FireEye Cyber Security Essay Paper Assignment

FireEye Cyber Security
              FireEye Cyber Security

FireEye Cyber Security

Order Instructions:

see attached file
DAY TO DAY OPERATIONS OF INFORMATION SECURITY FIRMS

THE SECOND TAB IN THE EXCEL SPREADSHEET

SAMPLE ANSWER

FireEye Cyber Security

Introduction and Background

FireEye Cyber Security is an information technology security firm that deals in combating advanced persistent threats; providing security that is far beyond the usual firewalls, antivirus and sandbox tools. FireEye assists over 2,200 organizations in 60 countries in storage, protection and management of vital information. The company’s vision is to ensure that the clients’ most valuable information is protected and runs by the mantle ‘Security Reimagined’. FireEye aims at investing in the best technology to detect and fix malware; in such a way that its innovation strategies are as quick as attackers.

The main activities at FireEye include information technology security, aimed at protecting clients’ data from malicious possession including hacking; protection from cyber attacks; resolving data security issues; information technology risk assessment; debugging of information systems; data back up; and installation and provision of technical support for information security systems.

Process flows

On typical day, engineers at FireEye spend their day doing surveillance on client systems to detect any bugs, threats, potential attacks and hacks on client data. The aim is to move from ‘alert to fix’ in the shortest time possible through timely detection, analysis and threat elimination. Brewer (2015) notes that in the current in the face of rising cyber criminal activities, companies providing data security services should aim at reducing the time period between detection and response to reduce damage; an aspect that FireEye uses to maintain its current niche in the market. The figure below is an illustration of FireEye’s approach to managing IT security.

Once a threat has been detected, the team goes ahead to launch an investigation and eventually clear the threat to save the clients data. A flow chart showing how an information breach is addressed is shown by the diagram below:

The process begins by detection of an incident, followed by a notification to the owner.  The team then goes ahead to investigate whether to quarantine the hosts that have been compromised. In the event that the hosts are in the white list, the team requests the system owner to contain the incident using predesigned plans. The incident handler then goes on to recover the data once it has been identified not to be of high criticality. Data with high criticality and restricted data have to go through the critical incident response; a process that involves a series of investigations and corrective measures including confiscation of hardware, up to the point where data breach is confirmed. The critical incidence flow is illustrated as follows:

Besides solving data breach issues, employees at FireEye must ensure that the clients’ needs are addressed as far as information management is concerned. Activities at FireEye on a day to day basis can therefore be summarized as follows:

  1. Risk assessment and tactical planning to ensure protection of data
  2. Evaluation of system bug reports
  3. Incidence preparedness including initial set up of systems to support security of information such as virus detection systems, software licenses, content filtering systems and firewall among others
  4. Review of security exploit reports, system bug reports and security alerts in systems and mails
  5. Information security program management
  6. Management of projects meant to respond to unexpected breaches of information security.
  7. Provision of technical support and consultancy for clients on matters related to information security
  8. Email and data backup services

Responsibilities and Interfaces

FireEye’s activities are mostly executed by data handlers, who consist of engineers and IT specialists, under the authority of the chief technology officer. Data handlers can be considered the ‘ground men’, whose role is to capture all threat signals and re-direct them to the right channels to ensure they are resolved as soon as possible. The chief technology officer and chief information work together, to ensure continuous investment in research to promote the company’s ability to resolve data threats.

FireEye data handlers take attack notification as the input to begin investigating the process. The user and the system are at the same time prompted to manage process execution by checking the possibility of dealing with the attack using the installed security programs. The system at this juncture may invoke external applications and other predesigned programs with the possibility of blocking the attack. The data handlers and chief information officer continue to monitor the process to establish the need for further action if the attack is not automatically managed by the system. These interfaces are outlined in the diagram as below:

Equipment and logistics

Being a service company, FireEye interacts directly with customers and therefore employs over 2000 staff to ensure that the needs of clients are well addressed. The company does not advocate for outsourcing because the management believes in providing first hand service to clients and thus assure quality service delivery. This philosophy can be explained by Parliament of Australia (2015), who notes that the use of intermediaries in the service sector to a large extent distort the quality of service, hence the relevance of direct service.

Servers and computers remain the most equipment in managing IT security. Servers can be described as computers whose primary role is to provide a location for shared storage. A single server can connect several computers in a network, allowing authorized persons to access available information. FireEye’s high capacity servers ensure that data handlers, IT security manages and other IT security staff can access client files and thus easily detect and correct any attacks on data.

FireEye has invested in both cable and wireless internet to ensure that data is always accessible when needed and that attacks can be remotely accessed at any time. The company also ensures that the clients have reliable internet connection as this helps in sending signals to FireEye’s server whenever there is an information threat on their side (Castelluccio, 2015). In consideration of how important internet connection is, FireEye has a team of engineers whose role is to ensure that all servers and rooters are connected and that any mishap disconnection is addressed immediately before it can compromise client data.

Quality control

In a field that is highly competitive, quality assurance cannot be underestimated (Sherry, 2014). In this regard, FireEye seek to maintain the highest possible standards through investing in the most current technology. FireEye aims at providing clients with the best value for their money and thus constantly engages in research to identify new trends in information technology management. FireEye has invested in winning technologies to ensure that threats are detected and blocked in a matter of minutes. Engineers and IT specialists are trained to be vigilant and move in the same speed or even faster than attackers to ensure that they can manage any kind of new threat. This to a large extent reduces the need to physically deal with the malware or visit client offices, except during installation; thus saving time and increasing customer satisfaction. Borrett, Carter and Wespi (2013) notes that investing in innovative technology should be the main concern for IT security companies that seek to succeed and FireEye has been successful in achieving this. Sherry (2014) further maintains that organizations must now be vigilant in identifying new threat intelligence to promote detection of  cyber threats.

References

Borrett, M., Carter, R., & Wespi, A. (2013). How is cyber threat evolving and what do organisations need to consider? Journal of Business Continuity & Emergency Planning, 7(2), 163-171. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=d0818f10-b671-44bf-9e03-6e37c54a7683%40sessionmgr4002&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=94779805&db=bth

Brewer, R. (2015). Cyber threats: reducing the time to detection and response. Network Security, 2015(5), 5-8. doi:10.1016/S1353-4858(15)30037-4. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=668fa877-1bd4-479a-9453-7df590d4da7a%40sessionmgr4004&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bth&AN=102880763

Castelluccio, M. (2015). Emerging Cyber Threats. Strategic Finance, 97(4), 55-56. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=8eb5bc86-174b-4c03-b883-dc7e26044cd0%40sessionmgr4004&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=101901017&db=bth

Parliament of Australia. (2015). Outsourcing for and against. Retrieved on September 8, 2015 from http://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/Publications_Archive/CIB/cib0001/01CIB18

Sherry, J. D. (2014). How Can Threat Intelligence Help the Battle Against Cyber Attacks. Financial Executive, 30(4), 93-94. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=e340779d-e268-40c7-965c-bf4b50e5366e%40sessionmgr4001&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=99862939&db=bth

Wang, S., Liu, J., Shon, T., Vaidya, B., & Chen, Y. (2015). Security and privacy information technologies and applications for wireless pervasive computing environments. Information Sciences, 321147-149. doi:10.1016/j.ins.2015.07.037

We can write this or a similar paper for you! Simply fill the order form!

Removing personal information of prospective employees

Removing personal information of prospective employees
Removing personal information of prospective employees

Pros and cons of removing personal information of prospective employees

Order Instructions:

Identify the pros and cons of removing personal information, such as age, gender, ethnic origin, and family or marital circumstances, prior to the screening and shortlisting of applicants for employment. Take a position for either removing or retaining such information.

SAMPLE ANSWER

Introduction

It is critical to mention that one of an essential human resource management practices is staffing. According to sources, the functions of management involve the prospect of retaining an organization’s structure through an accurate selection, appraisal and development of the human labour meant to fill the roles required within a work environment (Baert, Cockx, Gheyle, & Vandamme, pp. 467-500. 2015). In this case, the process of staffing involves an appropriately structured recruitment, selection, development and compensation of the workers within an organization.

Additionally, human capital remains an essential element in the growth of an employing organization since it offers the workers the opportunity to exercise their collective skills, abilities and competencies that would spur the organization to gain successfully a competitive advantage (Baert, et.al). The recruitment process at times become a challenging experience to the recruiters since it becomes difficult to determine the best choice of staff to recruit and how to go about the process. This paper, therefore, seeks to synthesize the pros and cons of neglecting personal information of an applicant during the process of screening for employment.

Pros and cons of removing personal information

The selection process remains a critical aspect of the staffing function of an organization. An ineffective selection has the capacity to affect the decisions of the hiring and placement of workers within an organization (Corell, Benard & Paik, pp.1297-1338.2007). Staffing, therefore, involves an approach geared towards placing the right men and women at the good job. This process can, therefore, be effectuated through a thorough recruitment approach that determines the best suitable candidate for a position.

Pros

During the selection process, there are some biases that need to be avoided. The removal of personal information remains an essential element in reducing or eliminating discrimination prior to the short listing and recruitment process. Sources reveal that several incidences of discrimination have been noted in recruitment processes where people are judged based on their nationality/ethnicity, gender, disability and equality in authority (Corell, et.al).

These factors clearly depict the fact that removing personal information prior to the short listing and recruitment process will maintain the processes equality, a factor that clearly spells out that fact that all the applicants will be treated fairly, with the best taking the job irrespective of their ethnicity, gender, social status (Corell, et.al). These factors are known to stereotype several recruitment processes thus removing personal information prior to the process of recruitment ensures equality in recruitment.

Cons

Some schools of thought allege that the recruitment process should not only rely on how the applicants are recruited but who fits a job position for selection. The primary idea in this remains the fact that applicants should be in their right mental, physical and psychological state for the positions declared vacant within an organization (Corell, et.al). An instance of this can be determined by the fact that certain jobs require men as compared to women. Women are known to fit in particular job positions since they have not the strength needed to handle some jobs. Men, on the other hand, are better placed in carrying out hard labour such as building houses, drilling, and driving trucks.

In support to this, some particular cultures impact the nature of jobs that both these sexes should partake. An instance of this is a case of Saudi Arabia where men are not allowed to engage in the sales of female lingerie. It is through this that the removal of an applicant’s personal information prior to the process of short listing and recruitment may result in the hiring of wrong personnel (Corell, et.al). It is also essential to determine where an applicant comes from, their gender, physical conditions among other factors that can assist in the process of recruitment. This information’s remain pertinent in ensuring that the personnel’s hired are suitable for the job thus removing them would give the Human Resource functions difficult in determining the appropriate employees.

My Stand in either Removing or Retaining such Information

According to the findings stated in this analysis, it is essential that the applicants detail their personal information in their applications to aid the recruiters with the right information during the process of recruitment (Fratričová, & Rudy, pp. 149-155.2015). Employers should, therefore, request for this information since the hiring of wrong applicants may lead the organization into incompetency, a factor that would affect its production immensely.

From an experience I have personally had, there are several factors that are required to get a job with a government institution. The recruiting agencies need to ensure if an applicant is of the right age and has the capacity to perform the duties delegated appropriately (Fratričová, & Rudy, pp. 149-155.2015). The government has also set a retirement age bracket, a factor that typically requires an individual’s personal information. In an incidence where the personal information is removed, the recruiters are more likely to recruit the wrong personnel to fill the job positions.

Conclusion

According to the findings detailed in this research it is critical to note that the removal of an applicant’s personal information during the recruitment and selection process has several adverse impacts that may affect the operations of a company. It is therefore essential to determine that an applicant’s personal information should be included during the process of recruitment.

References List

Baert, S, Cockx, B, Gheyle, N, & Vandamme, C 2015, ‘Is There Less Discrimination in Occupations Where Recruitment Is Difficult?’, Industrial & Labor Relations Review, 68, 3, pp. 467-500, Business Source Complete, EBSCOhost, viewed 3 September 2015.

Corell, S.J., S. Benard and I. Paik, 2007. “Getting a Job: Is There a Motherhood Penalty?”, American Journal of Sociology, Vol. 112, No. 5, pp.1297-1338.

Fratričová, J, & Rudy, J 2015, ‘Get Strategic Human Resource Management Really Strategic: Strategic HRM in Practice’, International Journal Of Management Cases, 17, 4, pp. 149-155, Business Source Complete, EBSCOhost, viewed 3 September 2015.

We can write this or a similar paper for you! Simply fill the order form!

Effects of China Growth to US Security in Asia Pacific

Effects of China Growth to US Security in Asia Pacific Growth of China intimidates United States security in the Asia-Pacific Order Instructions: Essay Structure

Effects of China Growth to US Security in Asia Pacific
Effects of China Growth to US Security in Asia Pacific

Make sure the essay introduction has a thesis statement – one sentence that tells the reader the core argument of the essay. It is highly recommended that you start your essay as follows: “This essay argues that …” The introduction also needs to tell the reader the main points you will make in the body of your essay in support of your thesis.

Ensure that the body of the essay addresses each main point in the order listed in the introduction. Your argument is easier to follow if each paragraph deals with a single idea or aspect of the topic. Each paragraph should have a topic sentence that tells the reader what the paragraph is about – usually the first sentence. The rest of the paragraph must prove the claim made in the paragraph topic sentence using references and examples.

The essay conclusion re-states your thesis and summarises the main points referred to in the introduction and discussed in detail in the body of the essay. No new material should be included in the conclusion.

Direct quotes should not exceed 10% of the essay word allowance.

Do not use headings.

Ensure the full essay question is included in the essay document.

For presentation, use a 12-point font and 1.5 or double line spacing.

All documents must be submitted in Microsoft Word format. We are unable to electronically mark documents in other formats.

Include your name in the document name. To avoid problems submitting the assessment, keep the document name concise.

Effects of China Growth to US Security in Asia Pacific Referencing

A minimum of six sources must be included in the reference list. This is an academic essay so references should be from quality peer reviewed academic sources. I strongly recommend you use the Murdoch Library catalogue and databases to locate suitable online sources.

The required referencing style in this unit is the Chicago style of in-text (or author-date) referencing. Otherwise well-written and argued essays are often unnecessarily let down by a failure to adequately reference.

Effects of China Growth to US Security in Asia Pacific Sample Answer

Growth of China intimidates United States security in the Asia-Pacific

This essay argues that the ongoing rise of China’s economy and the present reconstruction and build up of its army has become a root of open challenge for the United States[1]. For reasons entrenched in history, presently, and future distribution of international power, the US places a superior priority on administering security issues in the Asia-Pacific region. Disagreement on the Korean neck of land would have long term and extensive impacts for the region and the US and its associates[2]. While disagreements in the South and East Seas seem to be controllable, tensions are liable to be component of the security backdrop for the near future. In spite of the multitude of multifaceted challenges, environmental, economic, institutional and so on, the security matter that is lurking on top of the security outline of regional powers if the rise of China and the possible role of the US in the Asia-Pacific[3].

The US presumed a heavy responsibility as the chief underwriters of peace and security in the region. American’s tactical approach to the Asia-Pacific expanse mirrored maritime Britain’s focal point on conserving a continental stability of power. After the Second World War and the end of the almost forty years of Chinese Civil War, the US legalized a strategy modeled to refute any power from controlling the huge Eurasian mainland[4]. In identifying prosperity and stability all through most of the Asian-Pacific region as a crucial American interest, the country helped in catalyzing the region’s ensuing impressive political and economic development. However, it was tactical self-interest that secured US policy.

The rising authority of China in global associations and a continuing move towards superior power rank have caused apprehension to the level that, how to handle China is the dilemma of this new century[5]. Just recently, a certain ‘China threat’ hypothesis appeared in world politics, and after many years, the debate is still going on. A number of predictions have been introduced about China, but till now, none of them has materialized. The communist heads are still administering the country, the Chinese economy is still rising, and no bordering nation has been attacked. The Asian-Pacific region has not been weakened by a forceful China[6]. All these immaterialized predictions stress the Instability of the best thinking in the arena of world politics, and the inevitability of their constant revision and the negation to get locked in unwavering truths. It is once again confirmed that the evaluation of international politics ought to be freed from system of belief.

The United States see’s the rise of Chinese economy as potential for a powerful nationalism that will advocate for aggression, xenophobia, and revenge. Without refuting the presence of a China threat, the global community has more to worry about for global and regional security from a fragile and disintegrating China, than from a tough and powerful one[7].

Other potential threats include China’s rural crisis, food crisis, environment crisis, population, and resources crisis. United States sees these numerous crises as a potential for making the China a huge burden to the whole world. The rationale is that Chinese economy should not rise otherwise the world will incur shortages of resources, food, and damage to the environment.

China facades a threat to the US at it differs hugely from it in life style, cultural traditions, and value concepts. War is inescapable between China and the US. China’s objective of accomplishing dominant status in Asia-Pacific region conflicts with a pre-determined American goal which is to prevent any country from attaining overpowering power in Asia. The US, after all, has been in main warfare’s in Asia in the last half century in attempt to safeguard a single country from attaining ascendancy even though it was at the expense of decreasing American military status.

Given the truth that over the next ten years or so China will become an overriding power in Asia, divergence with the United States could take place over numerous issues, headed by a Chinese effort to get hold of Taiwan forcefully or to resolve my martial means its regional claims in the South China Sea[8]. China’s political and technological help to the Islamic nations of North Africa and Central Asia, and its looming supremacy in East Asia put it at the core of a casual network of states, most of which have philosophies and goals inimical to the US, and most of which share China’s rationale of objection at the long international supremacy of the West.

Effects of China Growth to US Security in Asia Pacific Conclusion

The rise of China has posed a threat on United States in the Asian-Pacific. This is because the United States feels that the Chinese rise will make it become a global burden. Besides, Chinese rise will possibly bring about aggression and xenophobia against other powers. In addition, this rise will also promote scarcity of resources to the rest of the world.

Effects of China Growth to US Security in Asia Pacific Bibliography

Bisley, Nick. Asia’s transformation, international relations and public policy. Australian Journal of International Affairs. Published online: 15 Jan 2011.

DEREK, SCISSORS. The Great China Debate.Will Beijing Rule the World?

Ikenberry, G. John. American hegemony and East Asian order. Australian Journal of InternationalAffairs. Published online: 27 Sep 2010.

Jeffery, Renée. Evaluating the ‘China threat’: power transition theory, the successor-state image and the dangers of historical analogies. Australian Journal of International Affairs. Published online: 26 Jun 2009.

Power shift. Malcolm Turnbull on Hugh White’s The China Choice. The monthly — august  2012.

Tang, Xiaosong. The future role of the United States in the Asia-Pacific region: dead end or crossroads? Australian Journal of International Affairs. Published online: 06 Jul 2011.

White, Hugh. Power shift: rethinking Australia’s place in the Asian century. Australian Journal of International Affairs. Published online: 15 Jan 2011.

 

[1] Jeffery, Renée. Evaluating the ‘China threat’: power transition theory, the successor-state image and the dangers of historical analogies. Australian Journal of International

Affairs. Published online: 26 Jun 2009.

[2] Bisley, Nick. Asia’s transformation, international relations and public policy. Australian Journal of International Affairs. Published online: 15 Jan 2011.

[3] Tang, Xiaosong. The future role of the United States in the Asia-Pacific region: dead end or crossroads? Australian Journal of International Affairs. Published online: 06 Jul 2011.

[4] White, Hugh. Power shift: rethinking Australia’s place in the Asian century. Australian Journal of International Affairs. Published online: 15 Jan 2011.

[5] DEREK, SCISSORS. The Great China Debate.Will Beijing Rule the World?

[6] Ikenberry, G. John. American hegemony and East Asian order. Australian Journal of InternationalAffairs. Published online: 27 Sep 2010.

[7] Power shift. Malcolm Turnbull on Hugh White’s The China Choice. The monthly — august  2012.

[8] Power shift. Malcolm Turnbull on Hugh White’s The China Choice. The monthly — august  2012.

 

Homeland Security Research Assignment Available

Homeland Security
Homeland Security

Using your Module 4 written activity as a basis, as well as any other knowledge you have regarding critical thinking models, and construct what you believe to be the “best” critical thinking model that could be used in homeland security.

Discuss how that critical thinking model could be used in support of homeland security, using one historical event that might have been prevented or
mitigated by using this model. The event should be something that occurred in the past 20 years and may relate to international or domestic security. Also
reference any fallacies of logic you found (including poor statistics) that influenced decisions (or non-actions) regarding this event. Your paper should be
8 – 10 pages in length, using APA style.

We can write this or a similar paper for you! Simply fill the order form!

Best practices for Network Security Assignment

Best practices for Network Security
Best practices for Network Security

Best practices for Network Security

The key to the research assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Constant site reference is a no go.Use these sites if possible

Use at least three (3) quality references Note: Wikipedia and other related websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Informative speech on Social Security

Informative speech on Social Security
Informative speech on Social Security

Informative speech on Social Security

Order Instructions:

Informative speech on Social Security

Informative Speech. In this speech your goal is to inform your audience as to the details of the topic suggestion below. Being an Informative Speech you are not asked to discuss the merits of the program. Your task, as is consistent with an informative speech, is to provide your audience the details (information) as to the proposed topic below:
Social Security is a debated topic in every Presidential Election and one gaining increasing attention as more and more baby boomers retire. For this speech students should research the history and functioning of the current Social Security System. From this research you are to present an informative speech on Social Security. Topics may include: A brief history of the social security system; how to apply for benefits and how one qualifies; the pros and cons of delaying benefits; how to afford to live off of the benefits received from Social Security; strategies to adopt while you are young to be able to afford to retire . . .
Also require an outline in the following format:

Sample Speech Outline
Title of Speech
Purpose: (Your purpose for this speech)
Thesis: (Main Argument that will be covered)
I. Introduction
A. Greeting your audience (simple greeting will suffice)
B. Attention grabber (should inflict emotion or raised attention)
C. Credibility statement (why you should be trusted?)
D. Thesis statement (a sentence detailing the subject that will be provided in speech)
E. Preview of main points (what the main points are that you will go over)
Transition (signals the transition from the introduction to the body)
II. Body
A. Main point 1 (Detail the first main point)
1. Subordinate point (Detail any subordinate points if necessary)
a. Support (any supporting documents or evidence)
b. Support (any supporting documents or evidence)
2. Subordinate point (Detail any subordinate points if necessary)
a. Support (any supporting documents or evidence)
b. Support (any supporting documents or evidence)
Transition (signals the transition from the first main point to the second main point)

B. Main point 2 (Detail the second main point)
1. Subordinate point (Detail any subordinate points if necessary)
a. Support (any supporting documents or evidence)
b. Support (any supporting documents or evidence)
2. Subordinate point (Detail any subordinate points if necessary)
a. Support (any supporting documents or evidence)
b. Support (any supporting documents or evidence)
Transition (signals the transition from the second main point to the third main point)

C. Main point 3 (Detail the third main point)
1. Subordinate point (Detail any subordinate points if necessary)
a. Support (any supporting documents or evidence)
b. Support (any supporting documents or evidence)
2. Subordinate point (Detail any subordinate points if necessary)
a. Support (any supporting documents or evidence)
b. Support (any supporting documents or evidence)
Transition (signals the transition from the body to the conclusion)

III. Conclusion
A. Signal closing (signal that you are concluding your speech)
B. Restate thesis (restate your thesis statement from earlier)
C. Review main points (briefly go back over all of your main points)
1. Main point 1 (briefly restate main points)
2. Main point 2
3. Main point 2
D. Memorable statement or call for action (your final statement to the audience)
E. Thank the audience for listening (a simple thank you for your time will suffice)

SAMPLE ANSWER

Speech Outline

  1. Introduction
  2. My fellow Americans, I salute you all.
  3. Of late, there have been a lot of discussions regarding Social Security.
  4. I have a lot of experience in this subject.
  5. I’m going to give you some information about the history and the current function of the Social Security System.
  6. Brief history about Social Security in the United States, how to apply for benefits, and how one qualifies for such benefits from the program.
  7. Body
  8. The origin of social insurance has its foundation on economic security.
  9. Throughout human history, societies have strived to deal with this problem through various approaches.
  10. The importance of social insurance was realized more after the Industrial Revolution.
  11. Most Americans lived on their land and their life expectancy was short.
  12. As a result of the Industrial Revolution, the life expectancy for most Americans increased.
  13. This was because of the improvement in health care.
  14. The Social Security was eventually started in America during the Franklin Roosevelt presidency when the Social Security Act of 1935 was enacted.
  15. Not everyone is qualified to receive Social Security Benefits.
  16. An income of at least 40 quarterly credits is required for one to qualify.
  17. One credit is gained by a worker after earring at least $900 in a period of three months.
  18. During this period, Social Security taxes have to be paid on that amount.
  19. The amount of income that one requires to earn a credit changes annually.
  20. This never affects the credits already earned.
  21. When a worker earns 40 credits, he permanently qualifies for the Social Security benefits.
  22. To afford living off on the benefits received from Social Security, it is imperative to ensure that you start paying for the Social Security early enough.
  23. This will also imply that you will have more benefits later.
  24. Calculation is done on the basis of the number of years you have worked.
  25. As such, you should avoid asking for early retirements because the benefits will not be enough to sustain you.
  26. Paying Social Security taxes when young is vital.
  27. This is one of the strategies to ensure you get enough benefits.
  28. Such benefits will sustain you after retirement.
  • Conclusion
  1. To sum up, the introduction of Social Security in the US was a positive move.
  2. The history and the current function of Social Security are essential as they make us understand how the program came into existence.
  3. Review of the main points.
  4. Social Security was started after the Industrial Revolution.
  5. Workers need to accumulate credits to qualify for benefits.
  6. It is important for us to start saving early to have enough benefits when we retire.
  7. I strongly believe that you now have a better understanding of Social Security and how it operates.
  8. Thank you very much for your attention and may God bless you.

We can write this or a similar paper for you! Simply fill the order form!

Policemen of the World Thesis and Outline

Policemen of the World
Policemen of the World

Policemen of the World Thesis and Outline

Order Instructions:

Assignment 2.1: Policemen of the World Thesis and Outline
Due Week 7 and worth 70 points
After the Civil War and by the mid-20th century, the United States had become the dominant force in international relations. Some have argued that the United States’ military functions as the world’s “police.” This assignment covers the manner in which this shift occurred and the consequences the United States faces as a result of its status as “policemen of the world.” Using the Internet, research two (2) real-life international incidents from the past five (5) years in which:
• The U.S. used military action abroad.

• Controversy existed within the American public regarding U.S. involvement.

• Controversy existed within the country or countries affected by U.S. involvement.
For the first part of this assignment you will create a thesis statement. A thesis statement is usually a single sentence somewhere in your first paragraph that presents your main idea to the reader. The body of the essay organizes the material you gather and present in support of your main idea. Keep in mind that a thesis is an interpretation of a question or subject, not the subject itself. (Note: Please consult the Purdue OWL Website with tips on how to construct a proper thesis; the website can be found at: https://owl.english.purdue.edu/owl/resource/545/01/
For the next part of this assignment you will create an outline of the main points you want to address in this paper. This will serve as the basis for your Assignment 2.2 Final Draft. (Note: Please use the Purdue Owl Website to assist you with this assignment; this website can be accessed at: https://owl.english.purdue.edu/engagement/2/2/55/

Part 1
1. Write a thesis statement that is one to two (1-2) sentences long in which you:
1. State your opinion on the significance of the two (2) real-life international incidents that you have researched. Justify your response.

Part 2
2. Write a one to two (1-2) page outline in which you:
1. Determine two to three (2-3) international events from the past five years that can be traced back to a foreign policy created after the Civil War.
2. List three (3) aspects of US history since 1865 that has led to the US’s rise as a world super power policeman.
3. List three to five (3-5) international incidents since World War II where America has taken on a policing role.
4. List three to five (3-5) driving forces that fueled international policy decisions involving the international incidents you outlined previously. (Consider treaties, exit strategies, elections, wars, etc.)
5. Use at least three (3) quality references. Note: Wikipedia and other Websites do not quality as academic resources.

Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Identify and discuss the different ways that the Civil War, Reconstruction, and Industrialization after the Civil War have shaped America’s history.

• Summarize and discuss the ways that formal policies of government have influenced the direction of historical and social development in the United States.

• Recognize the major turning points in American history since the Civil War.

• Use technology and information resources to research issues in contemporary U.S. history.

• Write clearly and concisely about contemporary U.S. history using proper writing mechanics.
Click here to view the grading rubric.

SAMPLE ANSWER

Introduction 

The United States is known to be watching all the countries of the world, a role that is termed as the policemen role. There are many operations that the American police have constantly been involved in their amending with the interest of promoting the states national interest of remaining as a world super power. The United States government has encountered a lot of controversies that were as a result of their military operation that took place both in the country and abroad. The United States military action as the world police is a success but it has always become an issue of controversy both within and outside their country.

Outline

  1. Three International Events from the past five years that can be traced back to a foreign policy created after the Civil War
  2. Three Aspects of U.S. history since 1865 that has led to the U.S.’s rise as a world super power police
  • Five ways international incidents since World War II where American has taken on a policing role.
  1. Five driving forces that fueled international policy decisions involving the international incidents you outlined previously (consider treaties, exit strategies, elections, wars, etc.)

Recently, the United States also used military action abroad in Somalia when they were attacking the Al-Shaabab terrorist. This is a terrorist outfit in East Africa that also has links with Al-Qaeda. The Pakistan government became furious with the American leadership of their role in meddling with their internal affairs without their involvement especially in the killing of the Osama bin laden who was under the protection of the Pakistan government. According to (Herring, 2011) the Pakistan government, felt rejected by the Americans who penetrated their territory in search to kill the most wanted criminal of the world without even seeking their consent to carry out such an operation. This was because; the Pakistan government saw it as against the international laws to penetrate their territories so deeply and inconspicuously without even seeking their permission to do so. The Americans being the biggest policemen of the world attacked Osama contrary to the Pakistan military expectations who were caught off guard despite them being amongst the best trained in the Middle East region. The act of the American policemen proved that Pakistan military failure in their intelligence following such a shocking raid which they could not stop it. The Ukraine government wanted all its citizens who were in other countries and voted for the former president living in Russia to be killed, hence, the US government had to intervene so as to stop the massacre from taking place. The US government wanted also to stop the fake Ebola flag epidemic that was said to be taking place in the country.

After the civil war, there was a high growth of industries whereby, this led to US emerging as the best industrialized country and at the same time it became the super policeman of the world. The Americans politics are at a high level and this has made the United States to emerge as the super policeman of the world. The state has advantageous geographical position, high population enough to defend its territory, government with the influence and inclination to dominate the sea territory, have a society with aptitude for the sea, commercial enterprise and an extent of territory (Herring, 2011). This makes the state to be geopolitically positioned which is a factor to it being the world’s biggest super power. The United States was the strong hold of the Christianity, a factor which made it to be termed as the greatest policemen of the world having led in the Christian faith.

The United States government encountered a lot of policemen action that made them to be a super policemen power. According to Brian (2008), there was the evidence of tussle in the Obama government and even the European government over Libya in the attempt to oust the Libyan strongman. Therefore, the American president had to read the public mood before the use of military force in a case like this which had to take place outside the country. Harold Koh worked hard to defend the Obamas administration deployment of the operation that was carried out by the military in Libya since he was the legal state adviser of the state defense department. The adviser argued that the states operations did not warrant sixty-day withdrawal rule as suggested by opponents of the same move since Libya did not encounter a lot of hostilities. The Americans have been the superpower policemen of the world since the second world war, since they took the policing role in the gulf war by establishing stability in that region. The American government has recently taken a big role in Arab springs to ensure that dictator are prevented from using civilians like in the case of Syria or even removed from power. The Americans being the super power police of the world they normally watch the election process all over the world to know how the process is carried out (EngeLhardt, 2014). The crisis in Syria brought a lot of controversy on the American role as the global policeman. The Obama administration was determined to act and end the reckless killing by the Al-Assad government on the civilians by the use of weapons of mass destruction. However, most Americans were not comfortable with military action against Syria and this put the Obama administration on a very complicated situation. Therefore, in order to avert the controversy, the American government entered into a treaty with Russia to help destroy the Syrian weapons of mass destruction. The tussle between the Crimea and Russia also put the Americans of the tight rope as the policeman of the world. The Americans were determined to end the conflict in that region but some members of the American public and leadership were unconformable with such a move.

In the US military driving force there was the involvement of the Iraq and Syria who fought and dissolved the global terrorist by sending 750 military Special Forces. The fight of the Ebola epidemic in the West Africa made the Obama administration to be termed as the policemen of the world since they really fought to stop the epidemic (Brian, 2008). When the Syrian government violated the international rules by deciding to use the chemical weapons, the US government intervened to ensure the weapons were not made as planned since they are the world super power. When Qaddafi violated human rights in Syria, the US government intervened to help promote a future built on foundation of dignity, freedom and opportunity to all citizens in the country. The US has really been committed to the reduction of nuclear weapons as well as nuclear materials which are highly dangerous to human life.

Due to their superpower position, the united states have positioned themselves as the policeman of the world by watching and intervening in any injustice that takes place in all the corners of the world. The ouster of Muammar Gadhafi, the conflict in Syria, the killing of Osama bin Laden, the tussle between Crimea and Russia are some of the events in the past five years that have demonstrated their global policing role. However, this comes with challenges due to criticism from their citizens as well as other foreign countries.

References

Brian, M. (2008).Woodrow Wilson: United States of America: Makers of the Modern World. Haus Publishing

EngeLhardt, T. (2014).Shadow Government: Surveillance, Secret Wars, and a Global Security State in a Single-Superpower World. Haymarket Books.

Herring, G.C. (2011).From Colony to Superpower: U.S. Foreign Relations since 1776 (Oxford History of the United States).Oxford University Press; 1 edition

We can write this or a similar paper for you! Simply fill the order form!

Domestic Terrorism Essay Paper Available

Domestic Terrorism
Domestic Terrorism

Domestic Terrorism

Order Instructions:

Background:
1. You are the Principal the local Shining Star Elementary School. Your school contains 400 students and is part of a four-school cluster. Your cluster is part of a school district that contains over 100 schools from all levels.

2. You are the emergency manager for this county of over 300,000 people. Your position is to prepare the county for disasters in an area where the worst expected disaster is fire from storms or drought. Wind storms are the next worst expected disaster. Your county is surrounded by counties of equal or larger sizes in a larger city with a population of five million persons. Shining Star Elementary School is in your county.

3. You are the Mayor of a town within the county that contains the Shining Star Elementary School. The city police and fire department work for you.

4. You are the Chairman of the County Supervisors in the county that contains the Shining Star Elementary School. The county sheriff, fire department, health department, and county support offices work for you.

For the four positions you should have: Notified all local Law Enforcement agencies for assistance; established an Incident Command System; and isolated the area.

Scenario:
1. Fires have broken out in twenty-five (25) schools of the district.

2. The City Police and County Sheriff offices are destroyed by explosions.

3. The National Press demands immediate access to the Shining Path Elementary School and whoever is in charge.

4. The group in the Shining Path Elementary School demands all prisoners held in Guantanamo be released within twelve (12) hours or more students and teachers will be killed.

For each of the four positions explain what you would do and expect to happen in the scenario. Consider the following in each of your answers:
1. WHAT ASSETS DO YOU HAVE?
2. WHAT AGENCIES NEED TO BE INVOLVED?
3. WHO DO YOU NEED TO COORDINATE WITH?
4. WHAT ACTIONS CAN YOU TAKE?
5. WHAT NATIONAL AGENCIES SHOULD BE INVOLVED? WHO NOTIFIED THEM? WHAT ARE THEY DOING?

Length: This SLP Assignment should be at least 3 pages not counting the title page and references.

References: At least two references should be included from academic sources listed below(e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking).

Organization: Subheadings should be used to organize your paper according to question.

Required readings:

ATF Home Page, Bureau of Alcohol, Tobacco, Firearms, and Explosives website: Retrieved November 15, 2012, from: http://www.atf.gov/

Brinkerhoff, J.R. (2009). The role of Federal military forces in domestic law enforcement title. US Army Combined Arms Center, Newsletter 10(16), Ch. 11. Retrieved November 16, 2012, from: http://usacac.army.mil/cac2/call/docs/10-16/ch_11.asp

Cook, T. (2008). The Posse Comitatus Act: An act in need of a regulatory update. Retrieved November 15, 2012, from: http://www.hsdl.org/?view&doc=137185&coll=limited

Haddal, C. C. (2010). Border security: The role of the U.S. Border Patrol. Congressional Research Office. Retrieved November 15, 2012, from: http://www.fas.org/sgp/crs/homesec/RL32562.pdf

Vision, mission, core values, and pledge: CDC vision for the 21st Century (2010). Centers for Disease Control and Prevention. Retrieved November 15, 2012, from: http://www.cdc.gov/about/organization/mission.htm

SAMPLE ANSWER

Domestic Terrorism

Scenario One: Fires have broken out in twenty-five (25) schools of the district

The Shining Star Elementary School, being part of a four-school cluster, is relatively well prepared to deal with emergencies that could arise.  The same is true for all schools in the district since the standard set in the cluster is the same throughout the district.  All schools are equipped with fire fighting equipments including fire extinguishers and hydrants.  Additionally, each school has a fire marshal stationed in each school whose primary responsibility it to maintain fire disaster preparedness at all times, assess equipment adequacy and usability state and conduct emergency drills twice every school term.  With the reports coming from the respective Fire Marshalls, the disaster preparedness plan is activated immediately.  The plan indicates that in the case of a fire, all students after evacuating the premises are to meet at pre designated points for roll-call to determine who is missing.

As the Principal of one of the schools facing a fire disaster, one has to place a call to the local fire department.  It will be the responsibility of the local Fire Chief to escalate the incidence after determining its dynamics.  It is expected that among the agencies that will respond to this disaster will include, the National Emergency Management Authority (NEMA).  Given the multiple locations of the fire disasters, the district fire marshal will take overall responsibility of coordinating all activities and thus becomes the go-to person in case of a need.

As a principal, the immediate action to engage in is to have all students evacuate the premises and assemble at the assembly points for roll call.  It is at this point that medical needs will be identified and addressed, while missing students will be known and sort.  Given the scale and spread of the fire, NEMA should be involved.  Forensic scientists should be involved in order to determine the causes of the fire.  The national agencies will be notified and invited by the person in-charge of emergencies in the district (Schmid, 2011).

Scenario Two: The City Police and County Sheriff offices are destroyed by explosions

As the emergency manager of the county, the destruction of the City Police and the County Sherriff office makes this an invasion that affects the core of emergency response in the county.  As a result, county resources cannot longer be relied upon to attend to the emerging emergency.  Given that the cause of the explosion is not immediately evident; the emergency manager places a call to the State Governor requesting for federal assistance.  The Governor will place a call to the President of the Country for federal assistance.  This calls set the ground for the deployment of the National Guard – to take care of the enforcement of Law and Order, allocation of Federal resources to assist with the local emergency, deployment of the FBI whose explosives experts should help the cause of the explosive (Haddal, 2010).  This revelation will determine the next cause of action.  Should it be determined to have been caused by deliberate human action, then criminal investigation will commence immediately.  Should the explosion have been caused by natural causes, the reconstruction will commence immediately.

Scenario Three: The National Press demands immediate access to the Shining Star Elementary School and whoever is in charge

The Mayor of a town within the county that contains the Shining Star Elementary School and with command of both the police and fire department, has a responsibility to shield both  forces from the prying eyes of the National Press, who can be uncivil in their quest to get the story.  This being the case, all information will be shared from one central source – the mayor’s office.  Since there are different disaster locations, instructions will be issued to seal-off all the locations and no one apart from authorized personnel should access the sites (Ciment, 2011).  Additionally, no emergency worker should talk to the press and all press interactions will be left to the mayor or to whoever the responsibility is designated.  As the mayor, a call will be placed to the State Governor for assistance and it is expected that the Governor will in turn place a call to the President seeking Federal aid.

Scenario One: The group in the Shining Path Elementary School demands all prisoners held in Guantanamo be released within twelve (12) hours or more students and teachers will be killed

With the demand coming from the Shining Star Elementary School, it is clear that this is no longer a local problem but has taken on an international dimension.  Despite being the Chairman of the County Supervisors with the power to command all the county emergency resources, the situation at Shining Star Elementary School is much bigger and complicated that the local resources are designed to cope with.  Given that the situation has clearly degenerated to a terrorism stand-off with demands that border the life or death of the hostages – who include student and teachers, immediately, both the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) will be called to the scene and left to determine between the two federal agencies, who will take the lead role (Brinkerhoff, 2009).  Additionally, depending on the lead agency, Special Weapons And Tactics (SWAT) teams will be brought into the scene with the clear instruction to prepare for both soft and hard assault of the target and what each plan will entail – both in terms of personnel and possible casualties.  Given the epicenter of the action will be at the Shining Elementary School and the publicity generated nationally, after sealing off the school building where the terrorists are, the National Press, will be set up in the playing field with regular briefing being held in pavilion.  This should keep the national press and briefing personnel safe while keeping them within the vicinity of the epicenter.  Before the federal agencies arrive to take over the situation, the local hostage negotiator will be in-charge off all communication with the captors in an effort to ensure no life is lost while the scene is still under the command of the local agencies.

References        

Brinkerhoff, J.R. (2009). The role of Federal military forces in domestic law enforcement title. US Army Combined Arms Center, Newsletter 10(16), Ch. 11 Retrieved November 16, 2012, from: http://usacac.army.mil/cac2/call/docs/10-16/ch_11.asp

Ciment, J (2011).  World Terrorism: An Encyclopedia of Political Violence from Ancient Times to the Post 9/11 Era, 2nd Ed, Sharpe Publishers, Armonk, NY.

Haddal, C. C. (2010). Border security: The role of the U.S. Border Patrol.  Congressional Research Office.  Retrieved November 15, 2012, from http://www.fas.org/sgp/crs/homesec/RL32562.pdf

Schmid, A. P (2011).  The Routledge Handbook of Terrorism Research, Routledge Publishing, New York, NY.

We can write this or a similar paper for you! Simply fill the order form!

Cyber terrorism Term Paper Available

Cyber terrorism
Cyber terrorism

Cyber terrorism

Order Instructions:

The student is required to cover the required readings and apply the information provided combined with the student’s research to answer the following questions:

1. Explain the advent of Cyber terrorism? What is it? How has it been combated since September 2001? What are the current policies? And, what is being done at a national and international level to combat it?

2. Review McNeal, G. S. (2008) Cyber Embargo: Countering the Internet Jihad. Explain the interface of domestic and international terrorism through the Internet Jihad, its potential impact on domestic security (vis-a-vis the controversy over surveillance within the Patriot Act), and why this is domestic terrorism.
The following items will be assessed in particular:

1. Your ability to apply your understanding past modules into critical thinking concerning Cyber terrorism.
2. Your ability to understand past domestic and international (domestic in their countries) terror groups and relate current capabilities to combat their tactics, vision and goals.
3. In-text references to the modular background readings (APA formatting recommended) and a reference page. Outside background reading sources encouraged and expected.

Length: This Case Assignment should be at least 3 pages not counting the title page and references.

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking).

Organization: Subheadings should be used to organize your paper according to question

Required readings:

Cyberterrorism: The invisible threat stealth cyber predators in a climate of escalating risk (2010). Foreign Affairs, 89(6), 24A. Retrieved November 15, 2012, from ProQuest.

McNeal, G. S. (2008). Cyber embargo: Countering the internet Jihad. Case Western Reserve Journal of International Law; 2007/2008, 39(3), 789. Retrieved November 15, 2012, from ProQuest

National Strategy for Combating Terrorism (2006). The White House. Retrieved November 15, 2012, from: http://georgewbush-whitehouse.archives.gov/nsc/nsct/2006/

National Security Strategy (2010). Homeland Security Digital Library, Naval Postgraduate School. Retrieved November 15, 2012, from: http://www.hsdl.org/?view&doc=123246&coll=limited

O’Rourke, M. (2010). The real enemy, Risk Management. 57(3), 80. Retrieved November 15, 2012, from ProQuest

Theohary, C. A. and Rollins, J. (2011). Terrorist use of the internet: Information operations in cyberspace. Congressional Research Service. Retrieved November 15, 2012, from: http://www.fas.org/sgp/crs/terror/R41674.pdf

SAMPLE ANSWER

Domestic Terrorism: Cyber terrorism

Cyber terrorism is the act of using computers as weapons or as targets by the politically motivated sub-national or international groups, who end up threatening and causing fear and violence among the people so as to influence them or make the government change its current policies (Arquilla, 2013).

Advent of Cyber terrorism

The public interest in cyber terrorism began in the late 1980’s (Arquilla, 2013). The fear about the millennium bug finely tuned in the year 2000. This is when the potential cyber terrorist attacks also increased. The millennium bug was however not a terrorist attack or a plot against the United States. Instead, it acted as a catalyst to spark the fears of a large-scale devastating cyber attack. On September 11, 2001 there was a high profile terrorist attack in the United States. The states ensuing war on terror led to further media coverage of the possible threats of cyber terrorism in the following years.

How Cyber terrorism has been Combated

Since September 2001, the mainstream media coverage discusses often any possibility of a large attack making good use of the networked computers to damage dangerous infrastructures with the purpose of putting the lives of people in jeopardy or causing distraction on a national scale. Since 2002, security improved following the private sector sharing information with the government regarding the terrorist’s attacks in their private companies. There was an establishment of a Department of Homeland Security (DHS) which attempted to improve the sharing of information (Ferraro, 2014).

Current Policies Regarding Cyber terrorism

Policy makers that face the assessment and targeting of the future cyber threats should address the current and key issues from the multiple perspectives. The policy dimensions of the cyber terrorism include the possibility to discourage other people from resorting to it. Preparedness and prevention is another aspect whereby the sharing of information and establishment of good practices should be of primary importance. This involves the partnerships between the public and the private sectors. At the same time, threats should be detected and responded to via an alert system. This would dramatically increase the timely targeting of attacks. There should also be contigent plans and disaster recoveries in order to mitigate the attacks. Lastly, there should also be a placement of international cooperation and the establishment of active defenses (McCrisken, 2011).

National and International Level to Combat Cyber terrorism

The America’s National Strategy for combating terrorism recognizes that they are at war and that it is their solemn obligation to protect and defend their homeland and the American people. The National Strategy also recognizes that the war on terror is different kind of war since it is both a battle of arms and ideas. They do not only fight the terrorists on the battlefield but also promote freedom and the dignity of the people as an alternative to the terrorists’ wicked vision of oppression and totalitarian rule. Their paradigm to combat terrorism involves the application of all elements of the national power and influence. They do not only employ the military power but also use the diplomatic, intelligence, financial and law enforcement activities for the homeland protection. They also extend their defenses, disrupt the operations of terrorists and deny their enemies what they need in their operation and to survive.

Interface of Domestic and International Terrorism through the Internet Jihad

According to the article, Cyber Embargo, terrorists are occupied in an online jihad. This is characterized by the use of the internet in fundraising, distribution of messages and directives, recruitment and proselytization. It is, however, possible to limit the terrorists’ websites to a particular region, then a modification of current laws can allow the cyber embargo on the jihadists’ websites and their group. Together with the diplomatic cooperation, they are able to curb the impact of the jihadist websites while at the same time increasing the governments’ ability to monitor those websites and shut them down when necessary (McNeal, 2007).

Potential Impact on Domestic Security

Since the internet can be accessed very easily, the number of potential recruits by the terrorists has risen. Websites have provided an instant connection between the terrorists’ recruiters and the most interested sympathizers. Terrorists can then broadcast strong messages to a large audience of viewers. Apart from that, they can use browsers to check language settings and direct viewers to the required site which is customized for language and culture.

Why it is categorized as Domestic Terrorism

Cyber jihad, unlike cyber terrorism, is the information presented on behalf of the terrorist organizations. It can also be used on several activities that support war directly. For example, an expert in cyber terrorism called Joseph Shahda explains that ‘media jihad,’ which is the internet is as important as the battlefield of jihad. Through the internet, terrorist groups set up centers for operation, raise money, spread propaganda and at the same time communicate with ideologies. It provides an inexpensive recruiting tool for the terrorists to win their supporters and members from all over the world.

References

Arquilla, J. (2013). Twenty years of cyberwar. Journal Of Military Ethics, 12(1), 80-87.

Ferraro, M. F. (2014). “Groundbreaking” or broken? an analysis of sec cybersecurity disclosure guidance, its effectiveness, and implications. Albany Law Review, 77(2), 297-347.

McCrisken, T. (2011). Ten years on: Obama’s war on terrorism in rhetoric and practice. International Affairs, 87(4), 781-801.

McNeal, G. S. (2007). Cyber embargo: countering the internet Jihad. (German). Case Western Reserve Journal Of International Law, 39(3), 789-826.

We can write this or a similar paper for you! Simply fill the order form!

Terrorism and radicalisation Term Paper

Terrorism and radicalisation
Terrorism and radicalisation

Terrorism and radicalisation

Order Instructions:

Cilluffo, Cozzens, and Ranstorp (2010) outline potential problems areas associated with the trend of western nationals going into troubled areas and becoming radicalized. Read this paper and using it with the many sources contained within, answer the following questions:

1. How are terrorist recruiters using target assessment and vulnerability analysis in their selection?

2. What tools do the recruiters use to select targets?

3. Based on the reading, how vulnerable does the U.S and Western Europe remain today to this type of recruitment and utilization? Explain your position.

4. Using the Boyd loop, how would you prepare the steps for counter activities prior to the ACT phase?

Length: This Case Assignment should be at least 3 pages not counting the title page and references.

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper.

Organization: Subheadings should be used to organize your paper according to question.

Required readings:

Brandt, P. T. and Sandler, T. (2009). What do transnational terrorists target? Has it changed? Are we safer? Journal of Conflict Resolution. Retrieved November 20, 2012, from: http://www.utdallas.edu/~tms063000/website/TargetSubstitution-20091003.pdf

Cilluffo, F. J., Cozzens, J. B., and Ranstorp, M. (2010). Foreign fighters: Trends, trajectories, and conflict zones. The George Washington University, Homeland Security Policy Institute. Retrieved November 20,

2012, from: http://www.gwumc.edu/hspi/policy/report_foreignfighters501.pdf

SAMPLE ANSWER

Terrorism is the premeditated use of threat by subnational groups or even individuals to use violence against noncombatants with an aim to obtain social or political objectives trough the intimidation of a large audience. Terrorism can be categorized as transnational or even domestic events, whereby domestic terrorism involves homegrown terrorists, who in most cases are trained at home and even financed there. On the other side transnational terrorism occurs when victims, governments, institutions, perpetrators of more than two countries are involved example the hijacking incidences. Investigations have been conducted to be able to discern the cumulative aggregate patterns of the terrorists over a long period whereby terrorist threats have changed over time (Brandt & Snadler, 2009). Along the perimeters of the government buildings, improved barriers were placed in order to minimize damage from the car and truck bombs thus; bomb sniffing devices were also installed at airports after on-board bombs brought down planes.

According to Brandt and Sandler (2009), terrorists are known to use the target assessment and vulnerability analysis in their selection process to improve their chances of success during their strikes. In addition, Hoffman (2006) supports that most of the latest terrorist attacks have been more successful than the past attacks due to initial target assessment that is designed to eliminate any possible errors. Moreover, the terrorist are likely to strike the most vulnerable groups with more a valuable price. With this regard, attacks on private parties have increased over time since they provide soft targets that favor their vulnerability analysis (Cilluffo, Cozzens, & Ranstorp, 2010). Terrorists are known to choose among their targeted groups to maximize their expected utility or even payoff since the average cost per incidence is constant and not dependent on the number of attacks. A state should not favor one type of target since this will increase the incidences against the target class and terrorists may take advantage of this. Terrorists who pose high political demands to the government, they become more publicly known for their cause of actions. If granted their political demands the terrorists may reduce the number of attacks against their target group and in turn they increase the number of attacks on a relatively cheaper other types of targets.

According to Brandt and Sandler (2009), there are many types of tools used by the terrorists such as bombs, non-aerial hijackings, skyjackings, hostage seizures, barricade and kidnappings which are regarded as the best weapons by the terrorists to their target groups. Nature of victim is a tool that terrorists use to select their targets and it helps them identify whether the attack only involves property or involves people alone. More missions against people rather than property are being completed as planned for all target types owing to relative considerations since their vulnerability is always high. Logistical success is another tool used by terrorists in selecting their target and this is done by securing one or more hostages in a kidnapping or even they may decide to plant a bomb that will later explode (Hoffman, 2006). Target classes, especially military and the officials are now allocated more security as we also anticipate to see a reduction in terrorist attacks on them. There are various media tools used by the terrorists in selecting their targets and these tools include: YouTube, Facebook, blogs, twitter, message boards, audio recording, DVDs and websites (Brandt & Sandler, 2009). These tools are known to provide figures that can bridge and relate to social subgroups in a comfortable medium that is well understood by the targeted audience.

The United States and Western Europe are vulnerable to the terrorist recruitment and utilization due to their deployment of their fighters in the Middle East regions which is the bedrock of terrorists.  In addition, the stationing of their troops in Islamic countries has greatly fueled the mobilization of Muslim fundamentalist that are determined to advance the terrorism ideals. The western military involvement while tackling terrorists also continue to award them more sympathy, especially from the Muslim community who feel that they are being targeted with by the west. Moreover, there is a very high presence of social media in the west and the terrorist use such media to source for cheap recruits to advance their ideals (Cilluffo, Cozzens, & Ranstorp, 2009). Therefore, the United States and other western countries are highly vulnerable to terrorist activities.

In order to counter the terrorist activities, the western countries first need to fully understand the operations of the terrorism threats, both at the tactical and strategic level. The law enforcement and the intelligence services should be properly equipped with tools and technologies that can help them deal with the terrorists. Moreover, the western countries should heavily invest in counter-radicalization efforts that are effective enough to destabilize all the radicalization threats (Brandt & Sandler, 2009). Moreover, the west should not overlook the opportunities to infiltrate the jihadist networks and pay a close attention on how such networks utilize homogenous groups of foreign fighters.

References

Brandt, Patrick T., and Todd Sandler. 2009. Hostage taking: Understanding terrorism event dynamics. Journal of Policy Modelling 31 (5):758-778.

Brandt, P. T. and Sandler, T. (2009). What do transnational terrorists target? Has it changed? Are we safer? Journal of Conflict Resolution. Retrieved November 20, 2012, from: http://www.utdallas.edu/~tms063000/website/TargetSubstitution-20091003.pdf

Cilluffo, F. J., Cozzens, J. B., and Ranstorp, M. (2010). Foreign fighters: Trends, trajectories, and conflict zones. The George Washington University, Homeland Security Policy Institute. Retrieved November 20, 2012, from: http://www.gwumc.edu/hspi/policy/report_foreignfighters501.pdf

Hoffman, Bruce. 2006. Inside terrorism: Revised and expanded Ed. New York: Columbia University Press.

We can write this or a similar paper for you! Simply fill the order form!