Domestic terrorism based on Kaplan

Domestic terrorism based on Kaplan, J. (2008). Terrorism fifth wave
Domestic terrorism based on Kaplan, J. (2008). Terrorism fifth wave

Domestic terrorism based on Kaplan, J. (2008). Terrorism fifth wave

Order Instructions:

Number 1 discussion is based on: Kaplan, J. (2008). Terrorism fifth wave: A theory, a conundrum, and a dilemma. Perspectives on Terrorism, 2(2). Retrieved from: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/26/html

1. Read pages 1-4: Four-Wave Theory and Characteristics of Fifth Wave Groups. Comment on the establishment of a typical domestic break-away group and give an example of an actual terrorist group in the United States.

2. Does extremism equal terrorism? Are the tactics and behaviors of domestic extremists Constitutionally protected or criminal acts?

Discuss, remembering to cite your sources.

SAMPLE ANSWER

Q1.

According to the Four Waves Theory postulated by Prof. David Rapport, the establishment of a typical domestic breakaway group is not clearly accounted for, since the above ideology merely explains the philosophies connected to international terrorism. Critically, the theory is limited in scope to espouse the occurrence of such groups, but the author of the article, Kaplan, provides a guiding thought that these breakaway domestic groups could be a completely new stem of terrorist amalgams, that adopt new orientations, objectives, and focus (Kaplan, 2008). As opposed to championing an international agenda, these small groups break away from the main group or initial focus, and adopt a more centralized objective that targets local entities. Kaplan describes this as the Fifth Wave of Modern Terrorism (Kaplan, 2008). An actual domestic terrorist group in the US is the Abdullah Azzam Brigades, which was initially affiliated to al Qaeda, but has since adopted a more localized focus in the US., as well as other countries.

Q2.

Basing my argument on the tactics of extremist groups, I would strongly posit that extremism equals terrorism, since the actions advanced by these groups are almost similar. While the foundations of the extremist and terrorist groups might despair, the means used by the two groups to achieve their objectives are the same. Basically, a terrorist act is that which is leveled against the innocent, destroys lives and property en masse, and its consequences are not commensurate to the ideology being advanced (Levin, 2006). From this definition, it is clear that even extremism goes to the same height to further a predetermined course. This qualifies it as outright terrorism, regardless of the nature of the course being championed.

References

Levin, J. (2006). Domestic terrorism. New York: Chelsea House.

Kaplan, J. (2008). Terrorism fifth wave: A theory, a conundrum, and a dilemma. Perspectives on Terrorism, 2(2). Retrieved from: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/26/html

We can write this or a similar paper for you! Simply fill the order form!

Domestic Terrorism Essay Paper Available

Domestic Terrorism
Domestic Terrorism

Domestic Terrorism

Order Instructions:

Background:
1. You are the Principal the local Shining Star Elementary School. Your school contains 400 students and is part of a four-school cluster. Your cluster is part of a school district that contains over 100 schools from all levels.

2. You are the emergency manager for this county of over 300,000 people. Your position is to prepare the county for disasters in an area where the worst expected disaster is fire from storms or drought. Wind storms are the next worst expected disaster. Your county is surrounded by counties of equal or larger sizes in a larger city with a population of five million persons. Shining Star Elementary School is in your county.

3. You are the Mayor of a town within the county that contains the Shining Star Elementary School. The city police and fire department work for you.

4. You are the Chairman of the County Supervisors in the county that contains the Shining Star Elementary School. The county sheriff, fire department, health department, and county support offices work for you.

For the four positions you should have: Notified all local Law Enforcement agencies for assistance; established an Incident Command System; and isolated the area.

Scenario:
1. Fires have broken out in twenty-five (25) schools of the district.

2. The City Police and County Sheriff offices are destroyed by explosions.

3. The National Press demands immediate access to the Shining Path Elementary School and whoever is in charge.

4. The group in the Shining Path Elementary School demands all prisoners held in Guantanamo be released within twelve (12) hours or more students and teachers will be killed.

For each of the four positions explain what you would do and expect to happen in the scenario. Consider the following in each of your answers:
1. WHAT ASSETS DO YOU HAVE?
2. WHAT AGENCIES NEED TO BE INVOLVED?
3. WHO DO YOU NEED TO COORDINATE WITH?
4. WHAT ACTIONS CAN YOU TAKE?
5. WHAT NATIONAL AGENCIES SHOULD BE INVOLVED? WHO NOTIFIED THEM? WHAT ARE THEY DOING?

Length: This SLP Assignment should be at least 3 pages not counting the title page and references.

References: At least two references should be included from academic sources listed below(e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking).

Organization: Subheadings should be used to organize your paper according to question.

Required readings:

ATF Home Page, Bureau of Alcohol, Tobacco, Firearms, and Explosives website: Retrieved November 15, 2012, from: http://www.atf.gov/

Brinkerhoff, J.R. (2009). The role of Federal military forces in domestic law enforcement title. US Army Combined Arms Center, Newsletter 10(16), Ch. 11. Retrieved November 16, 2012, from: http://usacac.army.mil/cac2/call/docs/10-16/ch_11.asp

Cook, T. (2008). The Posse Comitatus Act: An act in need of a regulatory update. Retrieved November 15, 2012, from: http://www.hsdl.org/?view&doc=137185&coll=limited

Haddal, C. C. (2010). Border security: The role of the U.S. Border Patrol. Congressional Research Office. Retrieved November 15, 2012, from: http://www.fas.org/sgp/crs/homesec/RL32562.pdf

Vision, mission, core values, and pledge: CDC vision for the 21st Century (2010). Centers for Disease Control and Prevention. Retrieved November 15, 2012, from: http://www.cdc.gov/about/organization/mission.htm

SAMPLE ANSWER

Domestic Terrorism

Scenario One: Fires have broken out in twenty-five (25) schools of the district

The Shining Star Elementary School, being part of a four-school cluster, is relatively well prepared to deal with emergencies that could arise.  The same is true for all schools in the district since the standard set in the cluster is the same throughout the district.  All schools are equipped with fire fighting equipments including fire extinguishers and hydrants.  Additionally, each school has a fire marshal stationed in each school whose primary responsibility it to maintain fire disaster preparedness at all times, assess equipment adequacy and usability state and conduct emergency drills twice every school term.  With the reports coming from the respective Fire Marshalls, the disaster preparedness plan is activated immediately.  The plan indicates that in the case of a fire, all students after evacuating the premises are to meet at pre designated points for roll-call to determine who is missing.

As the Principal of one of the schools facing a fire disaster, one has to place a call to the local fire department.  It will be the responsibility of the local Fire Chief to escalate the incidence after determining its dynamics.  It is expected that among the agencies that will respond to this disaster will include, the National Emergency Management Authority (NEMA).  Given the multiple locations of the fire disasters, the district fire marshal will take overall responsibility of coordinating all activities and thus becomes the go-to person in case of a need.

As a principal, the immediate action to engage in is to have all students evacuate the premises and assemble at the assembly points for roll call.  It is at this point that medical needs will be identified and addressed, while missing students will be known and sort.  Given the scale and spread of the fire, NEMA should be involved.  Forensic scientists should be involved in order to determine the causes of the fire.  The national agencies will be notified and invited by the person in-charge of emergencies in the district (Schmid, 2011).

Scenario Two: The City Police and County Sheriff offices are destroyed by explosions

As the emergency manager of the county, the destruction of the City Police and the County Sherriff office makes this an invasion that affects the core of emergency response in the county.  As a result, county resources cannot longer be relied upon to attend to the emerging emergency.  Given that the cause of the explosion is not immediately evident; the emergency manager places a call to the State Governor requesting for federal assistance.  The Governor will place a call to the President of the Country for federal assistance.  This calls set the ground for the deployment of the National Guard – to take care of the enforcement of Law and Order, allocation of Federal resources to assist with the local emergency, deployment of the FBI whose explosives experts should help the cause of the explosive (Haddal, 2010).  This revelation will determine the next cause of action.  Should it be determined to have been caused by deliberate human action, then criminal investigation will commence immediately.  Should the explosion have been caused by natural causes, the reconstruction will commence immediately.

Scenario Three: The National Press demands immediate access to the Shining Star Elementary School and whoever is in charge

The Mayor of a town within the county that contains the Shining Star Elementary School and with command of both the police and fire department, has a responsibility to shield both  forces from the prying eyes of the National Press, who can be uncivil in their quest to get the story.  This being the case, all information will be shared from one central source – the mayor’s office.  Since there are different disaster locations, instructions will be issued to seal-off all the locations and no one apart from authorized personnel should access the sites (Ciment, 2011).  Additionally, no emergency worker should talk to the press and all press interactions will be left to the mayor or to whoever the responsibility is designated.  As the mayor, a call will be placed to the State Governor for assistance and it is expected that the Governor will in turn place a call to the President seeking Federal aid.

Scenario One: The group in the Shining Path Elementary School demands all prisoners held in Guantanamo be released within twelve (12) hours or more students and teachers will be killed

With the demand coming from the Shining Star Elementary School, it is clear that this is no longer a local problem but has taken on an international dimension.  Despite being the Chairman of the County Supervisors with the power to command all the county emergency resources, the situation at Shining Star Elementary School is much bigger and complicated that the local resources are designed to cope with.  Given that the situation has clearly degenerated to a terrorism stand-off with demands that border the life or death of the hostages – who include student and teachers, immediately, both the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) will be called to the scene and left to determine between the two federal agencies, who will take the lead role (Brinkerhoff, 2009).  Additionally, depending on the lead agency, Special Weapons And Tactics (SWAT) teams will be brought into the scene with the clear instruction to prepare for both soft and hard assault of the target and what each plan will entail – both in terms of personnel and possible casualties.  Given the epicenter of the action will be at the Shining Elementary School and the publicity generated nationally, after sealing off the school building where the terrorists are, the National Press, will be set up in the playing field with regular briefing being held in pavilion.  This should keep the national press and briefing personnel safe while keeping them within the vicinity of the epicenter.  Before the federal agencies arrive to take over the situation, the local hostage negotiator will be in-charge off all communication with the captors in an effort to ensure no life is lost while the scene is still under the command of the local agencies.

References        

Brinkerhoff, J.R. (2009). The role of Federal military forces in domestic law enforcement title. US Army Combined Arms Center, Newsletter 10(16), Ch. 11 Retrieved November 16, 2012, from: http://usacac.army.mil/cac2/call/docs/10-16/ch_11.asp

Ciment, J (2011).  World Terrorism: An Encyclopedia of Political Violence from Ancient Times to the Post 9/11 Era, 2nd Ed, Sharpe Publishers, Armonk, NY.

Haddal, C. C. (2010). Border security: The role of the U.S. Border Patrol.  Congressional Research Office.  Retrieved November 15, 2012, from http://www.fas.org/sgp/crs/homesec/RL32562.pdf

Schmid, A. P (2011).  The Routledge Handbook of Terrorism Research, Routledge Publishing, New York, NY.

We can write this or a similar paper for you! Simply fill the order form!

Cyber terrorism Term Paper Available

Cyber terrorism
Cyber terrorism

Cyber terrorism

Order Instructions:

The student is required to cover the required readings and apply the information provided combined with the student’s research to answer the following questions:

1. Explain the advent of Cyber terrorism? What is it? How has it been combated since September 2001? What are the current policies? And, what is being done at a national and international level to combat it?

2. Review McNeal, G. S. (2008) Cyber Embargo: Countering the Internet Jihad. Explain the interface of domestic and international terrorism through the Internet Jihad, its potential impact on domestic security (vis-a-vis the controversy over surveillance within the Patriot Act), and why this is domestic terrorism.
The following items will be assessed in particular:

1. Your ability to apply your understanding past modules into critical thinking concerning Cyber terrorism.
2. Your ability to understand past domestic and international (domestic in their countries) terror groups and relate current capabilities to combat their tactics, vision and goals.
3. In-text references to the modular background readings (APA formatting recommended) and a reference page. Outside background reading sources encouraged and expected.

Length: This Case Assignment should be at least 3 pages not counting the title page and references.

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking).

Organization: Subheadings should be used to organize your paper according to question

Required readings:

Cyberterrorism: The invisible threat stealth cyber predators in a climate of escalating risk (2010). Foreign Affairs, 89(6), 24A. Retrieved November 15, 2012, from ProQuest.

McNeal, G. S. (2008). Cyber embargo: Countering the internet Jihad. Case Western Reserve Journal of International Law; 2007/2008, 39(3), 789. Retrieved November 15, 2012, from ProQuest

National Strategy for Combating Terrorism (2006). The White House. Retrieved November 15, 2012, from: http://georgewbush-whitehouse.archives.gov/nsc/nsct/2006/

National Security Strategy (2010). Homeland Security Digital Library, Naval Postgraduate School. Retrieved November 15, 2012, from: http://www.hsdl.org/?view&doc=123246&coll=limited

O’Rourke, M. (2010). The real enemy, Risk Management. 57(3), 80. Retrieved November 15, 2012, from ProQuest

Theohary, C. A. and Rollins, J. (2011). Terrorist use of the internet: Information operations in cyberspace. Congressional Research Service. Retrieved November 15, 2012, from: http://www.fas.org/sgp/crs/terror/R41674.pdf

SAMPLE ANSWER

Domestic Terrorism: Cyber terrorism

Cyber terrorism is the act of using computers as weapons or as targets by the politically motivated sub-national or international groups, who end up threatening and causing fear and violence among the people so as to influence them or make the government change its current policies (Arquilla, 2013).

Advent of Cyber terrorism

The public interest in cyber terrorism began in the late 1980’s (Arquilla, 2013). The fear about the millennium bug finely tuned in the year 2000. This is when the potential cyber terrorist attacks also increased. The millennium bug was however not a terrorist attack or a plot against the United States. Instead, it acted as a catalyst to spark the fears of a large-scale devastating cyber attack. On September 11, 2001 there was a high profile terrorist attack in the United States. The states ensuing war on terror led to further media coverage of the possible threats of cyber terrorism in the following years.

How Cyber terrorism has been Combated

Since September 2001, the mainstream media coverage discusses often any possibility of a large attack making good use of the networked computers to damage dangerous infrastructures with the purpose of putting the lives of people in jeopardy or causing distraction on a national scale. Since 2002, security improved following the private sector sharing information with the government regarding the terrorist’s attacks in their private companies. There was an establishment of a Department of Homeland Security (DHS) which attempted to improve the sharing of information (Ferraro, 2014).

Current Policies Regarding Cyber terrorism

Policy makers that face the assessment and targeting of the future cyber threats should address the current and key issues from the multiple perspectives. The policy dimensions of the cyber terrorism include the possibility to discourage other people from resorting to it. Preparedness and prevention is another aspect whereby the sharing of information and establishment of good practices should be of primary importance. This involves the partnerships between the public and the private sectors. At the same time, threats should be detected and responded to via an alert system. This would dramatically increase the timely targeting of attacks. There should also be contigent plans and disaster recoveries in order to mitigate the attacks. Lastly, there should also be a placement of international cooperation and the establishment of active defenses (McCrisken, 2011).

National and International Level to Combat Cyber terrorism

The America’s National Strategy for combating terrorism recognizes that they are at war and that it is their solemn obligation to protect and defend their homeland and the American people. The National Strategy also recognizes that the war on terror is different kind of war since it is both a battle of arms and ideas. They do not only fight the terrorists on the battlefield but also promote freedom and the dignity of the people as an alternative to the terrorists’ wicked vision of oppression and totalitarian rule. Their paradigm to combat terrorism involves the application of all elements of the national power and influence. They do not only employ the military power but also use the diplomatic, intelligence, financial and law enforcement activities for the homeland protection. They also extend their defenses, disrupt the operations of terrorists and deny their enemies what they need in their operation and to survive.

Interface of Domestic and International Terrorism through the Internet Jihad

According to the article, Cyber Embargo, terrorists are occupied in an online jihad. This is characterized by the use of the internet in fundraising, distribution of messages and directives, recruitment and proselytization. It is, however, possible to limit the terrorists’ websites to a particular region, then a modification of current laws can allow the cyber embargo on the jihadists’ websites and their group. Together with the diplomatic cooperation, they are able to curb the impact of the jihadist websites while at the same time increasing the governments’ ability to monitor those websites and shut them down when necessary (McNeal, 2007).

Potential Impact on Domestic Security

Since the internet can be accessed very easily, the number of potential recruits by the terrorists has risen. Websites have provided an instant connection between the terrorists’ recruiters and the most interested sympathizers. Terrorists can then broadcast strong messages to a large audience of viewers. Apart from that, they can use browsers to check language settings and direct viewers to the required site which is customized for language and culture.

Why it is categorized as Domestic Terrorism

Cyber jihad, unlike cyber terrorism, is the information presented on behalf of the terrorist organizations. It can also be used on several activities that support war directly. For example, an expert in cyber terrorism called Joseph Shahda explains that ‘media jihad,’ which is the internet is as important as the battlefield of jihad. Through the internet, terrorist groups set up centers for operation, raise money, spread propaganda and at the same time communicate with ideologies. It provides an inexpensive recruiting tool for the terrorists to win their supporters and members from all over the world.

References

Arquilla, J. (2013). Twenty years of cyberwar. Journal Of Military Ethics, 12(1), 80-87.

Ferraro, M. F. (2014). “Groundbreaking” or broken? an analysis of sec cybersecurity disclosure guidance, its effectiveness, and implications. Albany Law Review, 77(2), 297-347.

McCrisken, T. (2011). Ten years on: Obama’s war on terrorism in rhetoric and practice. International Affairs, 87(4), 781-801.

McNeal, G. S. (2007). Cyber embargo: countering the internet Jihad. (German). Case Western Reserve Journal Of International Law, 39(3), 789-826.

We can write this or a similar paper for you! Simply fill the order form!

Terrorism and radicalisation Term Paper

Terrorism and radicalisation
Terrorism and radicalisation

Terrorism and radicalisation

Order Instructions:

Cilluffo, Cozzens, and Ranstorp (2010) outline potential problems areas associated with the trend of western nationals going into troubled areas and becoming radicalized. Read this paper and using it with the many sources contained within, answer the following questions:

1. How are terrorist recruiters using target assessment and vulnerability analysis in their selection?

2. What tools do the recruiters use to select targets?

3. Based on the reading, how vulnerable does the U.S and Western Europe remain today to this type of recruitment and utilization? Explain your position.

4. Using the Boyd loop, how would you prepare the steps for counter activities prior to the ACT phase?

Length: This Case Assignment should be at least 3 pages not counting the title page and references.

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper.

Organization: Subheadings should be used to organize your paper according to question.

Required readings:

Brandt, P. T. and Sandler, T. (2009). What do transnational terrorists target? Has it changed? Are we safer? Journal of Conflict Resolution. Retrieved November 20, 2012, from: http://www.utdallas.edu/~tms063000/website/TargetSubstitution-20091003.pdf

Cilluffo, F. J., Cozzens, J. B., and Ranstorp, M. (2010). Foreign fighters: Trends, trajectories, and conflict zones. The George Washington University, Homeland Security Policy Institute. Retrieved November 20,

2012, from: http://www.gwumc.edu/hspi/policy/report_foreignfighters501.pdf

SAMPLE ANSWER

Terrorism is the premeditated use of threat by subnational groups or even individuals to use violence against noncombatants with an aim to obtain social or political objectives trough the intimidation of a large audience. Terrorism can be categorized as transnational or even domestic events, whereby domestic terrorism involves homegrown terrorists, who in most cases are trained at home and even financed there. On the other side transnational terrorism occurs when victims, governments, institutions, perpetrators of more than two countries are involved example the hijacking incidences. Investigations have been conducted to be able to discern the cumulative aggregate patterns of the terrorists over a long period whereby terrorist threats have changed over time (Brandt & Snadler, 2009). Along the perimeters of the government buildings, improved barriers were placed in order to minimize damage from the car and truck bombs thus; bomb sniffing devices were also installed at airports after on-board bombs brought down planes.

According to Brandt and Sandler (2009), terrorists are known to use the target assessment and vulnerability analysis in their selection process to improve their chances of success during their strikes. In addition, Hoffman (2006) supports that most of the latest terrorist attacks have been more successful than the past attacks due to initial target assessment that is designed to eliminate any possible errors. Moreover, the terrorist are likely to strike the most vulnerable groups with more a valuable price. With this regard, attacks on private parties have increased over time since they provide soft targets that favor their vulnerability analysis (Cilluffo, Cozzens, & Ranstorp, 2010). Terrorists are known to choose among their targeted groups to maximize their expected utility or even payoff since the average cost per incidence is constant and not dependent on the number of attacks. A state should not favor one type of target since this will increase the incidences against the target class and terrorists may take advantage of this. Terrorists who pose high political demands to the government, they become more publicly known for their cause of actions. If granted their political demands the terrorists may reduce the number of attacks against their target group and in turn they increase the number of attacks on a relatively cheaper other types of targets.

According to Brandt and Sandler (2009), there are many types of tools used by the terrorists such as bombs, non-aerial hijackings, skyjackings, hostage seizures, barricade and kidnappings which are regarded as the best weapons by the terrorists to their target groups. Nature of victim is a tool that terrorists use to select their targets and it helps them identify whether the attack only involves property or involves people alone. More missions against people rather than property are being completed as planned for all target types owing to relative considerations since their vulnerability is always high. Logistical success is another tool used by terrorists in selecting their target and this is done by securing one or more hostages in a kidnapping or even they may decide to plant a bomb that will later explode (Hoffman, 2006). Target classes, especially military and the officials are now allocated more security as we also anticipate to see a reduction in terrorist attacks on them. There are various media tools used by the terrorists in selecting their targets and these tools include: YouTube, Facebook, blogs, twitter, message boards, audio recording, DVDs and websites (Brandt & Sandler, 2009). These tools are known to provide figures that can bridge and relate to social subgroups in a comfortable medium that is well understood by the targeted audience.

The United States and Western Europe are vulnerable to the terrorist recruitment and utilization due to their deployment of their fighters in the Middle East regions which is the bedrock of terrorists.  In addition, the stationing of their troops in Islamic countries has greatly fueled the mobilization of Muslim fundamentalist that are determined to advance the terrorism ideals. The western military involvement while tackling terrorists also continue to award them more sympathy, especially from the Muslim community who feel that they are being targeted with by the west. Moreover, there is a very high presence of social media in the west and the terrorist use such media to source for cheap recruits to advance their ideals (Cilluffo, Cozzens, & Ranstorp, 2009). Therefore, the United States and other western countries are highly vulnerable to terrorist activities.

In order to counter the terrorist activities, the western countries first need to fully understand the operations of the terrorism threats, both at the tactical and strategic level. The law enforcement and the intelligence services should be properly equipped with tools and technologies that can help them deal with the terrorists. Moreover, the western countries should heavily invest in counter-radicalization efforts that are effective enough to destabilize all the radicalization threats (Brandt & Sandler, 2009). Moreover, the west should not overlook the opportunities to infiltrate the jihadist networks and pay a close attention on how such networks utilize homogenous groups of foreign fighters.

References

Brandt, Patrick T., and Todd Sandler. 2009. Hostage taking: Understanding terrorism event dynamics. Journal of Policy Modelling 31 (5):758-778.

Brandt, P. T. and Sandler, T. (2009). What do transnational terrorists target? Has it changed? Are we safer? Journal of Conflict Resolution. Retrieved November 20, 2012, from: http://www.utdallas.edu/~tms063000/website/TargetSubstitution-20091003.pdf

Cilluffo, F. J., Cozzens, J. B., and Ranstorp, M. (2010). Foreign fighters: Trends, trajectories, and conflict zones. The George Washington University, Homeland Security Policy Institute. Retrieved November 20, 2012, from: http://www.gwumc.edu/hspi/policy/report_foreignfighters501.pdf

Hoffman, Bruce. 2006. Inside terrorism: Revised and expanded Ed. New York: Columbia University Press.

We can write this or a similar paper for you! Simply fill the order form!

Domestic Acts of Terrorism Research Paper

Domestic Acts of Terrorism
Domestic Acts of Terrorism

Domestic Acts of Terrorism

Interaction of these agencies when preparing for, responding to, or recovering from Domestic Acts of Terrorism.

Order Instructions:

The intent and purpose of this Module is to familiarize the student with other agencies that are involved with Domestic Security and Terrorism. There are too many agencies to present; therefore, I request the student read their missions and histories.

Students are encouraged to deviate from the posted readings and look at the provided DHS organizational chart, seek the charts from the Department of Health and Human Services, the Military, the State Department, and the Justice Department to find out more. The organizations of the Federal Aviation Administration (FAA) and Federal Emergency Management Agency (FEMA) are deliberately left out because the students should cover both of these agencies in depth in other classes. The Case questions concern the interaction of these agencies when preparing for, responding to, or recovering from an act of domestic terrorism.
The student is required to cover the required readings and apply the information provided combined with the student’s research to answer the following questions:

1. Do you agree/disagree with Thurston’s views on the role of the military in Domestic Terrorism? Why? (Thurston, 2007)

2. Explain the interface of CDC and DHS in a domestic bio-terror incident.

3. How would FEMA and the FAA integrate with the DHS, TSA, and Military if a domestic terror incident occurred similar to the events of September 11, 2001?

4. After reading (Haddal, 2010) what do you envision the role and success of the Border Patrol will be in the next five years?

5. In your view (supported by research and citation), do you believe the reorganizations of the first decade of the 21st century to combat domestic terrorism were/are effective? What changes would you recommend and why?

The following items will be assessed in particular:

1. Your ability to apply your understanding of the roles of the assigned agencies in combating domestic terrorism and their interrelationships.

2. Your ability to express the effectiveness of the changes in the entire spectrum of homeland security as applied to domestic terrorism.

3. In-text references to the modular background readings (APA formatting recommended) and a reference page. Outside background reading sources encouraged and expected.

Length: This Case Assignment should be at least 3 pages not counting the title page and references.
References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking).
Organization: Subheadings should be used to organize your paper according to question.

Academic Source, Required readings:

ATF Home Page, Bureau of Alcohol, Tobacco, Firearms, and Explosives website: Retrieved November 15, 2012, from: http://www.atf.gov/

Brinkerhoff, J.R. (2009). The role of Federal military forces in domestic law enforcement title. US Army Combined Arms Center, Newsletter 10(16), Ch. 11. Retrieved November 16, 2012, from: http://usacac.army.mil/cac2/call/docs/10-16/ch_11.asp

Cook, T. (2008). The Posse Comitatus Act: An act in need of a regulatory update. Retrieved November 15, 2012, from: http://www.hsdl.org/?view&doc=137185&coll=limited

Haddal, C. C. (2010). Border security: The role of the U.S. Border Patrol. Congressional Research Office. Retrieved November 15, 2012, from: http://www.fas.org/sgp/crs/homesec/RL32562.pdf

Thurston, T. W. (2007). The military’s role in domestic terrorism. Retrieved from: http://calhoun.nps.edu/bitstream/handle/10945/3019/07Dec_Thurston.pdf?sequence=1

Vision, mission, core values, and pledge: CDC vision for the 21st Century (2010). Centers for Disease Control and Prevention. Retrieved November 15, 2012, from: http://www.cdc.gov/about/organization/mission.htm

SAMPLE ANSWER

  1. Do you agree/disagree with Thurston’s views on the role of the military in Domestic Terrorism? Why? (Thurston, 2007)

I agree and support Thurston’s views as presented in his article ´The Military’s Role in Domestic Terrorism´, on the role of the military in deterring, combating and providing assistance in instances of domestic terrorism in the US. He asserts that to effectively counter acts of home-grown terrorism, there is need for a concerted effort between the military and the civilian security forces.  This is because protecting the lives of Americans is mandatory and the state should use all the resources at its disposal, including the military, to protect the citizens from any acts of terror. This is clearly spelt out in the National Strategy for Homeland Security, NSHS, of 2007. It states in part that ´´…the United States will use all instrument of national power and influence, diplomatic, information, military, economic, financial, intelligence, and law enforcement, to achieve our goals to prevent and disrupt terrorist attacks; protect the American people…” The supportive role of the military is especially relevant in situations where the civilian police is widely overstretched or overwhelmed, and so the troops act as  a force multiplier. This makes the use of the troops domestically, not to be a question of choice, but of necessity. The military’s role should however, as Thurston purports­­­­­­­­, not be a leading role but a supportive role since while they may have more airpower and substantial personnel, they do not necessarily possess the relevant training to effectively deal with domestic terrorism. This is true because the military are prone to using excessive force that may harm civilians. To counter this, they should be provided with relevant training in dealing with domestic terrorism. Their participation in countering domestic insurgents should also be short lived and their involvement halted once a situation can ably be handled by the civil police (Thurston, 2007).

  1. Explain the interface of CDC and DHS in a domestic bio-terror incident.

The twenty first century has witnessed an increase in bio-terror attacks such as the release of anthrax virus. Bio terrorist use disease causing agents such as viruses and bacterial to harm or kill people and animals by deliberately releasing them in the environment (Jones D., 2005) Both the Centre for disease control, CDC and the Department of Homeland Security, DHS, have a significant role to play in combating bio terror in the American soil. The CDC has the role of preventing and controlling bio terror, through such activities as detecting infections, conducting research on vaccines and controlling the spread of diseases such as small pox and anthrax, so as to promote the health of the public. CDC relies so much on DHS as it is the source of intelligent imminent attack so that the CDC can be put on high alert. This cooperation is vital as it can avert a possible terror incident or alleviate the effect of a bio terror as a result of information sharing. The DHS also works in partnership with relevant agencies to provide emergency support to CDC in case of a bio terror incident. This partnership between CDC and DHS helps in combating, controlling and even eradicating germs used as terror weapons. Just like the mission of CDC is to protect the lives of Americans through promotion of health security by swift response to health concerns, so does DHS, through its various departments that are created to respond to bio terror attacks.

  1. How would FEMA and the FAA integrate with the DHS, TSA, and Military if a domestic terror incident occurred similar to the events of September 11, 2001?

The DHS is adequately prepared in instances of emergencies through the Federal Emergency Management Agency, FEMA. Federal Aviation Agency, FAA, and FEMA are components of the DHS. FEMA enhances disaster preparedness and provides emergency response during terror attacks that cannot be avoided, such as the September 11 attack, by reducing the impacts of a domestic terror attack and ensuring that Americans do not become victims of terror. FEMA does this by encouraging quick recovery of those affected by acts of terrorism. FAA is also under DHS and it is majorly concerned with enhancing security in the aviation industry through enhancement of screening of passengers as well as cargoes, enforcement of immigration laws so as to reduce the risk of passenger attack. In the event of terror incident similar to the September 11 attack, the DHS shall mobilize FEMA to enhance emergency services to the citizens while the FAA and TSA would be on high alert to boost security at the airport to prevent explosives from entering the country or attackers from escaping, and ensuring general aviation security as a key infrastructure. This shall be enhanced by the deployment of the military to provide support to the civilian police in restoring calm and order, and strengthening entire security of the state. The department of home homeland security shall coordinate all these agencies’ efforts since it has the overall mission of providing security in the home land.

  1. After reading (Haddal, 2010) what do you envision the role and success of the Border Patrol will be in the next five years?

The United States Border Patrol, USBP, as I envision it in five years, shall consolidate its role of protecting the states border points. Because of its expanding budget and fund allocation, the USBP will be in a better position to install more advanced and secure surveillance gadgets in both its northern and the porous southern borders. The border patrol agents, who also have an important role of not only detecting, but also deterring illegal migrants and terrorists, will be equipped with advanced skills since the huge budget allocation will facilitate training of border agents. Other shortfall such as lack of clear statistics on issues related to the border, such as availability of data on illegal migrants, and number of border agents attacked will be, in future, consolidated and more accurate statistics provided by border agents. There shall also be a consolidated integrated border enforcement team in the northern border of Canada to exert joint efforts in enhancing border patrol and security.

  1. In your view (supported by research and citation), do you believe the reorganizations of the first decade of the 21st century to combat domestic terrorism were/are effective? What changes would you recommend and why?

The 21st century has seen extensive overhaul of the security system and agencies involved in combating domestic terrorism and this was necessary if war on terrorism was to bear fruits.  These new reorganizations, especially in the Department of homeland security, have drastically improved the level of preparedness of the state. The changes introduced are very effective since there is now a department solely focused on ensuring security in the homeland and its borders (Haddal, 2010). The effectiveness has been especially achieved through the establishment of various departments and agencies that even deal with emergencies such as FEMA, by ensuring that citizens do not become victims or terrorism. Information sharing among departments and the various relevant agencies has also enhanced their cooperation, hence, improving on effectiveness and raising more public awareness on terrorism. Effectiveness is also seen since there has never been a major attack in the country since September 11 and security has been beefed up in the aviation industry (Elias, 2009). Again, numerous plots of terrorist attacks in the U.S. soil have been foiled since the reorganizations and this indicates the effectiveness of such reorganizations

However, the reorganizations will make do with some crucial recommendations such as:

  • Security alert should be strengthened. The thwarted terror attacks indicate that US is still a target for terrorists and as such increased intelligence to detect any possibility of terror in US soil should be adopted.
  • There should also be a clear way in which the military and the civil police can work together to combat domestic terrorism. This should be in place to avoid confusions during a joint task force.
  • The federals states need to establish a wider pool of volunteers as these will provide ready response to disaster and increase preparedness. This is because the local civilians can respond rapidly and assist each other after an attack before the federal can organize itself.
  • There should be integration between the local and state efforts that are geared towards countering acts of terror.

With these in place, the risks of terrorist attack within USA will drastically be reduced. It is impossible to totally avoid the threats of terror attacks but stringent and practical measures as detailed in the DHS can be adopted and implemented to keep America safer.

References

Haddal, C. C. (2010). Border security: The role of the U.S. Border Patrol. Congressional Research Office. Retrieved November 15, 2012, from:
http://www.fas.org/sgp/crs/homesec/RL32562.pdf

Elias B., (2009). National Aviation Security Policy, Strategy and Mode-specific Plans. Background and Considerations for Congress.

Jones, D. (2005). Structures of Bio-terrorism Preparedness in the UK and the US: Responses to 9/11 and the Anthrax Attacks. British Journal Of Politics & International Relations, 7(3), 340-352. doi:10.1111/j.1467-856X.2005.00189.x

Thurston, T. W. (2007). The military’s role in domestic terrorism. Retrieved from: http://calhoun.nps.edu/bitstream/handle/10945/3019/07Dec_Thurston.pdf?sequence=1

We can write this or a similar paper for you! Simply fill the order form!

Domestic Terrorism Research Assignment

Domestic Terrorism
Domestic Terrorism

Domestic Terrorism

Order Instructions:

This SLP assumes that you have a background in emergency management (mitigation, preparation, response and recovery), knowledge of the incident response system (ICS) from local to national level

Background:

1. You are the Principal the local Shining Star Elementary School. Your school contains 400 students and is part of a four-school cluster. Your cluster is part of a school district that contains over 100 schools from all levels.

2. You are the emergency manager for this county of over 300,000 people. Your position is to prepare the county for disasters in an area where the worst expected disaster is fire from storms or drought. Wind storms are the next worst expected disaster. Your county is surrounded by counties of equal or larger sizes in a larger city with a population of five million persons. Shining Star Elementary School is in your county.

3. You are the Mayor of a town within the county that contains the Shining Star Elementary School. The city police and fire department work for you.

4. You are the Chairman of the County Supervisors in the county that contains the Shining Star Elementary School. The county sheriff, fire department, health department, and county support offices work for you.

Scenario A:
1. A GROUP OF ARMED PERSONS HAS INVADED THE SHINING STAR ELEMENTARY SCHOOL!
2. THE PRINCIPAL HAS CALLED 911 FOR HELP.

And then Scenario B happens only 15 minutes later:
1.THE GROUP DEMANDS ACCESS TO THE MEDIA TO STATE THEIR DEMANDS
2. THE GROUP KILLS FIVE ELEMENTARY STUDENTS AND ONE TEACHER TO PROVE THEY ARE SERIOUS

For each of the four positions, explain what you would do and expect for each of the scenarios. Your actions for the initial scenario should be different from the second. Consider the following in each of your answers:

1. WHAT ASSETS DO YOU HAVE?
2. WHAT AGENCIES NEED TO BE INVOLVED?
3. WHO DO YOU NEED TO COORDINATE WITH?
4. WHAT ACTIONS CAN YOU TAKE?

Length: This SLP Assignment should be at least 4 pages not counting the title page and references.
References: At least two references should be included from academic sources listed below (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking).
Organization: Subheadings should be used to organize your paper.

Academic sources required readings:

D’Angelo, A. P. (2007). Strategic change and the Joint Terrorism Task Force: Ideas and recommendations. Naval Postgraduate School. Monterey. Retrieved November 13, 2012, from: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA477108&Location=U2&doc=GetTRDoc.pdf

Facts and figures: Today’s FBI (2011). FBI. Retrieved November 13, 2012, from: http://www.fbi.gov/stats-services/publications/facts-and-figures-2010-2011

McNeill, J. B. (2011). The PATRIOT Act and the Constitution: Five key points. Retrieved November 13, 2012, from: http://www.heritage.org/research/reports/2011/02/the-patriot-act-and-the-constitution-five-key-points

Progress made in implementation of management and mission functions, but more work remains. (2008), GAO-08-457T. Department of Homeland Security, Retrieved November 13, 2012, from: http://www.gao.gov/highlights/d08457thigh.pdf

SAMPLE ANSWER

Introduction

Domestic terrorism is the aggressive act of violence by the citizens of a particular country against their own countrymen. The violence can be perpetrated against the people or the infrastructure that serves the people of a particular nation. This act of terrorism is often conducted by the citizens of a particular state with the aim of promoting social or a political cause. The activities of domestic terrorist are wide and may involves related to cyber-crime, bank robbery, kidnapping, violent crimes, organized crime, among others (FBI, 2011).

The United States PATRIOTIC Act gives directions on how those responsible for security matters can track down terror suspects in order to disorganize their plots before they subject the people to unnecessary danger. In fighting domestic terrorism, the PATRIOTIC Act helps to protect civil liberties and provide common defense by weighing heavily on the civil liberties and matters of national security. According to McNeil (2012), this Act also explains that the American expectation of privacy is not unlimited since they enjoy a reasonable expectation of privacy. Therefore, anything one exposes to voluntary to the third party is not considered protected and each and every individual has the right to report any issues that appears to be amount to terrorism. However, this Act ensures that the security investigators have the necessary tools at their disposal to track and prosecute all acts of terrorism against the American citizens. Therefore, the PATRIOTIC Act is a reliable legislation for fighting domestic terrorism since it has passed the constitutional muster and controls all aspects of disagreements over the role of government and the actual abuse. Moreover, this Act empowers the government agencies to perform their duties diligently and encourages oversight to prevent them from abusing the powers that come with their authority (McNeill, 2011).

Scenario A

When terrorists invade such a large population of people, it is prudent to identify and implement best practices, policies, and procedures that ensure that the skills, experience and expertise of our security team are maximized and integrated with other security teams (D’Angelo, 2007). I request the school security team not to counter the terrorist until they receive support from external law enforcement agencies like the FBI, the police, and the CTU.

In combating domestic terrorism, we need some assets to help us track and prosecute the criminal. First of all, we need human capital to help in coordinating the various activities aimed at countering the terrorist. This will comprise of trained security personnel with the capabilities of dealing with the criminals. Secondly, we need proper IT infrastructure to help coordinate various activities of the security personnel. In addition, we need readily available finances to support the activities of the security personnel. The security team must be equipped with proper tools and equipments that can effectively be used to fight the terrorist (GAO, 2008).

In fighting terrorism, some government agencies must be involved since terrorism is a complicated act. The first agency that needs to be involved is the Counter Terrorism Unit (CTU) since they are heavily involved in domestic terrorism matters. We believe that the CTU will use their experience in handling terrorism matters to provide an emergency solution in accordance with our scenario. The next agency we will involve is the Federal Bureau of Investigations (FBI) The FBI will provide us with ideas as well as the human capital to help track and prosecute the terrorist. The FBI can also provide us with critical infrastructure and technology that can be used in our situation. The next agency that we need to consult is the multidisciplinary Joint Terrorism Task Forces (JTTF) so that they provide us with the necessary tools and equipments to help investigate the motive and the background of these terrorists. Since we are caught in an emergency situation, the JTTF will help to analyze and identify specific actions that will prevent the terrorist from causing more damage to the school. We also expect the JTTF members to support us with strategic change and innovation that will help us overcome any obstacle during the rescue operation. We will ensure that all the above agencies get access to our database in order to access the risk and possible rescue channels available in our institution.

Since fighting terrorism is a collaborative task, we need to involve the police in arresting and prosecuting the terrorist. The police will provide us with human capital and the necessary tools that are needed in our situation. In addition, the police will help us establish the law broken and help to prosecute the terrorist. We also need to coordinate with the health bodies so that they can take care of the persons who have been injured or killed during the terrorist attack.

Scenario B

When the terrorist demand access to the media, their demands should be accepted since defiance may result in more deaths. We will use the IT infrastructure at our disposal to ensure that they access the media. The information that will be circulated in the media will enable us to attract more sympathy from the general public leading to possible rescue operation. The information that will be aired by the terrorist through the media will also enable our collaborators and agencies involved to assess the real situation on the ground. We will need to coordinate with the media houses so that the terrorists stop their ruthless killings since their demands. Moreover, we will use all the communications assets at our disposal to ensure that necessary information is circulated to all relevant stakeholders. At this stage, we will be keen and ensure that we meet all the media demands and behave in accordance with their demands. By allowing the tourist access to the media, we will be saving more life since the relevant authority may decide to relent to their demands.  Refusing to relent to the demands to the terrorist is very risky since they may decide to kill the remaining lives since most of these terrorists are very dangerous.

After providing the terrorist with the access to the media, we will try to launch negotiations with the terrorist to see if they agree to free the enslaved persons. Our argument points will be based on the basis that we are very cooperative and still willing meet their demands. If they refuse, we will urge the terrorist to release a portion of the captured persons, mostly the students, remain with the teachers to give them some leverage. This is because students are still young in age and such ruthless acts may negatively impact their psychology in the future. Meanwhile, as we are in the process of negotiating with the terrorist, we will be buying enough time for the national security agencies to reorganize themselves and possible launch their rescue operations. After some time, we believe the police, FBI, CTU, and JFFT, together with our local security team shall have come up with the rescue operation that they will launch against the terrorist and rescue the lives of both the students and their teachers.

References

D’Angelo, A. P. (2007). Strategic change and the Joint Terrorism Task Force: Ideas and recommendations. Naval Postgraduate School. Monterey. Retrieved November 13,
2012, from: http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA477108&Location=U2&doc=GetTRDoc.pdf

Federal Bureau of Investigations. (2011). Facts and figures: Today’s FBI. FBI. Retrieved November 13, 2012, from: http://www.fbi.gov/stats-services/publications/facts-and-figures-2010-2011

McNeill, J. B. (2011). The PATRIOT Act and the Constitution: Five key points. Retrieved November 13, 2012, from: http://www.heritage.org/research/reports/2011/02/the-

Government Accountability Office. (2008). Progress made in implementation of management and mission functions, but more work remains, GAO-08-457T. Department of Homeland Security, Retrieved November  13, 2012, from: http://www.gao.gov/highlights/d08457thigh.pdf

We can write this or a similar paper for you! Simply fill the order form!

Domestic Terrorism Management Essay

Domestic Terrorism Management
Domestic Terrorism Management

Domestic Terrorism Management

Order Instructions:

Assignment:

1. What are the limits of power of the FBI in pursuing surveillance of potential terrorists within and without the U.S.?

2. In your view, is the FBI adequately organized, staffed, and trained to perform the myriad of missions tasked?

3. Based on the readings and your research, what is the status of the USA Patriot Improvement and Reauthorization Act of 2011 and resultant action on the key divisive issues?

4. Explain the Department of Homeland Security’s role in combating domestic terrorism. What sub agencies are involved? What are their missions?

5. In your opinion, what vulnerabilities would a terrorist see based on your answers to the above four questions.

The following items will be assessed in particular:

1. Your understanding of the organization, roles and missions of the FBI and Department of Homeland security.

2. Your ability to express the controversies associated with these agencies attempting to perform their missions, obstacles in achieving success, and the impact of the Patriot Act.

3. In-text references to the modular background readings (APA formatting recommended) and a reference page. Outside background reading sources encouraged and expected.
Length: This Case Assignment should be at least 3 pages not counting the title page and references.
References: At least two references should be included from academic sources listed below. (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper.
Organization: Subheadings should be used to organize your paper according to question.

Academic sources, required readings:

D’Angelo, A. P. (2007). Strategic change and the Joint Terrorism Task Force: Ideas and recommendations. Naval Postgraduate School. Monterey. Retrieved November 13, 2012, from: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA477108&Location=U2&doc=GetTRDoc.pdf

Facts and figures: Today’s FBI (2011). FBI. Retrieved November 13, 2012, from: http://www.fbi.gov/stats-services/publications/facts-and-figures-2010-2011

McNeill, J. B. (2011). The PATRIOT Act and the Constitution: Five key points. Retrieved November 13, 2012, from: http://www.heritage.org/research/reports/2011/02/the-patriot-act-and-the-constitution-five-key-points

Progress made in implementation of management and mission functions, but more work remains. (2008), GAO-08-457T. Department of Homeland Security, Retrieved November 13, 2012, from: http://www.gao.gov/highlights/d08457thigh.pdf

SAMPLE ANSWER

Domestic Terrorism Management

Q.1

The government agency known as Federal Bureau of Investigations belongs to the US Department of Justice. It functions as an internal intelligence and federal criminal investigative body. It is investigates crimes on the individuals in the US that are under the Major Crimes Act. Since its creation, FBI’s investigatory activities have been restricted by their guidelines to those within the constitutional limits, especially with respect to intrusion of privacy and unwarranted surveillance of U.S. Its major role in investigations in the US on terror threats is vested by the law and by presidential directives (Gorman, 2008).  This includes the domestic roles to in conducting counter intelligence activities to meet foreign undercover work, in investigating international terrorists threats to the United States and intelligence attempts conducted against the United States.

The investigations of the FBI vary in many lengths. When they complete their investigations, the findings are forwarded to the office of the U. S Attorney within the local jurisdiction and to the sector of Justice in Washington, D. C. On receiving the information, they decide whether or not to proceed toward prosecution and handle any prosecutions that follows. Before a full investigation begins, there are certain factors that must be considered that the FBI guidelines requires. Some these factors includes: the probability that the harm would occur, the magnitude of the alleged harm and the danger to privacy and free expression imposed by a full investigation (Gorman, 2008). Under a probable cause standard to satisfy due process requirements, an agent must have reasonable belief that that a suspect has committed a crime or is likely to do so.  The department must in general obtain a warrant act to conduct surveillance that would otherwise be an invasion of privacy, unless exigent circumstances exist to require commencement of search without a warrant (Juden, 2008).  The general requirement for starting a police investigation depends on indication of criminal activity rather than a reasonable suspicion of criminal activity.

Q.2

In performing the many missions that are assigned to the FBI, I think it is adequately organized, staffed and trained to its assigned duties. The department has five functional branches. It also has the director’s office that handles most administrative offices. The executive assistance director manages each branch. An assistant director heads each branch of the divided offices and divisions. The divisions are further divided into sub-branches that are managed by the deputy assistant director. The office of the director is an important body in FBI and provides the finances and all the facilities management to the various staff departments including the five functional branches and other various field divisions. The 59 departments of the FBI at least have a special fighting unit in combating terrorism, for instance, the Special Weapons and Tactics team (SWAT).  The department also has 56 offices in the countries major cities and it also holds over 400 occupant agencies across the US (Gorman, 2008). The FBI is all over the country with many departments, which makes it efficient to act upon any crime within the shortest time possible.

There well equipped laboratories help in fighting terrorism all over the world. Their labs serve for most DNA, physical, and biological work. The services that they conduct in their labs include Combined DNA Index System, Firearms and Tool marks, Computer Analysis and Response, Trace Evidence, DNA Analysis, Explosives, Forensic Audio, and Structural Design.

Many states, the international agencies and local authorities use the results that are gotten from the library freely. These activities make it possible for the FBI in pursuing surveillance of potential terrorist within and without the U. S. For one to employed with the FBI they must go through tests to prove they are clean and fit for the job. The applicant has to be an American citizens, must have a bachelor’s degree and with a clean record. All their workers need a Top Secret security clearance. The personnel management office conducts a series of background investigation conducted that one must pass to be an employee in the FBI departments that are located across the US. With such activities, the country is assured that they are being protected by the best and properly trained people who are aware of all the terrorist techniques.

Q.3

The Patriot Act is damaging to the basic individual freedoms that Americans have always valued. Itwas intended for the fight against terrorism after the September 11 attacks, but the measures stated in the Act generated massive debates over whether or not the Patriot Act reduces individual freedom (Juden, 2008). Considering the circumstances under which the law was voted, it is not surprising that the legislation was passed, but there are parts of the Act that require further analysis that will most likely show that it is endangering essential freedoms.

The USA Patriot Act weakens the fourth Amendment protection of all citizens, and not just suspected terrorists by authorizing warrantless searches and delayed notification. The Act also broadens sneak and peek searches, which is a search that occurs in the suspect’s absence and without his or her prior knowledge, and this enhances the power of prosecutors in court. The normal procedure for search warrants when executed is to leave a copy of the warrant if the place is unoccupied, and to do an inventory and return with the warrant.

Q.4

The Department of Homeland Security (DHS) is mainly responsible for ensuring that the United States is secure from terrorist attacks and any other disasters that may interrupt national security. It has focused on federal preparations to cover terrorism since the attack of the Sept. 11 terrorist attacks as they try to manage other responsibilities such as border security, emergency and custom management. Various federal agencies and offices were pulled together into newly established Homeland Security, which is now led by Tom Ridge. In its creation some agencies maintained their co-operate names and missions while others ceased to exist. The duties of those who did not collaborate were distributed among the new Department of Homeland Security (Martin, 2010).  For instance, the US custom service, which was part of the Treasury Department, was split into US Customs and Boarder protection it has many different agencies that has different responsibilities.

There is the department of Directorate for Science and Technology that is responsible for protecting the citizens from any nuclear, chemical, and explosive attacks. It has all the technology needed to the federal officials that can detect any attempt of terrorist attacks using any explosives. The Domestic nuclear detection office develops high technology screening methods that can detect any nuclear weapon entering United States through the seaports or border crossing. There is the Federal Emergency Management agency that coordinates the government response to natural threats and fabricated disasters. The Office Infrastructure Protection agency helps in securing buildings and other structures across US and uses such technologies that can detect explosives the terrorists use. It also identifies locations and measuring their exposure to any attacks (Johnson, 2012). All these departments work hand in hand with the federal police and the cooperation of US citizens to fight terror attacks, hence, making it easier to realize any forms of terrorism that is in the United State. This has made it possible for the US to be safe from the terror attacks.

 

Q.5

I think, with the diverse departments that the FBI has all over the country, it has a great impact on the actions of terrorists. Their labs serve for most DNA, physical, and biological works. The services that they conduct in their labs include Combined DNA Index System, Firearms and Tool marks, Computer Analysis and Response, Trace Evidence, DNA Analysis, Explosives, Forensic Audio, and Structural Design (Martin, 2010). The results are shared with other states creating awareness of any act of terrorism. Other countries also provide them with information of crime and they are always aware of the activities of terrorists, making it impossible for them to perform any attacks. Through all these activities, they are able to identify any possibility of a crime and act upon it immediately.

References

Martin, C. Augustus. (2010). Essentials of Terrorism 2nd Ed + Issues in Terrorism and Homeland Security. Sage Pubns.

Johnson, N. (2012). Senate debates DHS’ role in regulating cybersecurity. Federal Times48(4), 7.

Juden, D. (2008). Police Practice: The Sikeston Department of Public Safety. FBI Law Enforcement Bulletin77(8), 10.

Gorman, S. (2008, April 2). Pentagon Uses FBI to Collect Data on People in the U.S. Wall Street Journal – Eastern Edition. p. A2.

We can write this or a similar paper for you! Simply fill the order form!

Sectarianism and Extremism and the Fight against Terrorism

Sectarianism and Extremism and the Fight against Terrorism
Sectarianism and Extremism and the Fight against Terrorism

Sectarianism and Extremism and the Fight against Terrorism

Order Instructions:

This is an English essay, the writer must pay close attention to details here as the paper will be graded base on grammar and structure. It is critical the paper must be written in 3rd person . The writer must use sources from the U.S and not international as it is clearly mentioned in the requirements. the writer must address all the points mentioned in the organization section clearly indicating the different sections in paragraphs.

Major Writing Assignment #2
Editorial Cartoon Analysis

Appearing on the editorial page of a newspaper or a magazine, the editorial cartoon exists in a sea of words.
Is it just for fun? No. An editorial cartoon is as much an argument as the most serious editorial.

Often featuring exaggerated drawings of famous people or important symbols in unusual or bizarre settings, these cartoons sometimes make us laugh, they sometimes make us cry, and they sometimes make us cringe—but they should always make us think.

Editorial cartoons are definitely worth serious study as argument, and that’s what you will do in this assignment.

Assignment:

Select four editorial cartoons on the same subject. Analyze each cartoon and then write an essay presenting the results of your analysis. The focus of your paper should be to illustrate that the cartoons present a consistent viewpoint about a controversial social or political issue OR that the cartoons present opposing viewpoints about a controversial social or political issue.

Organization:

• Introduce the concept of editorial cartooning and state your thesis

• Write a well-developed background paragraph on the issue

• Write an analysis paragraph of each cartoon, one paragraph per cartoon minimum. Your analysis should
be thorough and include details from the cartoons to support your point. Use spatial organization in
your analysis paragraphs.

• Write a well-developed opinion paragraph on the issue. This is your chance to weigh in on the subject at hand.

• Write a well-developed conclusion that reiterates your thesis and offers some reflection on the nature
and value of the editorial cartoon as a type of argumentation.

Requirements:

  • Do write 3 pages minimum, typed, double-spaced.
  • Do include a works cited page referencing the cartoons used.
  • Do include copies of each cartoon (not counted toward the 3 page minimum)
  • Don’t use four cartoons by the same cartoonist. Don’t use international cartoons ( Base in The U.S only).
  • Don’t argue about the controversial issue throughout the paper—advocate that a viewpoint you identify is expressed by the cartoons. You have only one paragraph where you should argue about the issue.

Resources.

For an easy-to-access collection of editorial cartoons, see http://www.cagle.com/. Please use this source and only this source for your cartoons.

Sample thesis statements:

• When All four cartoons present a consistent view:

The four editorial cartoons about { } illustrate the viewpoint that { }.

• When two cartoons present one view, and two cartoons present the opposite or an alternate view:

The four editorial cartoons about { ) illustrate the debate between { }position
and { }position.

Sample topic sentence:

The first cartoon, drawn by ___________________ of _________________ depicts __________________.

(artist) (original publication) (description of the visual)

Naming the artist and the original place of publication in each topic sentence is a method of in-text citation.
The artist will be the first thing mentioned in each works cited entry.

Works Cited:

In this paper, your works cited list should include the four cartoons, listed by artist. You should use the format for cartoon and finish the citation as a short work on a website. Or to rephrase, don’t include the original place of publication in your citation. Instead, cite the Cagle website.

If you consult sources to write your background paragraph, you must include these sources on the works cited page and you must cite them in the text using MLA format.

Point of View:

This paper should be written in third person. You can get away with using first person in your opinion paragraph, but it’s possible to use third person even in this paragraph.

SAMPLE ANSWER

Sectarianism and Extremism and the Fight against Terrorism

The issue of terrorism has turned out as one of the biggest concerns of the century for the United States. One thing has come out clearly in the country’s fight against terrorism; that global fight against terrorism requires major effort and greater coordination between nations. The U.S government recently announced that it had reached a crossroads in this fight and a time had come to redefine and recalibrate the war (Gürbüz, n.p). These sentiments have been echoed across the political defines all over the world with calls for international coordination and cooperation. However, the issue remains as controversial as ever with diverse view points on several concerns such as the role of the U.S in the Middle East conflicts, the use of drones, and the need for ceasefire. The four editorial cartoons about the controversial issue of terrorism illustrate the debate between the U.S government and its allies on one side and the proponents of the ceasefire campaign.

Background of the Terrorism Issue

The ‘war on terror’ is a term used to imply the international military campaign led by the U.S and UK that was started after the 11 September 2001 attack on U.S. it resulted in a global campaign to eliminate al-Qaeda and other militant groups such as the recent ISIS. Because of the diffuse actions involved in the counter terror war, the initiative has elicited numerous debates on the basis of the assumptions, justifications, ambiguities, and beliefs surrounding them (Gürbüz, n.p). Some critics cite that this war has been used to justify unilateral preventive war, violations of international law, and abuse of human rights.

# 1: John Darkow (By John Darkow)

The first cartoon, drawn by John Darkow of the Columbia Daily Tribune depicts an attack on the White House by the ISIS militants as an attempt or direct attack on the U.S government. It implies the seriousness of ignoring such a group by the international community. The repercussions of letting such a dangerous group get away with their erroneous acts would equally impact on others across the globe. The carton attempts to elicit more focused reactions and imaginations from readers. It also elicits emotional reflections on the past attacks by terrorists on innocent people. Apparently, there are a series of emotions, viewpoints, and reactions that are the cartoon is likely to generate across the board.

#2: Jeff Darcy (by Jeff Darcy)

The second cartoon, drawn by Jeff Darcy of The Plain Dealer sarcastically depicts the echoing by President Obama of Hillary’s 1996 message in her book that it takes the proverbial Muslim village to bring up a child who is not brainwashed by extremists. It exhibits the government’s stand on their war against terrorism as well as the call to thwart the radicalization of the Muslim youth. It is used as a vehicle in setting up the political agenda concerning possibly by reorienting and shaping the public opinion by the mirroring of the current standoff in the issue of Muslim radicalism especially in the Middle East.

#3: Paresh Nath (by Paresh Nath)

The third cartoon, drawn by Paresh Nath of Cagle Cartoons is an illustration of the need for the international community to join forces in the fight against terror. The cartoon has been used as a communicative tool in passing the message of cooperation against a global social evil; terrorism. It has been used to construct the reality of the terrorism issue and to represent the social representation of the political and international cooperation. As illustrated in the cartoon, ISIS is in trouble following a grand coalition by fierce stronger forces against it. This cartoon exhibits the potential in cooperating among nations in the fight and in bringing the terror organization ISIS on its knees and brings about a more peaceful world.

#4: Steve Kelley (by Steve Kelley)

The fourth cartoon, drawn by Steve Kelley of New Orleans Times-Picayunehas been  used purposely to communicate with the audience in persuading them towards perceiving the war and the ceasefire issue from a different point of view. It is used as a strategic tool to make those involved in the war in one or another to make them more receptive as well as to provide rational argument that a permanent ceasefire is the best solution in this case. By using ridicule of the situation on temporary ceasefire as has been the case in Gaza, the cartoon effectively creates an impression of irrationality and carelessness but the two sides of the conflict. This elicits a sense of thoughtfulness and rationality where the two teams should be more focused on what is good for the society; peace.

Reflection

Terrorism poses a real threat to security and safety of innocent citizens in the U.S and in many other nations across the world. As a global treat that knows no nationality, border, or religion, it presents as a global challenge that the international community must tackle collaboratively. The use of cartoons to is an effective means of illustrating these concerns and issues. Indeed, editorial cartoons presents the controversial issue in a way that elicits rationalization and more effective thinking in a friendly and fun way’ one that is not offensive to others.

Conclusion

In recent years, the genre on cartoon has continued to gain considerable interest among scholars as a potent source of data used in the study of social, economic, and political phenomena. The editorial cartoons used in this analysis have been used, for instance, to shape and reorient the public opinion through the use of recurrent depictions mirroring the socio-political issue of terrorism in the current period. The analysis was particularly interested in the themes illustrated through the sign system founded on the denotation elements in the cartoons. The analysis established a number of themes revolving around the fight against terrorism such as the need for global coordination and ceasefire. These political cartoons were effectively used to set social and political agendas by encapsulating current and sensitive concerns on the terrorism issue.

Works Cited

Darcy, Jeff. Hillary Obama: It takes a muslim village to raise a child not radicalized. Adapted from:  http://www.cagle.com/. (accessed on 1/10/2014)

Darkow, John. Ok, maybe we underestimated the rise of ISIS!. Adapted from:  http://www.cagle.com/. (accessed on 1/10/2014)

Gürbüz, Uğur, and Press IOS. Capacity Building In The Fight Against Terrorism. Amsterdam: IOS Press, 2013.

Kelley, Steve. If temporary ceasefire don’t work, maybe they should try a permanent one… Adapted from:  http://www.cagle.com/. (accessed on 1/10/2014)

Nath, Paresh. Grand coalition. Adapted from:  http://www.cagle.com/. (accessed on 1/10/2014)

We can write this or a similar paper for you! Simply fill the order form!

Local, State, and Federal Partnerships: Terrorism

Local, State, and Federal Partnerships: Terrorism
Local, State, and Federal Partnerships: Terrorism

Local, State, and Federal Partnerships: Terrorism

Order Instructions:

Local, State, and Federal Partnerships: Terrorism
For this level, access the following:

1. Federal Government Partner Guide of the NRF. The “Partner Guide provides a targeted index to information in the NRF core document that is specifically pertinent to local [state and federal] government leaders and emergency management practitioners. The Guide is intended to serve as a ready reference to assist users in quickly locating sections of the NRF that are applicable to local [state and federal] partners.” (Source: FEMA.gov)

2. National Incident Management System (NIMS). NIMS works hand in hand with the NRF. NIMS provides the template for the management of incidents, while the NRF provides the structure and mechanisms for national-level policy for incident management.
Respond to the following:

1. Explain the chain-of-command structure when receiving information about a possible act of terrorism in your city. The incident is confirmed to be the work of terrorists. Now what?

2. Review the NRF and the NIMS in reference to terrorism (e.g., explosions, shootings, biological attacks) and note the locations in these documents.

3. What do the documents note concerning biological, chemical, radiological, and nuclear terrorism?

4. Go to the Texas Department of Public Safety website and find the document regarding the biological terrorism response plan. Summarize the document’s strengths and weaknesses as a response plan in light of the prior questions and readings.

Assignment Expectations
Length: Case assignments should be at least three pages long.
References: IN addition to the required readings, at least two additional references should be included from an academic sources (e.g., peer-reviewed journal articles). The references should be cited within the text and also listed at the end of the assignment in the References section (preferably in APA format).
Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking). Use your own words and build on the ideas of others. When material is copied verbatim from external sources, it must be enclosed in quotes.
Organization: Subheadings should be used to organize your paper.
Format: APA format is required for this assignment

The following items will be assessed in particular:
• Relevance – All content is connected to the question.
• Precision – Specific question is addressed. Statements, facts, and statistics are specific and accurate.
• Depth of discussion – Points that lead to deeper issues are presented and integrated.
• Breadth – Multiple perspectives and references, multiple issues/factors considered.
• Evidence – Points are well-supported with facts, statistics, and references.
• Logic – Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
• Clarity – Writing is concise, understandable, and contains sufficient detail or examples.
• Objectivity – Paper avoids use of first person and subjective bias

SAMPLE ANSWERS

Local, State, and Federal Partnerships: Terrorism

1. Explain the chain-of-command structure when receiving information about a possible act of terrorism in your city. The incident is confirmed to be the work of terrorists. Now what?

When a possible incident of terrorism is reported in the city of Los Angeles, California, patrol officers will be the first on the scene among other first responders who arrive at the scene with the sole aim of helping the public who may be wounded or in harm’s way. Once the first responders arrive at the scene, they will radio in the situation to their respective departments for appropriate response with the police officers radioing the situation to their base station. A senior officer at the base is usually assigned the case immediately it is reported who then appoints an incident commander who has special training in emergency response who shall be in charge of the operation (Kane, 2004). The incident commander quickly takes over and starts gathering important information from officers who are at the scene while at the same time dispatching an emergency police unit to the scene. The incident commander also coordinates with the city’s emergency response center so as to confirm that the incident is actually an act of terrorism after which the matter becomes a top priority for homeland security, but they will still coordinate with the police and the emergency response command center.
 2. Review the NRF and the NIMS in reference to terrorism (e.g., explosions, shootings, biological attacks) and note the locations in these documents.

According to the NRF document, the references to terrorism are located in the chapters II and II of the document, which are dedicated to response actions and in case of such incidents. The term is mentioned between pages 27 in the introduction to page 70 at the close of chapter III. On page 48, which discuses the role of a Multiagency Coordination System (MACS) whose role is to coordinate events away from the field and allocate resources in high demand within the field (FEMA, 2008a). Page 53 mentions the role of Homeland Security in staffing counterterrorism units. Page 54 mentions the Counterterrorism Security Group (CSG), which is an interagency group that develops terrorism prevention measures. The National Counterterrorism Center (NCS) is mentioned on page 57.

The NIMS document mentions the term terrorism on page 5 all the way throughout the document up to page 148, addressing all forms of terrorism including bioterrorism and nuclear terrorism. There is also a definition of terrorism done by the Homeland Security Act of 2002, which characterizes it as an act that poses danger to human life or has the potential to cause damage to critical infrastructure. In the U.S, it is a violation of state or federal criminal laws, its objective is to coerce or intimidate civilians, or to affect the operations of a government by mass criminal acts (FEMA, 2008b).

3. What do the documents note concerning biological, chemical, radiological, and nuclear terrorism?

The NIMs document is very categorical about all the above types of terrorisms attacks, which should be managed by an Incident Command System (ICS) since they involve multiple agencies and may cover multiple jurisdictions. The ICS should facilitate the coordination of response actions by integrating equipment, personnel, facilities, procedures, and communication system between response teams. The NIMS document also proposes that additional command staff may be necessary for the above terrorism attacks (FEMA, 2008b). An Area Command is also recommended for the above types of terrorism attacks, as they require the coordination of large-scale responses and different types of organizations that are managed by different ICS. Emergency Operations Centers may also be established in times of such terrorism attacks that have significant lasting effects and will usually include staff from a variety of jurisdictions and disciplines. The Operations Section discuses the management of terrorism sites so as to save lives and property, while also establishing control and returning the situation to normal (FEMA, 2008b).

4. Go to the Texas Department of Public Safety website and find the document regarding the biological terrorism response plan.

Strengths

The strengths of the Appendix 6 to Annex H (Biological Terrorism Response Plan) document lie in section IV on situation and assumptions as most of the situation described are correct and extremely accurate, thus, they represent the situation on the ground in the state of Texas (TxDPS, 2011). Situations that describe how terrorist may carry out attacks on specific populations or areas in the state and the motivations for such targeted attacks being to cause mass casualties or to inflict economic loss are extremely accurate. The situation is quite accurate because it reflects the definitions of acts of terrorism, which is contained in the NIMs document. Another appropriate situation is described as a biological terrorism attack that may target critical infrastructure and vital resources. The assumptions in the document are also appropriate as they reflect the nature of terrorism attacks, such as in order for a response to a bioterrorism attack to be successful, accurate information should be released to the public on time so that they can take appropriate measures regarding public health issues (TxDPS, 2011). Most of the other assumptions are also quite accurate.

Weaknesses

The main weaknesses of the document lie in its description of the concept of operations and the biological terrorism response strategy and policy, which I find is quite inadequate and might not reflect the true situation on the ground during bioterrorism attacks. I recommend that the department adopts much faster detection systems such as the use of monitoring drones to minimize the time lag between the biological attack and its detection. Such measures will ensure that the response have maximum effect.

References

Kane, J. (2004). The critical incident response manual for supervisors and managers. California: D-Prep, LLC.

FEMA. (2008, January). National Response Framework. Washington  DC. Department of Homeland Security.

FEMA. (2008, December 18). National Incident Management System. Washington DC. Department of Homeland Security.

Texas Department of Public Safety. (2011, September). State of Texas Emergency Management Plan. Texas: Texas Department of State Health Services

We can write this or a similar paper for you! Simply fill the order form!