Hall.
Roome, D. (2011, July 12). Retrieved 12 21, 2012, from http://suite101.com/article/what-is-cyber-bullying-and-stalking-a379505
Veenstra, S. (2009). Cyber-bullying: an explanatory analysis. Retrieved 12 21, 2012, from http://www.cyren-jeugd.nl/files/Veenstra,%20S.%20%282011%29%20Cyberbullying%20-%20an%20explanatory%20analysis.pdf